M5300, M6100, and M7100 Series
ProSAFE Managed Switches
Software Administration Manual
Software Version 11.0.0
November 2015
202-11527-02
350 East Plumeria Drive
San Jose, CA 95134
USA
Managed Switches
Support
Thank you for purchasing this NETGEAR product. You can visit www.netgear.com/support to register your product, get help,
access the latest downloads and user manuals, and join our community. We recommend that you use only official NETGEAR
support r
esources.
Conformity
For the current EU Declaration of Conformity, visit http://kb.netgear.com/app/answers/detail/a_id/11621.
Compliance
For regulatory compliance information, visit http://www.netgear.com/about/regulatory.
See the regulatory compliance document before connecting the power supply.
202-11527-02October 2015Made minor changes to the following chapters:
202-11527-01March 2015Added the following chapters:
202-11460-01October 2014Added the following chapters:
Publication
Date
Comments
• Chapter 4, MLAGs
• Chapter 10, PBR
• Chapter 24, Switch Stacks
• Chapter 39, Override Factory Defaults
Added the following sections:
• VLAN Access Ports and Trunk Ports
• Find a Rogue DHCP Server
• Use the Authentication Manager to Set Up an Authentication Method List
• Configure a Stateful DHCPv6 Server
• Configure PVSTP and PVRSTP
• Create a 6to4 Tunnel
Made changes and minor additions to various commands.
• Chapter 9, BGP
• Chapter 10, PBR
• Chapter 40, NETGEAR SFP
Added the following sections:
• Full Memory Dump
Replaced the Switch Stack chapter with Chapter 23, Chassis Switch
Management.
Updated most of the rest of the manual.
2
Managed Switches
202-11331-01September 2013 Added the following chapters:
• Chapter 4, MLAGs
• Chapter 19, MAB
Added or revised the following sections:
• Configure GARP VLAN Registration Protocol
• Configure a Management ACL
• Authorization and Accounting
• Auto VoIP
• Remote SPAN
202-11161-01February 2013Updated the document.
October 2012Added iSCSI features.
202-11153-01August 2012Added Private VLAN features.
202-10515-05August 2012Added the MVR feature.
202-10515-05July 2011Added DHCPv6 and DHCPv6 mode features.
202-10515-04November 2010 Converted the book to a new format.
202-10515-03June 2010Moved some content to the Software Setup Guide.
202-10515-02Software release 8.0.2: new firmware with DHCP L3 Relay, color conform
policy
, DHCP server in dynamic mode, and configuring a stacking port as an
Before installation, read the release notes for your switch. The release notes detail the
platform-specific functionality of the switching, routing, SNMP, configuration, management, and
other packages. In addition, see the following publications:
•The NETGEAR installation guide for your switch
•Managed Switch Hardware Installation Guide
•Managed Switch Software Setup Manual
•ProSAFE Managed Switch Command Line Interface (CLI) User Manual
•ProSAFE Managed Switch W
Note: For more information about the topics covered in this manual, visit the
support website at http://support.netgear.com.
eb Management User Manual
1
Note: Firmware updates with new features and bug fixes are made
available from time to time on downloadcenter.netgear.com. Some
products can regularly check the site and download new firmware, or
you can check for and download new firmware manually. If the
features or behavior of your product do not match what is described in
this guide, you might need to update your firmware.
•Configure Private-VLAN Port Mode (Promiscuous, Host)
•Configure Private-VLAN Host Ports
•Map Private-VLAN Promiscuous Port
•VLAN Access Ports and Trunk Ports
2
20
Managed Switches
VLAN Concepts
Adding virtual LAN (VLAN) support to a Layer 2 switch offers some of the benefits of both
bridging and routing. Like a bridge, a VLAN switch forwards traffic based on the Layer 2
header, which is fast. Like a router, it partitions the network into logical segments, which
provides better administration, security, and management of multicast traffic.
A VLAN is a set of end stations and the switch ports that connect them. You can have
different reasons for the logical division, such as department or project membership. The only
physical requirement is that the end station and the port to which it is connected both belong
to the same VLAN.
Each VLAN in a network has an associated VLAN ID, which appears in the IEEE 802.1Q tag
in the Layer 2 header of packets transmitted on a VLAN. An end station might omit the tag, or
the VLAN portion of the tag, in which case the first switch port to receive the packet can
either reject it or insert a tag using its default VLAN ID. A given port can handle traf
more than one VLAN, but it can support only one default VLAN ID.
The Private Edge VLAN feature lets you set protection between ports located on the switch.
This means that a protected port cannot forward traf
switch. The feature does not provide protection between ports located on dif
fic to another protected port on the same
ferent switches.
fic for
The diagram in this section shows a switch with four ports configured to handle the traffic for
two VLANs. Port 1/0/2 handles traffic for both VLANs, while port 1/0/1 is a member of VLAN
2 only, and ports 1/0/3 and 1/0/4 are members of VLAN 3 only
. The script following the
diagram shows the commands you would use to configure the switch as shown in the
diagram.
Layer 3 switch
Port 1/0/2 VLAN
Router Port 1/3/1
192.150.3.1
Port 1/0/1
Layer 2
Switch
VLAN 10VLAN 20
Port 1/0/3 VLAN
Router Port 1/3/2
192.150.4.1
Layer 2
Switch
Figure 1. Switch with 4 ports configured for traffic from 2 VLANs
The following examples show how to create VLANs, assign ports to the VLANs, and assign a
VLAN as the default VLAN to a port.
VLANs
21
Managed Switches
Create Two VLANs
The example is shown as CLI commands and as a web interface procedure.
CLI: Create Two VLANs
Use the following commands to create two VLANs and to assign the VLAN IDs while leaving
the names blank.
a. Select Switching > VLAN > Basic > VLAN Configuration.
A screen similar to the following displays.
b. Enter the following information:
•In the VLAN ID field, enter 2.
•In the VLAN Name field, enter VLAN2.
•In the VLAN Type list, select
Static.
c. Click Add.
2. Create VLAN3.
a. Select Switching > VLAN > Basic > VLAN Configuration.
VLANs
22
Managed Switches
A screen similar to the following displays.
b. Enter the following information:
•In the VLAN ID field, enter 3.
•In the VLAN Name field, enter VLAN3.
•In the VLAN Type list, select
Static.
c. Click Add.
Assign Ports to VLAN 2
This sequence shows how to assign ports to VLAN2, and to specify that frames will always
be transmitted tagged from all member ports and that untagged frames will be rejected on
receipt.
