Dell PowerConnect
8024, 8024F, 8132, 8132F, 8164,
and 8164F Switch
User’s Configuration
Guide
Regulatory Models: PC8024, PC8024F,
PC8132, PC8132F, PC8164, PC8164F
Notes and Cautions
NOTE: A NOTE indicates important information that helps you make better use of
your computer.
CAUTION: A CAUTION indicates potential damage to hardware or loss of data if
instructions are not followed.
____________
Information in this publication is subject to change without notice.
© 2013 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc.
is strictly forbidden.
Trademarks used in this text: Dellâ„¢, the DELL logo, EqualLogicâ„¢, PowerConnectâ„¢, and
OpenManageâ„¢ are trademarks of Dell Inc. Microsoft
and Windows Vista
United States and/or other countries. sFlow
is a registered trademark of Cisco Systems. Mozilla
Mozilla Foundation.
Other trademarks and trade names may be used in this publication to refer to either the entities claiming
the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and
trade names other than its own.
®
are either trademarks or registered trademarks of Microsoft Corporation in the
®
is a registered trademark of InMon Corporation. Cisco®
®
, Windows®, Windows Server®, MS-DOS®,
®
and Firefox® are registered trademarks of the
Regulatory Models: PC8024, PC8024F, PC8132, PC8132F, PC8164, PC8164F
January 2013 Rev. A04
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 49
About This Document . . . . . . . . . . . . . . . . . . 49
Audience . . . . . . . . . . . . . . . . . . . . . . . . . 50
Document Conventions . . . . . . . . . . . . . . . . . 50
Additional Documentation
. . . . . . . . . . . . . . . . 51
2 Switch Features . . . . . . . . . . . . . . . . . . . 53
System Management Features . . . . . . . . . . . . . 54
Multiple Management Options
System Time Management . . . . . . . . . . . . . 54
Log Messages
Integrated DHCP Server . . . . . . . . . . . . . . 56
Management of Basic Network Information. . . . 56
IPv6 Management Features . . . . . . . . . . . . 56
Dual Software Images . . . . . . . . . . . . . . . 56
File Management
Switch Database Management Templates. . . . . 57
Automatic Installation of Firmware and
Configuration
sFlow . . . . . . . . . . . . . . . . . . . . . . . . 58
SNMP Alarms and Trap Logs . . . . . . . . . . . . 58
CDP Interoperability through ISDP
Remote Monitoring (RMON) . . . . . . . . . . . . 58
Stacking Features . . . . . . . . . . . . . . . . . . . . 59
High Port Count
. . . . . . . . . . . . . . . . . . . 55
. . . . . . . . . . . . . . . . . . 57
. . . . . . . . . . . . . . . . . . . . 57
. . . . . . . . . . . . . . . . . . . 59
. . . . . . . . . . . 54
. . . . . . . . . 58
Contents 3
Single IP Management . . . . . . . . . . . . . . . 59
Automatic Firmware Update for New Stack
Members
Master Failover with Transparent Transition
Nonstop Forwarding on the Stack
. . . . . . . . . . . . . . . . . . . . . . 59
. . . . 60
. . . . . . . . . 60
Hot Add/Delete and Firmware
Synchronization
. . . . . . . . . . . . . . . . . . . 60
Security Features . . . . . . . . . . . . . . . . . . . . 60
Configurable Access and Authentication
. . . . . . . . . . . . . . . . . . . . . . . 60
Profiles
Password-Protected Management Access . . . . 61
Strong Password Enforcement
. . . . . . . . . . . 61
TACACS+ Client . . . . . . . . . . . . . . . . . . . 61
RADIUS Support . . . . . . . . . . . . . . . . . . 61
SSH/SSL
. . . . . . . . . . . . . . . . . . . . . . . 62
Inbound Telnet Control . . . . . . . . . . . . . . . 62
Denial of Service . . . . . . . . . . . . . . . . . . 62
Port Protection
. . . . . . . . . . . . . . . . . . . 62
Captive Portal . . . . . . . . . . . . . . . . . . . . 63
Dot1x Authentication (IEEE 802.1X) . . . . . . . . . 63
MAC-Based 802.1X Authentication
. . . . . . . . . 63
Dot1x Monitor Mode . . . . . . . . . . . . . . . . 64
MAC-Based Port Security . . . . . . . . . . . . . 64
Access Control Lists (ACL)
. . . . . . . . . . . . . 64
Time-Based ACLs . . . . . . . . . . . . . . . . . . 65
IP Source Guard (IPSG)
DHCP Snooping
. . . . . . . . . . . . . . . 65
. . . . . . . . . . . . . . . . . . . 65
Dynamic ARP Inspection . . . . . . . . . . . . . . 65
Protected Ports (Private VLAN Edge). . . . . . . . 66
4 Contents
Switching Features . . . . . . . . . . . . . . . . . . . 66
Flow Control Support (IEEE 802.3x)
. . . . . . . . . 66
Head of Line Blocking Prevention . . . . . . . . . 66
Alternate Store and Forward (ASF)
. . . . . . . . . 66
Jumbo Frames Support . . . . . . . . . . . . . . . 67
Auto-MDI/MDIX Support . . . . . . . . . . . . . . 67
VLAN-Aware MAC-based Switching. . . . . . . . 67
Back Pressure Support
. . . . . . . . . . . . . . . 67
Auto Negotiation . . . . . . . . . . . . . . . . . . 68
Broadcast Storm Control . . . . . . . . . . . . . . 68
Port Mirroring
. . . . . . . . . . . . . . . . . . . . 68
Static and Dynamic MAC Address Tables . . . . . 69
Link Layer Discovery Protocol (LLDP) . . . . . . . 69
Link Layer Discovery Protocol (LLDP) for
Media Endpoint Devices
. . . . . . . . . . . . . . 69
Priority-based Flow Control (PFC) . . . . . . . . . 69
Data Center Bridging Exchange (DBCx)
Protocol
. . . . . . . . . . . . . . . . . . . . . . . 70
Enhanced Transmission Selection . . . . . . . . . 70
Fibre Channel over Ethernet (FCoE) Initialization
Protocol Snooping
. . . . . . . . . . . . . . . . . 70
Cisco Protocol Filtering . . . . . . . . . . . . . . . 71
DHCP Layer 2 Relay
. . . . . . . . . . . . . . . . . 71
Virtual Local Area Network Supported Features
VLAN Support
Port-Based VLANs
. . . . . . . . . . . . . . . . . . . . 71
. . . . . . . . . . . . . . . . . 71
. . . . 71
IP Subnet-based VLAN . . . . . . . . . . . . . . . 72
MAC-based VLAN . . . . . . . . . . . . . . . . . 72
IEEE 802.1v Protocol-Based VLANs
. . . . . . . . 72