CLI: Assign Ports to VLAN 2
(Netgear Switch) #config
(Netgear Switch) (Config)#interface range 1/0/1-1/0/2
(Netgear Switch) (conf-if-range-1/0/1-1/0/2)#vlan participation include 2
(Netgear Switch) (conf-if-range-1/0/1-1/0/2)#vlan acceptframe vlanonly
(Netgear Switch) (conf-if-range-1/0/1-1/0/2)#vlan pvid 2
(Netgear Switch) (conf-if-range-1/0/1-1/0/2)#exit
(Netgear Switch) (Config)#vlan port tagging all 2
(Netgear Switch) (Config)#
VLANs
23
Managed Switches
Web Interface: Assign Ports to VLAN 2
1. Assign ports to VLAN2.
a. Select Switching > VLAN > Advanced > VLAN Membership.
A screen similar to the following displays.
b. In the VLAN ID list, select 2.
c. Click Unit 1. The ports display.
d. Click the gray boxes under ports 1 and
2 until T displays.
The T specifies that the egress packet is tagged for the ports.
e. Click Apply to save the settings.
2. Specify that only tagged frames will be accepted on ports 1/0/1 and 1/0/2.
a. Select Switching > VLAN >
A screen similar to the following displays.
b. Under PVID Configuration, scroll down and select the check box for Interface 1/0/1.
Advanced > Port PVID Configuration.
Then scroll down and select the Interface 1/0/2 check box.
VLANs
24
Managed Switches
c. Enter the following information:
•In the Acceptable Frame Type polyhedron list, select VLAN Only.
•In the
d. Click Apply to save the settings.
PVID (1 to 4093) field, enter 2.
Create Three VLANs
The example is shown as CLI commands and as a web interface procedure.
CLI: Create Three VLANs
Use the following commands to create three VLANs and to assign the VLAN IDs while
leaving the names blank.
a. Select Switching > VLAN > Basic > VLAN Configuration.
A screen similar to the following displays.
b. Enter the following information:
•In the VLAN ID field, enter 100.
•In the VLAN Name field, enter VLAN100.
c. Click Add.
VLANs
25
Managed Switches
2. Create VLAN101.
a. Select Switching > VLAN > Basic > VLAN Configuration.
A screen similar to the following displays.
b. Enter the following information:
•In the VLAN ID field, enter 101.
•In the VLAN Name field, enter VLAN101.
c. Click Add.
3. Create VLAN102.
a. Select Switching > VLAN > Basic > VLAN Configuration.
A screen similar to the following displays.
b. Enter the following information:
•In the VLAN ID field, enter 102.
•In the VLAN Name field, enter VLAN102.
c. Click Add.
VLANs
26
Managed Switches
Assign Ports to VLAN 3
This example shows how to assign the ports that will belong to VLAN 3, and to specify that
untagged frames will be accepted on port 1/0/4. Note that port 1/0/2 belongs to both VLANs
and that port 1/0/1 can never belong to VLAN 3.
2. Under PVID Configuration, scroll down and select the Interface 1/0/2 check box. Now 1/0/2
appears in the Interface field at the top.
3. In the PVID (1 to 4093) field, enter 3.
4. Click Apply to save the settings.
Create a MAC-Based VLAN
The MAC-based VLAN feature allows incoming untagged packets to be assigned to a VLAN
and thus classify traffic based on the source MAC address of the packet.
You define a MAC to VLAN mapping by configuring an entry in the MAC to VLAN table. An
entry is specified using a source MAC address and the appropriate VLAN ID. The MAC to
VLAN configurations are shared across all ports of the device (i.e., there is a system-wide
table that has MAC address to VLAN ID mappings).
When untagged or priority tagged packets arrive at the switch and entries exist in the MAC to
VLAN table, the source MAC address of the packet is looked up. If an entry is found, the
corresponding VLAN ID is assigned to the packet. If the packet is already priority tagged it
will maintain this value; otherwise, the priority will be set to 0 (zero).
verified against the VLAN table. If the VLAN is valid, ingress processing on the packet
continues; otherwise, the packet is dropped. This implies that you can configure a MAC
address mapping to a VLAN that has not been created on the system.
(Netgear Switch)(Config)#exit
(Netgear Switch)#vlan data
(Netgear Switch)(Vlan)#vlan association mac 00:00:00A:00:00:02 3
(Netgear Switch)(Vlan)#exit
4. Add all the ports to VLAN3.
(Netgear Switch)#config
(Netgear Switch)(Config)#interface range 1/0/1-1/0/28
(Netgear Switch)(conf-if-range-1/0/1-1/0/28)#vlan participation include 3
(Netgear Switch)(conf-if-range-1/0/1-1/0/28)#exit
(Netgear Switch)(Config)#exit
VLANs
30
Managed Switches
Web Interface: Assign a MAC-Based VLAN
1. Create VLAN3.
a. Select Switching > VLAN > Basic > VLAN Configuration.
A screen similar to the following displays.
b. Enter the following information:
•In the VLAN ID field, enter 3.
•In the VLAN Name field, enter VLAN3.
•In the VLAN Type list, select
c. Click Add.
2. Assign ports to VLAN3.
a. Select Switching > VLAN >
A screen similar to the following displays.
Static.
Advanced > VLAN Membership.
b. In the VLAN ID list, select 3.
c. Click Unit 1. The ports display.
VLANs
31
Managed Switches
d. Click the gray box before Unit 1 until U displays.
e. Click Apply.
3. Assign
VPID3 to
port 1/0/23.
a. Select Switching > VLAN > Advanced > Port PVID Configuration.
A screen similar to the following displays.
b. Scroll down and select the 1/0/23 check box.
c. In the PVID (1 to 4093) field, enter 3.
d. Click Apply to save the settings.
4. Map the specific MAC to VLAN3.
a. Select Switching > VLAN >
Advanced > MAC based VLAN.
A screen similar to the following displays.
b. Enter the following information:
•In the MAC Address field, enter 00:00:0A:00:00:02.
•In the PVID (1 to 4093) field, enter 3.
c. Click Add.
VLANs
32
Managed Switches
Create a Protocol-Based VLAN
Create two protocol VLAN groups. One is for IPX and the other is for IP/ARP. The untagged
IPX packets are assigned to VLAN 4, and the untagged IP/ARP packets are assigned to
VLAN 5.