GARP and GVRP Support . . . . . . . . . . . . . . 72
Voice VLAN . . . . . . . . . . . . . . . . . . . . . 72
Guest VLAN
. . . . . . . . . . . . . . . . . . . . . 73
Double VLANs . . . . . . . . . . . . . . . . . . . 73
Spanning Tree Protocol Features . . . . . . . . . . . . 74
Spanning Tree Protocol (STP)
. . . . . . . . . . . 74
Spanning Tree Port Settings . . . . . . . . . . . . 74
Rapid Spanning Tree . . . . . . . . . . . . . . . . 74
Contents 5
Multiple Spanning Tree . . . . . . . . . . . . . . . 74
Bridge Protocol Data Unit (BPDU) Guard. . . . . . 75
BPDU Filtering . . . . . . . . . . . . . . . . . . . 75
Link Aggregation Features
Link Aggregation
Link Aggregate Control Protocol (LACP)
Routing Features
. . . . . . . . . . . . . . . . . . . . . 77
. . . . . . . . . . . . . . . . 75
. . . . . . . . . . . . . . . . . . 75
. . . . . . 75
Address Resolution Protocol (ARP) Table
Management . . . . . . . . . . . . . . . . . . . . 77
VLAN Routing . . . . . . . . . . . . . . . . . . . . 77
IP Configuration . . . . . . . . . . . . . . . . . . . 77
Open Shortest Path First (OSPF)
. . . . . . . . . . 77
BOOTP/DHCP Relay Agent . . . . . . . . . . . . . 78
IP Helper and UDP Relay . . . . . . . . . . . . . . 78
Routing Information Protocol . . . . . . . . . . . . 78
Router Discovery . . . . . . . . . . . . . . . . . . 78
Routing Table
. . . . . . . . . . . . . . . . . . . . 78
Virtual Router Redundancy Protocol (VRRP) . . . . 79
Tunnel and Loopback Interfaces . . . . . . . . . . 79
IPv6 Routing Features . . . . . . . . . . . . . . . . . . 79
IPv6 Configuration
. . . . . . . . . . . . . . . . . 79
IPv6 Routes . . . . . . . . . . . . . . . . . . . . . 80
. . . . . . . . . . . . . . . . . . . . . . . 80
OSPFv3
DHCPv6 . . . . . . . . . . . . . . . . . . . . . . . 80
6 Contents
Quality of Service (QoS) Features . . . . . . . . . . . . 81
Differentiated Services (DiffServ)
. . . . . . . . . 81
Class Of Service (CoS) . . . . . . . . . . . . . . . 81
Auto Voice over IP (VoIP) . . . . . . . . . . . . . . 81
Internet Small Computer System Interface
(iSCSI) Optimization
. . . . . . . . . . . . . . . . . 82
Layer 2 Multicast Features . . . . . . . . . . . . . . . 82
MAC Multicast Support
. . . . . . . . . . . . . . . 82
IGMP Snooping . . . . . . . . . . . . . . . . . . . 82
IGMP Snooping Querier . . . . . . . . . . . . . . 83
MLD Snooping
. . . . . . . . . . . . . . . . . . . 83
Multicast VLAN Registration . . . . . . . . . . . . 83
Layer 3 Multicast Features . . . . . . . . . . . . . . . 84
Distance Vector Multicast Routing Protocol
. . . . 84
Internet Group Management Protocol . . . . . . . 84
IGMP Proxy . . . . . . . . . . . . . . . . . . . . . 84
Protocol Independent Multicast—Dense
. . . . . . . . . . . . . . . . . . . . . . . . 84
Mode
Protocol Independent Multicast—Sparse
Mode
. . . . . . . . . . . . . . . . . . . . . . . . 85
Protocol Independent Multicast—Source
Specific Multicast
Protocol Independent Multicast IPv6 Support
. . . . . . . . . . . . . . . . . 85
. . . 85
MLD/MLDv2 (RFC2710/RFC3810) . . . . . . . . . . 85
3 Hardware Overview. . . . . . . . . . . . . . . . . 87
PowerConnect 8000-series and 8100-series Front
. . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Panel
PowerConnect 8024 Front Panel
PowerConnect 8024F Front Panel
PowerConnect 8132 Front Panel
. . . . . . . . . . 87
. . . . . . . . . 88
. . . . . . . . . . 89
PowerConnect 8132F Front Panel . . . . . . . . . 89
PowerConnect 8164 Front Panel . . . . . . . . . . 90
PowerConnect 8164F Front Panel
. . . . . . . . . 91
Hot-Pluggable Interface Modules . . . . . . . . . 92
USB Port (Power Connect 8100-series
switches only)
. . . . . . . . . . . . . . . . . . . 94
Port and System LEDs . . . . . . . . . . . . . . . 94
Contents 7
PowerConnect 8000-series and 8100-series Back
. . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Panel
Console Port
. . . . . . . . . . . . . . . . . . . . 96
Out-of-Band Management Port. . . . . . . . . . . 96
Power Supplies
. . . . . . . . . . . . . . . . . . . 96
Ventilation System . . . . . . . . . . . . . . . . . 96
LED Definitions. . . . . . . . . . . . . . . . . . . . . . 97
Port LEDs
. . . . . . . . . . . . . . . . . . . . . . 97
Module Bay LEDs . . . . . . . . . . . . . . . . . . 98
Out-of-Band Ethernet Management Port LEDs. . . 99
System LEDs
. . . . . . . . . . . . . . . . . . . . 99
Switch Addresses
. . . . . . . . . . . . . . . . . . . 100
4 Using Dell OpenManage Switch
Administrator . . . . . . . . . . . . . . . . . . . . 103
About Dell OpenManage Switch Administrator. . . . 103
Starting the Application . . . . . . . . . . . . . . . . 104
Understanding the Interface . . . . . . . . . . . . . . 105
Defining Fields
. . . . . . . . . . . . . . . . . . . . . 107
Understanding the Device View . . . . . . . . . . . . 108
Using the Device View Port Features
. . . . . . . 108
5 Using the Command-Line Interface . . . . 109
Accessing the Switch Through the CLI . . . . . . . . 109
Console Connection
Telnet Connection. . . . . . . . . . . . . . . . . 110
. . . . . . . . . . . . . . . . 109
8 Contents
Understanding Command Modes . . . . . . . . . . . . 111
Entering CLI Commands
Using the Question Mark to Get Help
Using Command Completion
. . . . . . . . . . . . . . . . . 113
. . . . . . . 113
. . . . . . . . . . . . 114
Entering Abbreviated Commands . . . . . . . . . 114
Negating Commands . . . . . . . . . . . . . . . . 114
Understanding Error Messages
. . . . . . . . . . 115
Recalling Commands from the History Buffer . . . 115
6 Default Settings. . . . . . . . . . . . . . . . . . . 117
7 Setting the IP Address and Other
Basic Network Information . . . . . . . . . . 121
IP Address and Network Information Overview . . . . 121
What Is the Basic Network Information?
Why Is Basic Network Information Needed? . . . 122
How Is Basic Network Information
Configured?
. . . . . . . . . . . . . . . . . . . . . 123
What Is Out-of-Band Management and
In-Band Management?
. . . . . . . . . . . . . . . 123
. . . . . 121
Default Network Information
. . . . . . . . . . . . . . 125
Configuring Basic Network Information (Web) . . . . . 126
Out-of-Band Interface
. . . . . . . . . . . . . . . 126
IP Interface Configuration (Default VLAN IP
Address)
. . . . . . . . . . . . . . . . . . . . . . 127
Route Entry Configuration (Switch Default
Gateway)
Domain Name Server
Default Domain Name
. . . . . . . . . . . . . . . . . . . . . . 128
. . . . . . . . . . . . . . . . 130
. . . . . . . . . . . . . . . 131
Host Name Mapping . . . . . . . . . . . . . . . . 132
Contents 9
Dynamic Host Name Mapping . . . . . . . . . . 133
Configuring Basic Network Information (CLI)
Enabling the DHCP Client on the OOB Port
. . . . . 134
. . . . 134
Enabling the DHCP Client on the Default
. . . . . . . . . . . . . . . . . . . . . . . 134
VLAN
Managing DHCP Leases . . . . . . . . . . . . . 135
Configuring Static Network Information on
the OOB Port
. . . . . . . . . . . . . . . . . . . 136
Configuring Static Network Information on
the Default VLAN
. . . . . . . . . . . . . . . . . 136
Configuring and Viewing Additional Network
Information
. . . . . . . . . . . . . . . . . . . . 137
Basic Network Information Configuration
Example
. . . . . . . . . . . . . . . . . . . . . . . . 138
8 Managing QSFP Ports . . . . . . . . . . . . . . 141
9 Managing a Switch Stack . . . . . . . . . . . 143
Stacking Overview . . . . . . . . . . . . . . . . . . . 143
Creating a PowerConnect 8000/8100 Series
Stack . . . . . . . . . . . . . . . . . . . . . . . 145
How is the Stack Master Selected? . . . . . . . 146
Adding a Switch to the Stack
Removing a Switch from the Stack
How is the Firmware Updated on the Stack? . . . 149
What is Stacking Standby? . . . . . . . . . . . . 149
What is Nonstop Forwarding?
Switch Stack MAC Addressing and Stack
Design Considerations
NSF Network Design Considerations
Why is Stacking Needed? . . . . . . . . . . . . 154
. . . . . . . . . . . 148
. . . . . . . . 148
. . . . . . . . . . 150
. . . . . . . . . . . . . . 153
. . . . . . . 153
10 Contents
Default Stacking Values . . . . . . . . . . . . . . . . . 154
Managing and Monitoring the Stack (Web)
Unit Configuration
Stack Summary
. . . . . . . . . . . . . . . . . 155
. . . . . . . . . . . . . . . . . . . 157
. . . . . . . 155
Stack Firmware Synchronization . . . . . . . . . . 158
Supported Switches . . . . . . . . . . . . . . . . 159
Stack Port Summary
. . . . . . . . . . . . . . . . 160
Stack Port Counters . . . . . . . . . . . . . . . . 161
Stack Port Diagnostics . . . . . . . . . . . . . . . 161
NSF Summary
. . . . . . . . . . . . . . . . . . . . 162
Checkpoint Statistics . . . . . . . . . . . . . . . . 163
Managing the Stack (CLI) . . . . . . . . . . . . . . . . 164
Configuring Stack Member, Stack Port, and
NSF Settings
. . . . . . . . . . . . . . . . . . . . 164
Viewing and Clearing Stacking and NSF
Information
Stacking and NSF Usage Scenarios
Basic Failover
Preconfiguring a Stack Member
. . . . . . . . . . . . . . . . . . . . . 166
. . . . . . . . . . . 166
. . . . . . . . . . . . . . . . . . . . 167
. . . . . . . . . . 169
NSF in the Data Center . . . . . . . . . . . . . . . 171
NSF and VoIP . . . . . . . . . . . . . . . . . . . . 172
NSF and DHCP Snooping
. . . . . . . . . . . . . . 173
NSF and the Storage Access Network . . . . . . . 174
NSF and Routed Access
. . . . . . . . . . . . . . 176
10 Configuring Authentication,
Authorization, and Accounting . . . . . . . 179
AAA Overview . . . . . . . . . . . . . . . . . . . . . . 179
Methods
Access Lines
. . . . . . . . . . . . . . . . . . . . . . 180
. . . . . . . . . . . . . . . . . . . . 181
Contents 11
Authentication . . . . . . . . . . . . . . . . . . . . . 181
Authorization
Exec Authorization Capabilities
. . . . . . . . . . . . . . . . . . . . . . 182
. . . . . . . . . . 183
Accounting . . . . . . . . . . . . . . . . . . . . . . . 184
Authentication Examples . . . . . . . . . . . . . . . 185
Local Authentication Example
. . . . . . . . . . 185
TACACS+ Authentication Example . . . . . . . . 186
RADIUS Authentication Example . . . . . . . . . 188
Authorization Examples . . . . . . . . . . . . . . . . 189
Local Authorization Example—Direct Login
to Privileged EXEC Mode
. . . . . . . . . . . . . 189
TACACS+ Authorization Example—Direct
Login to Privileged EXEC Mode
. . . . . . . . . . 189
TACACS+ Authorization Example—
Administrative Profiles
. . . . . . . . . . . . . . 190
TACACS+ Authorization Example—Custom
Administrative Profile
. . . . . . . . . . . . . . . 191
TACACS+ Authorization Example—
Per-command Authorization
. . . . . . . . . . . 192
RADIUS Authorization Example—Direct Login
to Privileged EXEC Mode
. . . . . . . . . . . . . 193
RADIUS Authorization Example—
Administrative Profiles
. . . . . . . . . . . . . . 193
12 Contents
Using RADIUS Servers to Control Management
. . . . . . . . . . . . . . . . . . . . . . . . . 194
Access
How Does RADIUS Control Management
Access?
. . . . . . . . . . . . . . . . . . . . . . 194
Which RADIUS Attributes Does the Switch
Support?
. . . . . . . . . . . . . . . . . . . . . . 196
How Are RADIUS Attributes Processed on the
. . . . . . . . . . . . . . . . . . . . . . 198
Switch?
Using TACACS+ Servers to Control Management
. . . . . . . . . . . . . . . . . . . . . . . . . . 199
Access
Which TACACS+ Attributes Does the Switch
Support?