CLI: Create a Protocol-Based VLAN
1. Create a VLAN protocol group vlan_ipx based on IPX protocol.
(Netgear Switch)#config
(Netgear Switch)(Config)#vlan protocol group 1
(Netgear Switch)(Config)#vlan protocol group name 1 "vlan_ipx"
(Netgear Switch)(Config)#vlan protocol group add protocol 1 ethertype ipx
2. Create a VLAN protocol group vlan_ipx based on IP/ARP protocol.
(Netgear Switch)(Config)#vlan protocol group 2
(Netgear Switch)(Config)#vlan protocol group name 2 "vlan_ip"
(Netgear Switch)(Config)#vlan protocol group add protocol 2 ethertype ip
(Netgear Switch)(Config)#vlan protocol group add protocol 2 ethertype arp
(Netgear Switch)(Config)#exit
In the VLAN ID field, enter 4.
In the VLAN Name field, enter VLAN4.
In the VLAN T
c. Click Add.
Create VLAN5.
a. Select Switching > VLAN > Basic > VLAN Configuration.
A screen similar to the following displays.
ype list, select
Static.
VLANs
34
Managed Switches
b. Enter the following information:
In the VLAN ID field, enter 5.
In the VLAN Name field, enter VLAN5.
In the VLAN T
ype list, select
Static.
c. Click Add.
2. Create the protocol-based VLAN group vlan_ipx.
a. Select Switching > VLAN >
Advanced > Protocol Based VLAN Group
Configuration.
A screen similar to the following displays.
Enter the following information:
•In the Group ID field, enter 1.
•In the Group Name field, enter vlan_ipx.
•In the Protocol list, enter ipx.
•In the VLAN ID field, enter 4.
b. Click Add.
3. Create the protocol-based VLAN group vlan_ip.
a. Select Switching > VLAN >Advanced > Protocol Based VLAN Group
Configuration.
VLANs
35
Managed Switches
A screen similar to the following displays.
b. Enter the following information:
•In the Group ID field, enter 2.
•In the Group Name field, enter vlan_ip.
•In the Protocol list, select IP and ARP while holding down the Ctrl key.
•In the VLAN
field, enter 5.
c. Click Add.
4. Add port 1
1 to the group vlan_ipx.
a. Select Switching > VLAN > Advanced > Protocol Based VLAN Group
Membership.
A screen similar to the following displays.
b. In the Group ID list, select 1.
c. Click the gray box under port 11. A check mark displays in the box.
d. Click the Apply button.
VLANs
36
Managed Switches
5. Add port 11 to the group vlan_ip.
a. Select Switching > VLAN > Advanced > Protocol Based VLAN Group
Membership.
A screen similar to the following displays.
b. In the Group ID list, select 2.
c. Click the gray box under port 11. A check mark displays in the box.
d. Click Apply.
Virtual VLANs: Create an IP Subnet–Based VLAN
In an IP subnet–based VLAN, all the end workstations in an IP subnet are assigned to the
same VLAN. In this VLAN, users can move their workstations without reconfiguring their
network addresses. IP subnet VLANs are based on Layer 3 information from packet headers.
The switch makes use of the network-layer address (for example, the subnet address for
TCP/IP networks) in determining VLAN membership. If a packet is untagged or priority
tagged, the switch associates the packet with any matching IP subnet classification. If no IP
subnet classification can be made, the packet is subjected to the normal VLAN classification
rules of the switch. This IP subnet capability does not imply a routing function or that the
VLAN is routed. The IP subnet classification feature affects only the VLAN assignment of a
packet. Appropriate 802.1Q VLAN configuration must exist in order for the packet to be
switched.
a. Select Switching > VLAN > Basic > VLAN Configuration.
A screen similar to the following displays.
b. Enter the following information:
•In the VLAN ID field, enter 2000.
•In the VLAN Type list, select Static.
c. Click Add.
2. Assign all the ports to VLAN 2000.
a. Select Switching > VLAN >
A screen similar to the following displays.
Advanced > VLAN Membership.
b. In the VLAN ID list, select 2000.
c. Click Unit 1. The ports display.
d. Click the gray box before Unit 1 until U
VLANs
39
displays.
Managed Switches
e. Click Apply.
3. Associate the IP subnet with VLAN 2000.
a. Select Switching > VLAN >
A screen similar to the following displays.
Advanced > IP Subnet Based VLAN.
b. Enter the following information:
•In the IP Address field, enter 10.100.0.0.
•In the Subnet Mask field, enter 255.255.0.0.
•In the VLAN (1 to 4093) field, enter 2000.
c. Click Add.
Voice VLANs
The voice VLAN feature enables switch ports to carry voice traffic with defined priority to
enable separation of voice and data traffic coming onto port. Voice VLAN ensures that the
sound quality of an IP phone does not deteriorate when the data traffic on the port is high.
Also, the inherent isolation provided by VLANs ensures that inter-VLAN traffic is under
management control and that clients attached to the network cannot initiate a direct attack on
voice components.
Note: For more information about voice VLANs, seeAuto VoIP on page 305.
VLANs
40
PBX
Managed Switches
1/0/1
GSM73xxS
1/0/2
VoIP
phone
PC
1/0/3
VoIP
phone
PC
Voice traffic
Data traffic
Figure 3. Voice VLAN
The script in this section shows how to configure Voice VLAN and prioritize the voice traffic.
Here the Voice VLAN mode is in VLAN ID 10.
CLI: Configure Voice VLAN and Prioritize Voice Traffic
b. For Admin Mode, select the Enable radio button.
c. Click Apply.
4. Configure V
oice VLAN mode in the interface 1/0/2.
a. Select Switching > VLAN > Advanced > Voice VLAN Configuration.
b. Select the
1/0/2 check box.
c. In the Interface Mode list, select VLAN ID.
d. In the V
alue field, enter
10.
A screen similar to the following displays.
e. Click Apply.
VLANs
44
Managed Switches
5. Create the DiffServ class ClassVoiceVLAN.
a. Select QoS > Advanced > DiffServ > Class Configuration.
A screen similar to the following displays.
b. In the Class Name field, enter ClassVoiceVLAN.
c. In the Class Type list, select All.
d. Click Add
. The Class Name screen displays, as shown in the next step in this
procedure.
6. Configure matching criteria for the class as VLAN 10.
a. Select
QoS > DiffServ > Advanced > Class Configuration.
A screen similar to the following displays.
b. Click the class ClassVoiceVLAN.
c. In the DiffServ Class Configuration table, select VLAN.
d. In the VLAN ID field, enter 10.
VLANs
45
Managed Switches
A screen similar to the following displays.
e. Click Apply.
7. Create the DiffServ policy PolicyVoiceVLAN.
a. Select
QoS > DiffServ > Advanced > Policy Configuration.
A screen similar to the following displays.
b. In the Policy Name field, enter PolicyVoiceVLAN.
c. In the Policy Type list, select In.
d. In the
e. Click Add
Member Class list, select ClassVoiceVLAN.
.
The Policy Configuration screen displays, as shown in the next step in this procedure.
8. Map the policy and class and assign them to the higher-priority queue.
a. Select QoS > DiffServ >
Advanced > Policy Configuration.
VLANs
46
Managed Switches
A screen similar to the following displays.
b. Click the Policy PolicyVoiceVLAN.
A screen similar to the following displays.
c. In the field next to the Assign Queue radio button, select 3.
d. Click Apply.
9. Assign it to interfaces 1/0/1 and 1/0/2.
a. Select QoS > DiffServ >
Advanced > Service Interface Configuration.
VLANs
47
Managed Switches
A screen similar to the following displays.
b. Select the check boxes for Interfaces 1/0/1 and 1/0/2.
c. Set the Policy Name field as PolicyVoiceVLAN.
d. Click Apply.
Configure GARP VLAN Registration Protocol
Generic Attribute Registration Protocol (GARP) VLAN Registration Protocol (GVRP) provides
IEEE 802.1Q-compliant VLAN pruning and dynamic VLAN creation on 802.1Q-tagged ports.
With GVRP, a switch can exchange VLAN configuration information with other GVRP
switches, prune unnecessary broadcast and unknown unicast traffic, and create and manage
VLANs dynamically on switches that are connected through 802.1Q-tagged ports.
1/0/24 Tagged
1/0/11
GVRP Switch A
Figure 4. GVRP configuration
GVRP Switch B
VLANs
48
Managed Switches
CLI: Enable GVRP
1. On Switch A, create VLANs 1000, 2000, and 3000, and add port 1/0/24 as a tagged port
b. Next to GVRP Mode, select the Enable radio button.
c. Click Apply.
2. Enable GVRP on port 1/0/1
a. Select Switching > VLAN > Advanced > GARP Port Configuration.
A screen similar to the following displays.
1:
VLANs
53
Managed Switches
b. Scroll down and select the check box that corresponds to interface 1/0/11.
The Interface field in the table heading displays 1/0/11.
c. From the Port GVRP Mode menu, select Enable.
d. Click Apply.
Private VLANs
The Private VLANs feature separates a regular VLAN domain into two or more subdomains.
Each subdomain is defined (represented) by a primary VLAN and a secondary VLAN. The
primary VLAN ID is the same for all subdomains that belong to a private VLAN. The
secondary VLAN ID differentiates subdomains from each other and provides Layer 2 isolation
between ports of the same private VLAN.
There are three types of VLAN within a private VLAN:
•Primary VLAN. it forwards the traffic from the promiscuous ports to isolated ports,
community ports, and other promiscuous ports in the same private VLAN. Only one
primary VLAN can be configured per private VLAN.
share the same primary VLAN.
•Community VLAN. is a secondary VLAN. It forwards traf
belong to the same community and to the promiscuous ports.
community VLANs per private VLAN.
•Isolated VLAN. is a secondary VLAN. It carries traffic from isolated ports to
promiscuous ports. Only one isolated VLAN can be configured per private VLAN.
All ports within a private VLAN
fic between ports which
There can be multiple
There are three types of port designation within a private VLAN:
•Promiscuous port
interfaces in the private VLAN, including other promiscuous ports, community ports,
and isolated ports.
•Community ports. These ports can communicate with other community ports and
promiscuous ports.
•Isolated ports
The following figure shows how private VLANs can be extended across multiple switches
through inter-switch/stack links that transport primary, community
between devices.
. belongs to a primary VLAN and can communicate with all
. These can ONL
Y communicate with promiscuous ports.
, and isolated VLANs
VLANs
54
Managed Switches
Figure 5. Private VLANs
The following figure illustrates the private VLAN traffic flow . Five ports A, B, C, D, and E make
up a private VLAN. Port A is a promiscuous port which is associated with the primary VLAN
100. Ports B and C are the host ports which belong to the isolated VLAN 101. Ports D and E
are the community ports which are associated with community VLAN 102. Port F is the
inter-switch/stack link. It is configured to transmit VLANs 100, 101 and 102. Colored arrows
represent possible packet flow paths in the private VLAN domain.
Figure 6. Packet flow within a Private VLAN domain
b. Under Private VLAN Association Configuration, select the VLAN ID 100.
c. In the Secondary VLAN(s) field, type 101-102.
d. Click Apply to save the settings.
Private VLAN > Private VLAN Association
VLANs
58
Managed Switches
Configure Private-VLAN Port Mode (Promiscuous, Host)
The example is shown as CLI commands and as a web interface procedure.
CLI: Configure Private-VLAN Port Mode (Promiscuous, Host)
Use the following commands to assign port 1/0/1 to promiscuous port mode and ports
1/0/2-1/0/5 to host port mode.
Web Interface: Configure Private-VLAN Port Mode
(Promiscuous, Host)
1. Configure port 1/0/1 to promiscuous port mode.
a. Select Security > Traffic Control >
Configuration.
A screen similar to the following displays.
Private VLAN > Private VLAN Port Mode
b. Under Private VLAN Port Mode Configuration, select the 1/0/1 interface check
box.
Now 1/0/1 appears in the Interface field at the top.
c. In the Port VLAN Mode field, select Promiscuous from the pull-down menu.
VLANs
59
Managed Switches
d. Click Apply to save the settings.
2. Configure ports 1/0/2-1/0/5 to host port mode.
a. Select Security > T
raffic Control >
Private VLAN > Private VLAN Port Mode
Configuration.
A screen similar to the following displays.
b. Under Private VLAN Port Mode Configuration, select the 1/0/2 to 1/0/5 interface
check box.
c. In the Port VLAN Mode field, select Host from the pull-down menu.
d. Click Apply to save the settings.
Configure Private-VLAN Host Ports
The example is shown as CLI commands and as a web interface procedure.
CLI: Configure Private-VLAN Host Ports
Use the following commands to associate isolated ports 1/0/2-1/0/3 to a private-VLAN
(primary=100, secondary=101). Community ports 1/0/4-1/0/5 to a private-VLAN (primary=
100, secondary=102).
1. Map private-VLAN promiscuous port 1/0/1 to a primary VLAN (100) and to selected
secondary VLANs (101-102).
a. Select Security > Traffic Control >
Interface Configuration.
A screen similar to the following displays.