. . . . . . . . . . . . . . . . . . . . . . 200
Default Configurations. . . . . . . . . . . . . . . . . . 201
Method Lists
. . . . . . . . . . . . . . . . . . . . 201
Access Lines (AAA) . . . . . . . . . . . . . . . . 201
Access Lines (Non-AAA)
. . . . . . . . . . . . . . 202
Administrative Profiles . . . . . . . . . . . . . . . 202
11 Monitoring and Logging System
Information . . . . . . . . . . . . . . . . . . . . . . 205
System Monitoring Overview . . . . . . . . . . . . . . 205
What System Information Is Monitored?
Why Is System Information Needed? . . . . . . . 206
Where Are Log Messages Sent?
What Are the Severity Levels? . . . . . . . . . . . 207
What Are the System Startup and Operation
. . . . . . . . . . . . . . . . . . . . . . . . 207
Logs?
What Is the Log Message Format? . . . . . . . . . 208
What Factors Should Be Considered When
Configuring Logging?
. . . . . . . . . . . . . . . . 209
. . . . . . 205
. . . . . . . . . . 206
Default Log Settings . . . . . . . . . . . . . . . . . . . 209
Monitoring System Information and Configuring
Logging (Web)
Device Information
. . . . . . . . . . . . . . . . . . . . . . 210
. . . . . . . . . . . . . . . . . 210
System Health . . . . . . . . . . . . . . . . . . . 211
System Resources . . . . . . . . . . . . . . . . . 212
Integrated Cable Test for Copper Cables
. . . . . . 213
Optical Transceiver Diagnostics . . . . . . . . . . 214
Log Global Settings . . . . . . . . . . . . . . . . . 216
Contents 13
RAM Log . . . . . . . . . . . . . . . . . . . . . 217
Log File . . . . . . . . . . . . . . . . . . . . . . 218
Remote Log Server . . . . . . . . . . . . . . . . 218
Email Alert Global Configuration . . . . . . . . . 221
Email Alert Mail Server Configuration . . . . . . 222
Email Alert Subject Configuration
Email Alert To Address Configuration
Email Alert Statistics
. . . . . . . . . . . . . . . 226
. . . . . . . . 224
. . . . . . . 225
Monitoring System Information and Configuring
Logging (CLI)
Viewing System Information
. . . . . . . . . . . . . . . . . . . . . . 227
. . . . . . . . . . . 227
Running Cable Diagnostics . . . . . . . . . . . . 227
Configuring Local Logging . . . . . . . . . . . . 228
Configuring Remote Logging
Configuring Mail Server Settings
. . . . . . . . . . . 230
. . . . . . . . . 231
Configuring Email Alerts for Log Messages . . . 232
Logging Configuration Examples . . . . . . . . . . . 234
Configuring Local and Remote Logging
. . . . . 234
Configuring Email Alerting . . . . . . . . . . . . 235
12 Managing General System Settings . . . 239
14 Contents
System Settings Overview. . . . . . . . . . . . . . . 239
Why Does System Information Need to
Be Configured?
. . . . . . . . . . . . . . . . . . 240
What Are SDM Templates? . . . . . . . . . . . . 241
Why is the System Time Needed?
. . . . . . . . 242
How Does SNTP Work?. . . . . . . . . . . . . . 242
Default General System Information . . . . . . . . . 242
Configuring General System Settings (Web)
System Information
. . . . . . . . . . . . . . . . 243
. . . . . 243
CLI Banner . . . . . . . . . . . . . . . . . . . . . 246
SDM Template Preference
. . . . . . . . . . . . . 247
Clock . . . . . . . . . . . . . . . . . . . . . . . . 248
SNTP Global Settings . . . . . . . . . . . . . . . . 249
SNTP Authentication
. . . . . . . . . . . . . . . . 250
SNTP Server . . . . . . . . . . . . . . . . . . . . 252
Summer Time Configuration . . . . . . . . . . . . 256
Time Zone Configuration . . . . . . . . . . . . . . 257
Slot Summary . . . . . . . . . . . . . . . . . . . . 258
Supported Cards . . . . . . . . . . . . . . . . . . 259
Configuring System Settings (CLI) . . . . . . . . . . . . 260
Configuring System Information
. . . . . . . . . . 260
Configuring the Banner. . . . . . . . . . . . . . . 261
Managing the SDM Template . . . . . . . . . . . 262
Configuring SNTP Authentication and an
SNTP Server
. . . . . . . . . . . . . . . . . . . . 262
Setting the System Time and Date Manually. . . . 264
Viewing Slot Information . . . . . . . . . . . . . . 265
General System Settings Configuration Examples
Configuring System and Banner Information
Configuring SNTP
Configuring the Time Manually
. . . . . . . . . . . . . . . . . . 269
. . . . . . . . . . . 271
. . . 266
. . . 266
13 Configuring SNMP . . . . . . . . . . . . . . . . . 273
SNMP Overview . . . . . . . . . . . . . . . . . . . . . 273
What Is SNMP?
What Are SNMP Traps? . . . . . . . . . . . . . . 274
Why Is SNMP Needed?
. . . . . . . . . . . . . . . . . . . 273
. . . . . . . . . . . . . . 275
Contents 15
Default SNMP Values . . . . . . . . . . . . . . . . . 275
Configuring SNMP (Web)
SNMP Global Parameters
SNMP View Settings
Access Control Group
. . . . . . . . . . . . . . . 277
. . . . . . . . . . . . 277
. . . . . . . . . . . . . . . 278
. . . . . . . . . . . . . . 280
SNMPv3 User Security Model (USM) . . . . . . 282
Communities . . . . . . . . . . . . . . . . . . . 285
Notification Filter
. . . . . . . . . . . . . . . . . 287
Notification Recipients . . . . . . . . . . . . . . 288
Trap Flags . . . . . . . . . . . . . . . . . . . . . 291
OSPFv2 Trap Flags
. . . . . . . . . . . . . . . . 292
OSPFv3 Trap Flags . . . . . . . . . . . . . . . . 293
Trap Log . . . . . . . . . . . . . . . . . . . . . . 294
Configuring SNMP (CLI) . . . . . . . . . . . . . . . . 295
Configuring the SNMPv3 Engine ID
. . . . . . . . 295
Configuring SNMP Views, Groups, and
Users
. . . . . . . . . . . . . . . . . . . . . . . 296
Configuring Communities . . . . . . . . . . . . . 299
Configuring SNMP Notifications (Traps and
Informs)
SNMP Configuration Examples
Configuring SNMPv1 and SNMPv2
Configuring SNMPv3
. . . . . . . . . . . . . . . . . . . . . . 301
. . . . . . . . . . . . 304
. . . . . . . . 304
. . . . . . . . . . . . . . . 305
14 Managing Images and Files. . . . . . . . . . 309
16 Contents
Image and File Management Overview . . . . . . . . 309
What Files Can Be Managed?
Why Is File Management Needed?
. . . . . . . . . . 309
. . . . . . . . 311
What Methods Are Supported for File
Management?
. . . . . . . . . . . . . . . . . . . 313
What Factors Should Be Considered When
Managing Files?
. . . . . . . . . . . . . . . . . . 313
How Is the Running Configuration Saved?. . . . . 315
Managing Images and Files (Web) . . . . . . . . . . . 316
File System
. . . . . . . . . . . . . . . . . . . . . 316
Active Images . . . . . . . . . . . . . . . . . . . 317
USB Flash Drive. . . . . . . . . . . . . . . . . . . 318
File Download. . . . . . . . . . . . . . . . . . . . 319
File Upload
. . . . . . . . . . . . . . . . . . . . . 321
Copy Files . . . . . . . . . . . . . . . . . . . . . . 323
Managing Images and Files (CLI) . . . . . . . . . . . . 324
Downloading and Activating a New Image
. . . . . . . . . . . . . . . . . . . . . . . . 324
(TFTP)
Managing Files in Internal Flash . . . . . . . . . . 326
Managing Files on a USB Flash Device
(PowerConnect 8100-series switches only)
. . . . 327
Uploading a Configuration File (SCP) . . . . . . . . 327
Managing Configuration Scripts (SFTP) . . . . . . 328
File and Image Management Configuration
Examples
. . . . . . . . . . . . . . . . . . . . . . . . . 329
Upgrading the Firmware
Managing Configuration Scripts
. . . . . . . . . . . . . . 329
. . . . . . . . . . 332
Managing Files by Using the USB Flash
Drive (PowerConnect 8100-series switches only)
. 334
15 Automatically Updating the Image
and Configuration . . . . . . . . . . . . . . . . . 337
Auto Configuration Overview . . . . . . . . . . . . . . 337
What Is USB Auto Configuration?
What Files Does USB Auto Configuration
. . . . . . . . . . . . . . . . . . . . . . . . . 338
Use?
. . . . . . . . . 338
Contents 17
How Does USB Auto Configuration Use the
Files on the USB Device?
. . . . . . . . . . . . . 340
What Is the Setup File Format? . . . . . . . . . . 341
What Is the DHCP Auto Configuration
Process?
. . . . . . . . . . . . . . . . . . . . . 342
Monitoring and Completing the DHCP Auto
Configuration Process
. . . . . . . . . . . . . . 347
What Are the Dependencies for DHCP Auto
Configuration?
. . . . . . . . . . . . . . . . . . 348
Default Auto Configuration Values
. . . . . . . . . . 349
Managing Auto Configuration (Web) . . . . . . . . . 350
Auto-Install Configuration
. . . . . . . . . . . . 350
Managing Auto Configuration (CLI) . . . . . . . . . . 351
Managing Auto Configuration
Auto Configuration Example
. . . . . . . . . . 351
. . . . . . . . . . . . . . 352
Enabling DHCP Auto Configuration and Auto
Image Download . . . . . . . . . . . . . . . . . 352
16 Monitoring Switch Traffic . . . . . . . . . . . 355
Traffic Monitoring Overview. . . . . . . . . . . . . . 355
What is sFlow Technology?
What is RMON?
. . . . . . . . . . . . . . . . . . 358
What is Port Mirroring?. . . . . . . . . . . . . . 359
Why is Traffic Monitoring Needed? . . . . . . . 360
Default Traffic Monitoring Values . . . . . . . . . . . 360
Monitoring Switch Traffic (Web) . . . . . . . . . . . 361
sFlow Agent Summary
sFlow Receiver Configuration . . . . . . . . . . 362
sFlow Sampler Configuration . . . . . . . . . . . 363
. . . . . . . . . . . . 355
. . . . . . . . . . . . . . 361
18 Contents
sFlow Poll Configuration . . . . . . . . . . . . . . 364
Interface Statistics
. . . . . . . . . . . . . . . . . 365
Etherlike Statistics . . . . . . . . . . . . . . . . . 366
GVRP Statistics . . . . . . . . . . . . . . . . . . . 367
EAP Statistics
. . . . . . . . . . . . . . . . . . . . 368
Utilization Summary . . . . . . . . . . . . . . . . 369
Counter Summary. . . . . . . . . . . . . . . . . . 370
Switchport Statistics
. . . . . . . . . . . . . . . . 371
RMON Statistics . . . . . . . . . . . . . . . . . . 372
RMON History Control Statistics . . . . . . . . . . 373
RMON History Table . . . . . . . . . . . . . . . . 375
RMON Event Control . . . . . . . . . . . . . . . . 376
RMON Event Log
. . . . . . . . . . . . . . . . . . 378
RMON Alarms . . . . . . . . . . . . . . . . . . . 379
Port Statistics. . . . . . . . . . . . . . . . . . . . 381
LAG Statistics
. . . . . . . . . . . . . . . . . . . . 382
Port Mirroring. . . . . . . . . . . . . . . . . . . . 383
Monitoring Switch Traffic (CLI) . . . . . . . . . . . . . 386
Configuring sFlow
. . . . . . . . . . . . . . . . . . 386
Configuring RMON . . . . . . . . . . . . . . . . . 388
Viewing Statistics. . . . . . . . . . . . . . . . . . 390
Configuring Port Mirroring
. . . . . . . . . . . . . 391
Traffic Monitoring Configuration Examples
Configuring sFlow
Configuring RMON
. . . . . . . . . . . . . . . . . . 392
. . . . . . . . . . . . . . . . . 394
. . . . . . . 392
17 Configuring iSCSI Optimization . . . . . . . 395
iSCSI Optimization Overview . . . . . . . . . . . . . . 395
What Does iSCSI Optimization Do?
How Does the Switch Detect iSCSI Traffic
. . . . . . . . . . . . . . . . . . . . . . . . 396
Flows?
. . . . . . . . . 396
Contents 19
How Is Quality of Service Applied to iSCSI
Traffic Flows?
. . . . . . . . . . . . . . . . . . . 396
How Does iSCSI Optimization Use ACLs? . . . . 397
What Information Does the Switch Track in
iSCSI Traffic Flows?
. . . . . . . . . . . . . . . . 398
How Does iSCSI Optimization Interact With
Dell EqualLogic Arrays?
. . . . . . . . . . . . . . 399
What Occurs When iSCSI Optimization Is
Enabled or Disabled?
. . . . . . . . . . . . . . . 399
How Does iSCSI Optimization Interact with
. . . . . . . . . . . . . . . . . . . . . . . 400
DCBx?
How Does iSCSI Optimization Interact with
Dell Compellent Arrays?