Private VLAN > Private VLAN Promiscuous
b. Under Private VLAN Promiscuous Interface Configuration, select the 1/0/1
interface check box. Now 1/0/1 appears in the Interface field at the top.
c. In the Promiscuous Primary VLAN field, enter 100.
VLANs
62
Managed Switches
d. In the Promiscuous Secondary VLAN field, enter 101-102.
e. Click Apply to save the settings
VLAN Access Ports and Trunk Ports
Using switch ports can minimize potential configuration errors. Switch ports also facilitate the
configuration of a VLAN by reducing the number of commands that you must enter. To
configure a port that is connected to an end user, use a switch port in access mode. To
configure a port that is connected to another switch, use a switch port in trunk mode.
In addition, to access mode and trunk mode, you can configure switch ports in general mode,
which is the default mode and does not restrict the configuration so you can configure the
port as needed.
The switch supports the following switch port modes, each with its own VLAN membership
rules:
•Access mode. In access mode, the following rules apply to switch ports:
-Ports belong to a single VLAN, for which the VID is the configured PVID.
-Ports are intended for end-point connections, which, in general, do not operate with
LANs and operate with tagged traffic.
-Ports accept both tagged and untagged traffic. (Y
ports accepts tagged or untagged traffic.)
-All egress traffic must be sent untagged.
-Ingress filtering is always enabled.
-Ports are intended for connecting end stations to the switch, especially when end
stations are incapable of generating VLAN tags.
•T
runk mode. In trunk mode, the following rules apply to switch ports:
-Ports can belong to as many VLANs as needed.
-Ports accept both incoming tagged and untagged traf
-All incoming untagged frames are tagged with the native VLAN as the VID.
-Egress frames are sent tagged for all VLANs other than the native VLAN. Frames that
belong to the native VLAN are sent without a VLAN tag.
-Ingress filtering is always enabled. If incoming frames are tagged correctly (that is,
tagged with a VID of one of the VLANs to which the port belongs), they are admitted.
-Ports are intended for connections between switches, for which the traf
tagged.
-If you configure a list with allowed VLANs, a trunk port becomes a member of VLANs
that are defined in the list with allowed VLANs.
•General mode
-By default, all ports are designated as general mode ports and belong to the default
VLAN.
-Ports conform to NETGEAR legacy switch behavior for switch ports.
. In general mode, the following rules apply to switch ports:
ou cannot configurable whether the
fic.
fic is generally
VLANs
63
Managed Switches
-You configure various VLAN parameters such as membership, tagging, and PVID by
using legacy commands.
-You can enable or disable ingress filtering.
The following figure shows a configuration with access ports and a trunk port.
b. Select the check box that corresponds to interface 1/0/3.
The Interface field in the table heading displays 1/0/3.
c. In the Switchport Mode field, select Trunk.
d. In the
Native VLAN ID field, select 2000.
Note: In this step, you configure incoming untagged packets to be tagged
with VLAN ID 2000. If you want the switch to drop untagged packets,
ignore this step.
e. In the T
runk Allowed VLANs field, enter
1000,2000.
f. Click Apply.
VLANs
68
3. LAGs
Link Aggregation Groups
This chapter includes the following sections:
•Link Aggregation Concepts
•Add Ports to LAGs
3
69
Managed Switches
Link Aggregation Concepts
Link aggregation allows the switch to treat multiple physical links between two endpoints as a
single logical link. All the physical links in a given LAG must operate in full-duplex mode at the
same speed. LAGs can be used to directly connect two switches when the traffic between
them requires high bandwidth and reliability , or to provide a higher-bandwidth connection to a
public network. Management functions treat a LAG as if it is a single physical port. You can
include a LAG in a VLAN. You can configure more than one LAG for a given switch.
Port 1/0/3
Server
LAG_10
Port 1/0/2
LAG_10
Layer 3 Switch
Subnet 3
Port 1/0/8
LAG 20
Layer 2 Switch
Subnet 2Subnet 3
Figure 8. Example network with two LAGs
Port 1/0/9
LAG_20
LAGs offer the following benefits:
•Increased reliability and availability. If one of the physical links in the LAG goes down,
traffic is dynamically and transparently reassigned to one of the other physical links.
•Better use of physical resources. Traf
fic can be load-balanced across the physical links.
•Increased bandwidth. The aggregated physical links deliver higher bandwidth than each
individual link.
•Incremental increase in bandwidth. A physical upgrade could produce a tenfold increase
in bandwidth; LAG produces a twofold or fivefold increase, which is useful if only a small
increase is needed.
LAGs
70
Managed Switches
Add Ports to LAGs
The example is shown as CLI commands and as a web interface procedure.
b. In the LAG ID list, select LAG 1.
c. Click Unit 1. The ports display.
d. Click the gray boxes under port 2 and 3
.
LAGs
71
Managed Switches
Two check marks display in the box.
e. Click the Apply button to save the settings.
2. Add ports to lag_20.
a. Select Switching > LAG > LAG Membership.
A screen similar to the following displays.
b. Under LAG Membership, in the LAG ID list, select LAG 2.
c. Click Unit 1. The ports display.
d. Click the gray boxes under ports 8 and
9.
Two check marks display in the boxes.
e. Click Apply to save the settings.
LAGs
72
4. MLAGs
Multichassis Link Aggregation Groups
This chapter includes the following sections:
•Multichassis Link Aggregation Concepts
•Create an MLAG
•Enable Static Routing on MLAG Interfaces
•Enable DCPDP on MLAG Interfaces
•Troubleshoot the MLAG Configuration
Note: MLAGs are available on the M6100 and M7100 series switches only.
4
73
Managed Switches
Multichassis Link Aggregation Concepts
In a Layer 2 network, Spanning Tree Protocol (STP) is deployed to avoid network loops. With
STP running, ports can either be in forwarding or in blocked state. When a topology change
occurs, STP reconverges the network to a new stable loop-free network. STP is successful in
managing Layer 2 networks and mitigating loops in the network.
However, because STP marks ports as forwarding or blocking, a significant percentage of the
links in a network do not carry data traffic.
reconvergence of up to several seconds.
New loop management technologies include Spanning Tree Bridges and Transparent
Interconnection of Lots of Links (TRILL), and a multichassis LAG (MLAG) solution such as
Virtual Private Cloud (VPC).
o avoid using STP, you can bundle together multiple links between two adjacent switches
T
using a link aggregation group (LAG). The advantages of a LAG are that all member links are
in forwarding state and a link failure does not cause disruptions in the order of seconds (a
LAG handles a link failure in less than one second). However
typical LAG setting, the network can go down.