. . . . . . . . . . . . . 400
iSCSI CoS and Priority Flow Control/Enhanced
Transmission Selection Interactions
. . . . . . . 401
18 Configuring Captive Portal . . . . . . . . . . 413
20 Contents
Default iSCSI Optimization Values
. . . . . . . . . . . 402
Configuring iSCSI Optimization (Web). . . . . . . . . 403
iSCSI Global Configuration
. . . . . . . . . . . . 403
iSCSI Targets Table . . . . . . . . . . . . . . . . 404
iSCSI Sessions Table . . . . . . . . . . . . . . . 405
iSCSI Sessions Detailed . . . . . . . . . . . . . 406
Configuring iSCSI Optimization (CLI)
. . . . . . . . . 407
iSCSI Optimization Configuration Examples . . . . . 409
Configuring iSCSI Optimization Between
Servers and a Disk Array
. . . . . . . . . . . . . 409
Captive Portal Overview . . . . . . . . . . . . . . . . 413
What Does Captive Portal Do?
. . . . . . . . . . 413
Is the Captive Portal Feature Dependent on
Any Other Feature?
. . . . . . . . . . . . . . . . 414
What Factors Should Be Considered When
Designing and Configuring a Captive Portal?
. . . 415
How Does Captive Portal Work? . . . . . . . . . . 416
What Captive Portal Pages Can Be
Customized?
. . . . . . . . . . . . . . . . . . . . 417
Default Captive Portal Behavior and Settings . . . . . 418
Configuring the Captive Portal (Web)
Captive Portal Global Configuration
Captive Portal Configuration
Local User
User Group
Interface Association
. . . . . . . . . . . . . . . . . . . . . 426
. . . . . . . . . . . . . . . . . . . . . 430
. . . . . . . . . . . . . . . . 432
. . . . . . . . . . 420
. . . . . . . . 420
. . . . . . . . . . . . 421
Captive Portal Global Status . . . . . . . . . . . . 433
Captive Portal Activation and Activity Status . . . 434
Interface Activation Status. . . . . . . . . . . . . 435
Interface Capability Status . . . . . . . . . . . . . 436
Client Summary . . . . . . . . . . . . . . . . . . . 437
Client Detail . . . . . . . . . . . . . . . . . . . . . 438
Captive Portal Interface Client Status
. . . . . . . 439
Captive Portal Client Status . . . . . . . . . . . . 440
Configuring Captive Portal (CLI) . . . . . . . . . . . . . 441
Configuring Global Captive Portal Settings
. . . . . 441
Creating and Configuring a Captive Portal . . . . . 442
Configuring Captive Portal Groups and Users
Managing Captive Portal Clients
. . . . . . . . . . 446
. . . 445
Captive Portal Configuration Example . . . . . . . . . 447
Configuration Overview
Detailed Configuration Procedures
. . . . . . . . . . . . . . . 448
. . . . . . . . 449
Contents 21
19 Configuring Port Characteristics. . . . . . 451
Port Overview . . . . . . . . . . . . . . . . . . . . . 451
What Physical Port Characteristics Can Be
Configured? . . . . . . . . . . . . . . . . . . . . 451
What is Link Dependency? . . . . . . . . . . . . 452
What Interface Types are Supported? . . . . . . 454
What is Interface Configuration Mode? . . . . . 454
Default Port Values. . . . . . . . . . . . . . . . . . . 456
Configuring Port Characteristics (Web)
Port Configuration
. . . . . . . . . . . . . . . . . 457
Link Dependency Configuration
. . . . . . . . 457
. . . . . . . . . 460
Link Dependency Summary . . . . . . . . . . . . 462
Configuring Port Characteristics (CLI). . . . . . . . . 463
Configuring Port Settings
. . . . . . . . . . . . . 463
Configuring Link Dependencies . . . . . . . . . 464
Port Configuration Examples . . . . . . . . . . . . . 466
Configuring Port Settings
. . . . . . . . . . . . . 466
Configuring a Link Dependency Groups . . . . . 467
20 Configuring Port and System
Security . . . . . . . . . . . . . . . . . . . . . . . . . 469
IEEE 802.1X . . . . . . . . . . . . . . . . . . . . . . . 470
What is IEEE 802.1X?
What are the 802.1X Port States?. . . . . . . . . 471
What is MAC-Based 802.1X Authentication?
What is the Role of 802.1X in VLAN
Assignment?
What is Monitor Mode?
. . . . . . . . . . . . . . . 470
. . . . . . . . . . . . . . . . . . . 473
. . . . . . . . . . . . . . 475
. . . 472
22 Contents
How Does the Authentication Server Assign
DiffServ Filters?
. . . . . . . . . . . . . . . . . . . 477
What is the Internal Authentication Server?. . . . 477
Default 802.1X Values
. . . . . . . . . . . . . . . . 478
Configuring IEEE 802.1X (Web) . . . . . . . . . . . 479
Configuring IEEE 802.1X (CLI) . . . . . . . . . . . . 488
Configuring Internal Authentication Server
. . . . . . . . . . . . . . . . . . . . . . . . 493
Users
IEEE 802.1X Configuration Examples . . . . . . . . 493
Port Security (Port-MAC Locking)
Default 802.1X Values
Configuring Port Security (CLI)
Denial of Service
. . . . . . . . . . . . . . . . . . . . 511
. . . . . . . . . . . . 507
. . . . . . . . . . . . . . . . 507
. . . . . . . . . . . 510
21 Configuring Access Control Lists . . . . . 513
ACL Overview . . . . . . . . . . . . . . . . . . . . . . 513
What Are MAC ACLs?
What Are IP ACLs? . . . . . . . . . . . . . . . . . 515
What Is the ACL Redirect Function?
What Is the ACL Mirror Function? . . . . . . . . . 515
What Is ACL Logging . . . . . . . . . . . . . . . . 516
What Are Time-Based ACLs?
What Are the ACL Limitations?. . . . . . . . . . . 517
How Are ACLs Configured?
Preventing False ACL Matches
Configuring ACLs (Web)
IP ACL Configuration
IP ACL Rule Configuration
MAC ACL Configuration . . . . . . . . . . . . . . 524
MAC ACL Rule Configuration. . . . . . . . . . . . 526
IPv6 ACL Configuration . . . . . . . . . . . . . . . 527
. . . . . . . . . . . . . . . 514
. . . . . . . . 515
. . . . . . . . . . . . 516
. . . . . . . . . . . . . 518
. . . . . . . . . . . 518
. . . . . . . . . . . . . . . . . 520
. . . . . . . . . . . . . . . . 520
. . . . . . . . . . . . . 522
Contents 23
IPv6 ACL Rule Configuration . . . . . . . . . . . 528
ACL Binding Configuration . . . . . . . . . . . . 530
Time Range Entry Configuration . . . . . . . . . 531
Configuring ACLs (CLI)
Configuring an IPv4 ACL
Configuring a MAC ACL
. . . . . . . . . . . . . . . . . 533
. . . . . . . . . . . . . 533
. . . . . . . . . . . . . . 535
Configuring an IPv6 ACL . . . . . . . . . . . . . 537
Configuring a Time Range. . . . . . . . . . . . . 539
ACL Configuration Examples. . . . . . . . . . . . . . 541
Configuring an IP ACL
. . . . . . . . . . . . . . . 541
Configuring a MAC ACL . . . . . . . . . . . . . . 543
Configuring a Time-Based ACL
Configuring a Management Access List
. . . . . . . . . . 545
. . . . . 546
22 Configuring VLANs. . . . . . . . . . . . . . . . . 551
VLAN Overview . . . . . . . . . . . . . . . . . . . . 551
Switchport Modes
VLAN Tagging . . . . . . . . . . . . . . . . . . . 555
. . . . . . . . . . . . . . . . . . . . . . . 556
GVRP
Double-VLAN Tagging . . . . . . . . . . . . . . 556
Voice VLAN . . . . . . . . . . . . . . . . . . . . 557
Private VLANs
Additional VLAN Features . . . . . . . . . . . . 565
. . . . . . . . . . . . . . . . 554
. . . . . . . . . . . . . . . . . . . 560
24 Contents
Default VLAN Behavior . . . . . . . . . . . . . . . . 566
Configuring VLANs (Web)
VLAN Membership
VLAN Port Settings
VLAN LAG Settings
Bind MAC to VLAN
Bind IP Subnet to VLAN
. . . . . . . . . . . . . . . 568
. . . . . . . . . . . . . . . . 568
. . . . . . . . . . . . . . . . 573
. . . . . . . . . . . . . . . . 574
. . . . . . . . . . . . . . . . 576
. . . . . . . . . . . . . . 577
GVRP Parameters. . . . . . . . . . . . . . . . . . 579
Protocol Group
Adding a Protocol Group
. . . . . . . . . . . . . . . . . . . 581
. . . . . . . . . . . . . . 582
Double VLAN Global Configuration. . . . . . . . . 584
Double VLAN Interface Configuration . . . . . . . 585
Voice VLAN
. . . . . . . . . . . . . . . . . . . . . 587
Configuring VLANs (CLI) . . . . . . . . . . . . . . . . . 588
Creating a VLAN
. . . . . . . . . . . . . . . . . . 588
Configuring a Port in Access Mode . . . . . . . . 588
Configuring a Port in Trunk Mode
. . . . . . . . . 589
Configuring a Port in General Mode . . . . . . . . 592
Configuring VLAN Settings for a LAG . . . . . . . 593
Configuring Double VLAN Tagging . . . . . . . . . 595
Configuring MAC-Based VLANs . . . . . . . . . . 596
Configuring IP-Based VLANs
. . . . . . . . . . . . 597
Configuring a Protocol-Based VLAN . . . . . . . . 597
Configuring GVRP. . . . . . . . . . . . . . . . . . 599
Configuring Voice VLANs
. . . . . . . . . . . . . . 601
VLAN Configuration Examples
. . . . . . . . . . . . . 602
Configuring VLANs Using Dell OpenManage
Administrator . . . . . . . . . . . . . . . . . . . . 605
Configure the VLANs and Ports on Switch 2
Configuring VLANs Using the CLI
. . . . . . . . . . 610
Configuring a Voice VLAN . . . . . . . . . . . . . 614
23 Configuring the Spanning Tree
Protocol . . . . . . . . . . . . . . . . . . . . . . . . 619
STP Overview . . . . . . . . . . . . . . . . . . . . . . 619
What Are Classic STP, Multiple STP, and
Rapid STP?
How Does STP Work?
How Does MSTP Operate in the Network? . . . . 621
. . . . . . . . . . . . . . . . . . . . . 619
. . . . . . . . . . . . . . . 620
Contents 25
. . . . 609
MSTP with Multiple Forwarding Paths . . . . . . 625
What are the Optional STP Features?
. . . . . . 626
Default STP Values. . . . . . . . . . . . . . . . . . . 629
Configuring Spanning Tree (Web) . . . . . . . . . . . 630
STP Global Settings
. . . . . . . . . . . . . . . . 630
STP Port Settings . . . . . . . . . . . . . . . . . 632
STP LAG Settings . . . . . . . . . . . . . . . . . 634
Rapid Spanning Tree
MSTP Settings
MSTP Interface Settings
. . . . . . . . . . . . . . . 635
. . . . . . . . . . . . . . . . . . 638
. . . . . . . . . . . . . 640
Configuring Spanning Tree (CLI). . . . . . . . . . . . 642
Configuring Global STP Bridge Settings
. . . . . 642
Configuring Optional STP Features . . . . . . . . 643
Configuring STP Interface Settings
. . . . . . . . 644
Configuring MSTP Switch Settings . . . . . . . . 645
Configuring MSTP Interface Settings . . . . . . 646
24 Discovering Network Devices . . . . . . . . 651
26 Contents
STP Configuration Examples
Configuring STP
Configuring MSTP
. . . . . . . . . . . . . . 647
. . . . . . . . . . . . . . . . . . 647
. . . . . . . . . . . . . . . . . 649
Device Discovery Overview . . . . . . . . . . . . . . 651
What Is ISDP?
What is LLDP?
. . . . . . . . . . . . . . . . . . . 651
. . . . . . . . . . . . . . . . . . . 651
What is LLDP-MED? . . . . . . . . . . . . . . . 652
Why are Device Discovery Protocols
Needed?
. . . . . . . . . . . . . . . . . . . . . . 652
Default IDSP and LLDP Values . . . . . . . . . . . . . 653
Configuring ISDP and LLDP (Web)
ISDP Global Configuration
ISDP Cache Table
. . . . . . . . . . . . . . . . . . 656
. . . . . . . . . . . . 655
. . . . . . . . . . . . . 655
ISDP Interface Configuration. . . . . . . . . . . . 657
ISDP Statistics . . . . . . . . . . . . . . . . . . . 659
LLDP Configuration
. . . . . . . . . . . . . . . . . 660
LLDP Statistics . . . . . . . . . . . . . . . . . . . 662
LLDP Connections . . . . . . . . . . . . . . . . . 663
LLDP-MED Global Configuration
. . . . . . . . . . 665
LLDP-MED Interface Configuration . . . . . . . . 666
LLDP-MED Local Device Information . . . . . . . 668
LLDP-MED Remote Device Information
. . . . . . 669
Configuring ISDP and LLDP (CLI) . . . . . . . . . . . . 670
Configuring Global ISDP Settings
. . . . . . . . . 670
Enabling ISDP on a Port . . . . . . . . . . . . . . 671
Viewing and Clearing ISDP Information . . . . . . 671
Configuring Global LLDP Settings . . . . . . . . . 672
Configuring Port-based LLDP Settings . . . . . . . 672
Viewing and Clearing LLDP Information . . . . . . 673
Configuring LLDP-MED Settings
Viewing LLDP-MED Information
. . . . . . . . . . 674
. . . . . . . . . . 675
Device Discovery Configuration Examples . . . . . . . 675
Configuring ISDP
Configuring LLDP
. . . . . . . . . . . . . . . . . . 675
. . . . . . . . . . . . . . . . . . 676
25 Configuring Port-Based Traffic
Control . . . . . . . . . . . . . . . . . . . . . . . . . 679
Port-Based Traffic Control Overview . . . . . . . . . . 679
What is Flow Control?