Also, any disruption in existing links causes a
, if a device failure occurs in a
A multichassis LAG (MLAG) carries the advantages of a LAG across multiple devices. An
MLAG enables links that are on two dif
The remote partner device does not detect that it is pairing with two dif
a LAG. The advantages of an MLAG are that all links can carry data traffic simultaneously,
and if a link or device failure occurs, the network can be resolved and the traffic can resume
quickly.
The following figure shows an example of an MLAG deployment topology.
ferent switches to pair with links on a partner device.
ferent devices to form
MLAGs
74
Managed Switches
C
LAG 1
MLAG 3
(LAG 4)
P
P13
P11
MLAG 1
(LAG 2)
LAG 1
LAG 1(P21, P22, P23, P24)
P12
MLAG 2
(LAG 3)
LAG 1 (S21, S22, S23, S24)
Peer link
A
Figure 9. Example of an MLAG deployment topology
MLAG 3
(LAG 4)
MLAG 1
(LAG 2)
S13
LAG 1
B
S11
MLAG 2
(LAG 3)
S
S12
In the MLAG deployment topology example:
•P and S are MLAG-aware peer devices. P stands for primary device and S stands for
secondary device. The roles are elected after the devices exchanged keep-alive
messages. The primary device owns the MLAG member ports on the secondary device.
The primary device handles the control plane functionality of supported protocols for the
MLAG member ports on the secondary.
•The two devices are connected with a peer link.
The peer link must be configured on a
port-channel interface (that is, a LAG). Only one peer link is allowed per switch. All
instances of MLAG running on the two peer switches share this peer link.
The peer link is
used for the following purposes:
-Carry keep-alive messages to the peer
.
-Syncing forwarding database (FDB) entries that are learned on MLAG interfaces
between the two MLAG peer switches.
MLAGs
75
Managed Switches
-STP Bridge Protocol Data Units (BPDUs) and Link Aggregation Control Protocol Data
Units (LACPDUs) that are received on secondary MLAG member ports are forwarded
to the primary MLAG component over the peer link.
-Interface events that are related to the MLAG interface and its member ports and that
occur on the secondary device are transferred over the peer link to the primary device
for handling.
-MLAG control information between the primary device and the secondary MLAG
switches is carried over the peer link.
-When all member ports of an MLAG interface are down on one MLAG switch, the
traffic that is received on that switch and that is destined for the MLAG is sent over the
peer link to the peer MLAG switch for forwarding.
The MLAG deployment topology example also includes the following ports and devices:
•P21, P22, P23, P24, S21, S22, S23, and S24 are the port-channel ports that form the
peer link.
•Ports P11, S1
1 are members of MLAG1 and ports P12, S12 are members of MLAG2.
•A, B, and C, are LAG devices.
•A and B are partner devices that form an MLAG with P and S. On
A and B, the LAG1 is a
regular LAG.
In the MLAG deployment topology example, the following restrictions and limitations apply:
•Layer 3 dynamic routing protocols such as OSPF and RIP are not supported on an MLAG
interface.
•IGMP snooping is not supported with an MLAG.
•The peer link is a crucial link.
ou must configure a port channel as the peer link. If the
Y
peer link is overwhelmed with data, traffic is disrupted.
•If the FBD on the primary device has the same limit (that is, the same number of
maximum supported MAC addresses) as on the secondary device, both devices are in
synchronization until the limit is reached. When the limit is exceeded, the primary and
secondary devices do not learn the same set of FDB entries, and the FBD tables are no
longer in synchronization.
raffic might be disrupted during the time when an MLAG interface goes down on one
•T
device and the peer device is programmed to forward the traffic over this MLAG on the
peer device.
•An MLAG cannot be formed between more than two devices. All instances of MLAG must
run on the same two devices.
•All primary instances of MLAG are handled on one device.
•Keep-alive links and peer links are shared across all instances of MLAG that are running
between the two devices.
•The virtual IP addresses of the V
be dif
ferent from the physical IP address of either peer. Following this requirement
irtual Router Redundancy Protocol (VRRP) routers must
ensures that the packets that are generated at either of the peers are transmitted with the
source MAC address as the physical MAC address and not the virtual MAC address.
MLAGs
76
Managed Switches
Create an MLAG
In this configuration example, each MLAG switch has three LAGs:
•Two LAGs to the remote LAG partner: LAG2 and LAG3
•One LAG to the peer MLAG device: LAG1
If more remote devices are needed, follow the steps in the following sections to add them.
This configuration example is presented as CLI commands and as a web interface
procedure.
CLI: Create an MLAG on LAG2 and LAG3
1. Enable MLAG globally.
(Switch P or S) #config
(Switch P or S) (Config)#feature vpc
2. Enable the MLAG keep-alive protocol in the MLAG (VPC) domain.
This step is mandatory.
(Switch P or S) (Config)#vpc domain 1
(Switch P or S) (Config-VPC 1)#peer-keepalive enable
(Switch P or S) (Config-VPC 1)#exit
3. Enable the MLAG peer link on LAG1 that is used to connect the MLAG peers.
After you have configured a peer link, the traffic from the peer link is prevented from
leaving any MLAG member port. When a failure occurs on one MLAG peer switch and
the traffic has to flow through the MLAG member ports of the peer, the traf
fic that arrives
from the peer link on the second MLAG device can leave only from select MLAG
interfaces. Therefore, you need to configure the following options on the port channel of
the peer link:
•Disable STP on the peer link.
•Include the peer link in all the VLANs that are configured on all MLAG interfaces on
the device.
•Enable egress tagging on the peer link.
•NETGEAR recommends that you use dynamic LAGs as port channels.
•NETGEAR recommends that you configure Unidirectional Link Detection (UDLD) to
detect and shut down any unidirectional links.
MLAGs
77
Managed Switches
(Switch P or S) (Config)#interface lag 1
(Switch P or S) (Interface lag 1)#vpc peer-link
(Switch P or S) (Config)#exit
4. Disable STP on the peer link (LAG1).
This step is mandatory.
(Switch P or S) (Config)#interface lag 1
(Switch P or S) (Interface lag 1)#no spanning-tree port mode
5. Enable UDLD on the member of LAG 1 (peer link).
This step is not mandatory but recommended.