What is Storm Control?
. . . . . . . . . . . . . . . 680
. . . . . . . . . . . . . . . 680
Contents 27
What are Protected Ports? . . . . . . . . . . . . 681
What is Link Local Protocol Filtering? . . . . . . 681
Default Port-Based Traffic Control Values . . . . . . 682
Configuring Port-Based Traffic Control (Web)
Flow Control (Global Port Parameters)
Storm Control
Protected Port Configuration
. . . . . . . . . . . . . . . . . . . 684
. . . . . . . . . . . 686
. . . . 683
. . . . . . 683
LLPF Configuration . . . . . . . . . . . . . . . . 688
Configuring Port-Based Traffic Control (CLI) . . . . . 690
Configuring Flow Control and Storm Control
. . . 690
Configuring Protected Ports . . . . . . . . . . . 691
Configuring LLPF . . . . . . . . . . . . . . . . . 692
Port-Based Traffic Control Configuration
Example
. . . . . . . . . . . . . . . . . . . . . . . . 693
26 Configuring L2 Multicast Features . . . . 695
L2 Multicast Overview . . . . . . . . . . . . . . . . . 695
What Are the Multicast Bridging Features?
What Is L2 Multicast Traffic? . . . . . . . . . . . 696
What Is IGMP Snooping?
. . . . . . . . . . . . . 697
What Is MLD Snooping? . . . . . . . . . . . . . 699
What Is Multicast VLAN Registration?
When Are L3 Multicast Features Required?
What Are GARP and GMRP? . . . . . . . . . . . 702
. . . 695
. . . . . . 700
. . . 701
28 Contents
Snooping Switch Restrictions. . . . . . . . . . . . . 703
Partial IGMPv3 and MLDv2 Support
. . . . . . . 703
MAC Address-Based Multicast Group . . . . . . 703
IGMP/MLD Snooping in a Multicast Router . . . 703
Topologies Where the Multicast Source Is
Not Directly Connected to the Querier
. . . . . . . 704
Using Static Multicast MAC Configuration. . . . . 704
IGMP Snooping and GMRP
. . . . . . . . . . . . . 704
Default L2 Multicast Values
. . . . . . . . . . . . . . . 705
Configuring L2 Multicast Features (Web) . . . . . . . . 707
Multicast Global Parameters
. . . . . . . . . . . . 707
Bridge Multicast Group . . . . . . . . . . . . . . . 708
MRouter Status. . . . . . . . . . . . . . . . . . . 711
General IGMP Snooping . . . . . . . . . . . . . . 712
Global Querier Configuration . . . . . . . . . . . . 715
VLAN Querier . . . . . . . . . . . . . . . . . . . . 716
VLAN Querier Status
. . . . . . . . . . . . . . . . 719
MFDB IGMP Snooping Table . . . . . . . . . . . . 720
MLD Snooping General. . . . . . . . . . . . . . . 721
MLD Snooping Global Querier Configuration
MLD Snooping VLAN Querier
. . . . . . . . . . . 724
. . . 723
MLD Snooping VLAN Querier Status . . . . . . . . 727
MFDB MLD Snooping Table . . . . . . . . . . . . 728
MVR Global Configuration
. . . . . . . . . . . . . 729
MVR Members . . . . . . . . . . . . . . . . . . . 730
MVR Interface Configuration . . . . . . . . . . . . 731
MVR Statistics . . . . . . . . . . . . . . . . . . . 734
GARP Timers . . . . . . . . . . . . . . . . . . . . 735
GMRP Parameters
MFDB GMRP Table
. . . . . . . . . . . . . . . . . 737
. . . . . . . . . . . . . . . . . 739
Configuring L2 Multicast Features (CLI)
Configuring Layer 2 Multicasting
Configuring IGMP Snooping on VLANs
. . . . . . . . . 740
. . . . . . . . . . 740
. . . . . . 741
Configuring IGMP Snooping Querier . . . . . . . . 742
Configuring MLD Snooping on VLANs . . . . . . . 743
Configuring MLD Snooping Querier
. . . . . . . . 744
Configuring MVR . . . . . . . . . . . . . . . . . . 745
Contents 29
Configuring GARP Timers and GMRP. . . . . . . 747
Case Study on a Real-World Network Topology
Multicast Snooping Case Study
. . . . . . . . . 748
. . . 748
27 Snooping and Inspecting Traffic . . . . . . 753
Traffic Snooping and Inspection Overview . . . . . . 753
What Is DHCP Snooping?
How Is the DHCP Snooping Bindings
Database Populated?
What Is IP Source Guard? . . . . . . . . . . . . 757
What is Dynamic ARP Inspection?
Why Is Traffic Snooping and Inspection
Necessary?
. . . . . . . . . . . . . . . . . . . . 759
Default Traffic Snooping and Inspection Values . . . 759
Configuring Traffic Snooping and Inspection
(Web)
. . . . . . . . . . . . . . . . . . . . . . . . . . 761
DHCP Snooping Configuration
DHCP Snooping Interface Configuration . . . . . 762
DHCP Snooping VLAN Configuration . . . . . . . 764
DHCP Snooping Persistent Configuration
DHCP Snooping Static Bindings
Configuration
. . . . . . . . . . . . . . . . . . . 767
DHCP Snooping Dynamic Bindings
Summary
. . . . . . . . . . . . . . . . . . . . . 769
DHCP Snooping Statistics
IPSG Interface Configuration . . . . . . . . . . . 771
IPSG Binding Configuration
IPSG Binding Summary . . . . . . . . . . . . . . 773
DAI Global Configuration . . . . . . . . . . . . . 774
DAI Interface Configuration
DAI VLAN Configuration . . . . . . . . . . . . . 777
DAI ACL Configuration . . . . . . . . . . . . . . 778
. . . . . . . . . . . . . 754
. . . . . . . . . . . . . . . 755
. . . . . . . . 758
. . . . . . . . . . 761
. . . . 766
. . . . . . . . . . . . 770
. . . . . . . . . . . . 772
. . . . . . . . . . . 775
30 Contents