(Switch P or S) (Config)#udld enable
(Switch P or S) (Interface 0/21-0/24)#udld enable
6. Create MLAG1 on LAG2.
(Switch P or S) (Config)#interface lag 2
(Switch P or S) (Interface lag 2)#vpc 1
(Switch P or S) (Config)#exit
7. Create MLAG2 on LAG3.
(Switch P or S) (Config)#interface lag 3
(Switch P or S) (Interface lag 3)#vpc 2
(Switch P or S) (Config)#exit
8. Create MLAG3 on LAG4.
(Switch P or S) (Config)#interface lag 4
(Switch P or S) (Interface lag 4)#vpc 3
(Switch P or S) (Config)#exit
Port channel................................... lag 4
Self member ports Status
----------------- --------0/1 UP
Peer member ports Status
----------------- --------0/1 UP
MLAGs
79
Managed Switches
Web Interface: Create an MLAG on LAG2, LAG3, and LAG4.
1. Enable MLAG and configure LAG1 as the peer link.
a. Select Switching > MLAG > Basic > VPC Global Configuration.
A screen similar to the following displays.
b. For VPC Mode, select the Enable radio button.
c. Select the Enable Modification check box.
d. From the Port Channel menu, select lag 1.
e. Click Apply.
2. Disable STP on LAG 1.
a. Select Switching > MLAG > Basic > VPC Global Configuration.
A screen similar to the following displays.
MLAGs
80
Managed Switches
b. Scroll down and select the interface lag1 check box.
The Interface field in the table heading displays lag1.
c. In the Port Mode field, select Disable.
d. Click Apply.
3. Enable UDLD on the members of LAG1.
The web management interface does not support UDLD so you need to use the CLI. For
more information, see CLI: Create an MLAG on LAG2 and LAG3 on page 77.
4. Create MLAG on LAG2.
a. Select Switching > MLAG >
Advanced > VPC Interface Configuration.
A screen similar to the following displays.
b. From the LAG Interface menu, select lag 2.
c. In the VPC Identifier field, enter 1.
d. Click Add.
5. Create MLAG on LAG3.
a. Select Switching > MLAG >
Advanced > VPC Interface Configuration.
MLAGs
81
Managed Switches
A screen similar to the following displays.
b. From the LAG Interface menu, select lag 3.
c. In the VPC Identifier field, enter 2.
d. Click Add.
6. Create MLAG on LAG4.
a. Select Switching > MLAG >
Advanced > VPC Interface Configuration.
A screen similar to the following displays.
b. From the LAG Interface menu, select lag 4.
c. In the VPC Identifier field, enter 3.
d. Click Add.
MLAGs
82
Managed Switches
Enable Static Routing on MLAG Interfaces
You can make MLAG interfaces members of VLAN routing interfaces. Static routing is
supported on these VLAN interfaces. Routing interfaces that have MLAG interfaces as
members do nor support routing protocols such as OSPF and RIP. You need to configure
VRRP on these routing interfaces to provide redundancy for virtual IP addresses and virtual
MAC addresses. After you have VRRP enabled on a VLAN that has an MLAG port as its
member, each VRRP router functions as master in that VLAN.
Note: The virtual IP address of the VRRP routers must be different from the
physical IP addresses of the peers.
The following configuration steps assume that you created an MLAG as described in Create
an MLAG on page 77.
CLI: Enable Static Routing on MLAG
The following steps assume that you created an MLAG as described in Create an MLAG on
page 77.
Configure Switch P
Note: For information about switch P, see Figure 9 on page 75 and the
description following the figure.
1. Add LAG1 and LAG2 to VLAN 100, LAG1 and LAG4 to VLAN 200, and LAG1 and LAG3
to VLAN 300.
For information about how to add a LAG to a VLAN, see Chapter 2, VLANs.
5. Check the VRRP status on VLAN 100, and make sure that the state is master.
Note: The VRRP state is master on both switch P and switch S (see Figure 9
on page 75).
(Switch P) #show ip vrrp interface vlan 100 1
Primary IP address............................. 192.168.100.3
7. Check the VRRP status on VLAN 200, and make sure that the state is master.
Note: The VRRP state is master on both switch P and switch S (see Figure 9
on page 75).
(Switch P) #show ip vrrp interface vlan 200 1
Primary IP address............................. 192.168.102.3
5. Check the VRRP status on VLAN 100, and make sure that the VRRP state is master.
Note: The VRRP state is master on both switch P and switch S (see Figure 9
on page 75).
MLAGs
87
Managed Switches
(Switch S) #show ip vrrp interface vlan 100 1
Primary IP address............................. 192.168.100.3
7. Check the VRRP status on VLAN 200, and make sure that the state is master.
Note: The VRRP state is master on both switch P and switch S (see Figure 9
on page 75).
MLAGs
88
Managed Switches
(Switch S) #show ip vrrp interface vlan 200 1
Primary IP address............................. 192.168.102.3
9. Check the VRRP status on VLAN 300, and make sure that the VRRP state is master.
Note: The VRRP state is master on both switch P and switch S (see Figure 9
on page 75).
MLAGs
89
Managed Switches
(Switch S) #show ip vrrp interface vlan 300 1
Primary IP address............................. 192.168.103.3
--------------- ----- -----------------No interfaces are tracked for this vrid and interface combination
Track Route(pfx/len) Reachable DecrementPriority
--------------------- --------- -----------------No routes are tracked for this vrid and interface combination
Web Interface: Enable Routing on MLAG Interfaces
The following configuration steps assume that you created an MLAG as described in Create
an MLAG on page 77.
Configure Switch P
Note: For information about switch P, see Figure 9 on page 75 and the
description following the figure.
1. On switch P, configure IP address 192.168.100.1 on VLAN 100, IP address
192.168.102.1 on VLAN 200, and IP address 192.168.103.1 on VLAN 300.
For information about configuring IP addresses, see Chapter 5, Port Routing
Chapter 6, VLAN Routing.
2. Configure VRRP on VLAN 100 on switch P.
a. Select Routing > VRRP > Basic > VRRP Configuration
.
and
MLAGs
90
Managed Switches
A screen similar to the following displays.
b. Under Global Configuration, next to the Admin Mode, select the Enable radio
button.
c. For the VRRP configuration, enter the following information:
•In the VRID (1 to 255) field, enter 1.
•From the Interface menu, select VLAN 100.
•In the Primary IP
Address field, enter 192.168.100.3
.
•From the Mode menu, select Active.
d. Click Add.
3. Configure VRRP on VLAN 200 on switch P.
a. Select Routing > VRRP > Basic > VRRP Configuration
.
A screen similar to the following displays.
b. Under Global Configuration, next to the Admin Mode, select the Enable radio
button.
MLAGs
91
Managed Switches
c. For the VRRP configuration, enter the following information:
•In the VRID (1 to 255) field, enter 1.
•From the Interface menu, select VLAN 200.
•In the Primary IP Address field, enter 192.168.102.3.
•From the Mode menu, select Active
.
d. Click Add.
4. Configure VRRP on VLAN 300 on switch P
.
a. Select Routing > VRRP > Basic > VRRP Configuration
A screen similar to the following displays.
.
b. Under Global Configuration, next to the Admin Mode, select the Enable radio button.
c. For the VRRP configuration, enter the following information:
•In the VRID (1 to 255) field, enter 1.
•From the Interface menu, select VLAN 300.
•In the Primary IP
Address field, enter 192.168.103.3
.
•From the Mode menu, select Active.
d. Click Add.
Configure Switch S
Note: For information about switch S, see Figure 9 on page 75 and the
description following the figure.
1. On switch S, configure IP address 192.168.100.2 on VLAN 100, IP address
192.168.102.2 on VLAN 200, and IP address 192.168.103.2 on VLAN 300.
For information about configuring IP addresses, see Chapter 5, Port Routing and
Chapter 6, VLAN Routing.
MLAGs
92
Managed Switches
2. Configure VRRP on VLAN 100 on switch S.
a. Select Routing > VRRP > Basic > VRRP Configuration.
A screen similar to the following displays.
b. Under Global Configuration, next to the Admin Mode, select the Enable radio
button.
c. For the VRRP configuration, enter the following information:
•In the VRID (1 to 255) field, enter 1.
•From the Interface menu, select VLAN 100.
•In the Primary IP
Address field, enter 192.168.100.3
.
•From the Mode menu, select Active.
d. Click Add.
3. Configure VRRP on VLAN 200 on switch S.
a. Select Routing > VRRP > Basic > VRRP Configuration.
A screen similar to the following displays.
b. Under Global Configuration, next to the Admin Mode, select the Enable radio
button.
MLAGs
93
Managed Switches
c. For the VRRP configuration, enter the following information:
•In the VRID (1 to 255) field, enter 1.
•From the Interface mode, select VLAN 200.
•In the Primary IP Address field, enter 192.168.102.3
•From the Mode menu, select Active.
d. Click Add.
4. Configure VRRP on VLAN 300 on switch S.
a. Select Routing > VRRP > Basic > VRRP Configuration.
A screen similar to the following displays.
.
b. Under Global Configuration, next to the Admin Mode, select the Enable radio button.
c. For the VRRP configuration, enter the following information:
•In the VRID (1 to 255) field, enter 1.
•From the Interface menu, select VLAN 300.
•In the Primary IP
•From the Mode menu, select Active
d. Click Add.
Address field, enter 192.168.103.3.
.
Enable DCPDP on MLAG Interfaces
The Dual Control Plane Detection Protocol (DCPDP) s a UDP-based protocol. When a
secondary device in an MLAG configuration does not receive keep-alive messages from the
primary device, the secondary device takes on the role of primary device as well. Eventually,
the MLAG configuration contains two primary devices, which can cause unexpected
behavior. For example, if the MLAGs are static, a non-MLAG device can detect two BPDUs
with two different MAC addresses on the same interface and sends STP BPDUs through one
of the LAG members. (Because the LAGs are static, all of its members are operational). In
the worst-case scenario, STP can go through a continuous reconvergence. The DCPDP can
MLAGs
94
Managed Switches
resolve a configuration with two primary devices by identifying the presence of another peer
and taking appropriate action.
You must configure the DCPDP on an IP interface that none of the MLAG interfaces share.
After you have enabled DCPDP, it sends a control plane detection message to the peer once
every second. The message is unidirectional and contains the senders MAC address. When
a switch receives a control plane detection message, it sets the peer is UP variable to TRUE
to indicate that a peer is detected.
The DCPDP configuration includes the following components:
•Peer IP address. The IP address of the peer switch, which you must configure before
you enable DCPDP.
•Source IP address
configuration is also mandatory
. The IP address from which the DCPDP packets are sent. This
. On the receiving side, DCPDP checks if the source IP
address of the packet matches the configured peer IP address. Packets with an IP
address that does not match the configured peer IP address are discarded.
•UDP Port.
50000.
The port number to which messages are sent. The default port number is
This configuration is optional.
CLI: Configure the DCPDP on the MLAG Interfaces
1. Configure the destination and source IP addresses of the peer on switch P.
For this configuration, switch P has an IP address of 192.168.105.1 and switch S has an
IP address of 192.168.104.1. Both switches can reach each other on the network.
Note: For information about switch P and switch S, see Figure 9 on page 75
Peer detection operational status.............. Up
Peer is detected............................... TRUE
Web Interface: Configure the DCPDP on MLAG Interfaces
1. Configure the DCPDP on switch P.
For information about switch P, see Figure 9 on page 75 and the description following the
figure.
a. Select Routing > VRRP > Basic > VRRP Configuration.
A screen similar to the following displays.
b. Under Peer Detection, next to Peer Detection Mode, select the Enable radio button.
c. Enter the following information in the Peer Detection section:
•In the Peer IP Address field, enter 192.168.104.1.
•In the Source IP Address field, select 192.168.105.1
.
•In the UDP Port field, enter 50000.
MLAGs
96
Managed Switches
d. Click Apply.
2. Configure DCPDP on switch S.
For information about switch S, see Figure 9 on page 75 and the description following the
figure.
a. Select Switching > MLAG > Basic > VPC Global Configuration.
A screen similar to the following displays.
b. Under Peer Detection, next to Peer Detection Mode, select the Enable radio button.
c. Enter the following information in the Peer Detection section:
•In the Peer IP
•In the Source IP Address field, select 192.168.104.1
Address field, enter 192.168.105.1.
.
•In the UDP Port field, enter 50000.
3. Click Apply.
MLAGs
97
Managed Switches
Troubleshoot the MLAG Configuration
The Creation of an MLAG Fails
If an MLAG is not created correctly, either the physical port link is not up or the configuration
is inconsistent between two peers. First, check the peer link. Then, check the status of the
MLAG interface.
If the traffic is not forwarded normally, check if the following settings are identical on the
primary and slave devices.
•FDB entry aging timers
•Static MAC entries.
•ACL configuration
A Ping to a VRRP Virtual IP Address Fails
If you ping the VRRP virtual IP address and do not see the response, use the CLI or web
management interface to check if the accept mode is enabled. By default, the accept mode is
disabled. It should be enabled before you ping the VRRP virtual IP address.
CLI: Check the Accept Mode
1. Check the accept mode.
(Netgear Switch) #show ip vrrp interface vlan 100 1
Primary IP address............................. 192.168.100.3