Common Powerconnect-M6220 User's Guide En-Us
Common Powerconnect-M6220 User's Guide En-Us
____________
Information in this publication is subject to change without notice.
© 2013 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc.
is strictly forbidden.
Trademarks used in this text: Dell™, the DELL logo, PowerEdge™, EqualLogic™, PowerConnect™,
and OpenManage™ are trademarks of Dell Inc. Microsoft®, Windows®, Windows Server®, MS-
DOS®, and Windows Vista® are either trademarks or registered trademarks of Microsoft Corporation
in the United States and/or other countries. sFlow® is a registered trademark of InMon Corporation.
Cisco® is a registered trademark of Cisco Systems. Mozilla® and Firefox® are registered trademarks
of the Mozilla Foundation.
Other trademarks and trade names may be used in this publication to refer to either the entities claiming
the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and
trade names other than its own.
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 49
About This Document . . . . . . . . . . . . . . . . . . 49
Audience . . . . . . . . . . . . . . . . . . . . . . . . . 50
Document Conventions . . . . . . . . . . . . . . . . . 50
Additional Documentation . . . . . . . . . . . . . . . . 51
2 Switch Features . . . . . . . . . . . . . . . . . . . 53
System Management Features . . . . . . . . . . . . . 54
Multiple Management Options . . . . . . . . . . . 54
Simple Mode . . . . . . . . . . . . . . . . . . . . 54
Port Aggregator. . . . . . . . . . . . . . . . . . . 55
System Time Management . . . . . . . . . . . . . 55
Log Messages . . . . . . . . . . . . . . . . . . . 55
Integrated DHCP Server . . . . . . . . . . . . . . 56
Management of Basic Network Information . . . . 56
IPv6 Management Features . . . . . . . . . . . . 56
Dual Software Images . . . . . . . . . . . . . . . 56
File Management . . . . . . . . . . . . . . . . . . 57
Switch Database Management Templates . . . . . 57
Automatic Installation of Firmware and
Configuration . . . . . . . . . . . . . . . . . . . . 57
sFlow . . . . . . . . . . . . . . . . . . . . . . . . 58
SNMP Alarms and Trap Logs . . . . . . . . . . . . 58
CDP Interoperability through ISDP . . . . . . . . . 58
Remote Monitoring (RMON) . . . . . . . . . . . . 58
Contents 3
Stacking Features (PCM6220, PCM6348, and
PCM8024-k Only) . . . . . . . . . . . . . . . . . . . . . 59
High Port Count . . . . . . . . . . . . . . . . . . . 59
Single IP Management . . . . . . . . . . . . . . . 59
Automatic Firmware Update for New Stack
Members . . . . . . . . . . . . . . . . . . . . . . 59
Stacking Compatibility with the PowerConnect
7000 Series . . . . . . . . . . . . . . . . . . . . . 59
Master Failover with Transparent Transition . . . . 60
Nonstop Forwarding on the Stack . . . . . . . . . 60
Hot Add/Delete and Firmware
Synchronization . . . . . . . . . . . . . . . . . . . 60
Security Features . . . . . . . . . . . . . . . . . . . . 60
Configurable Access and Authentication
Profiles . . . . . . . . . . . . . . . . . . . . . . . 60
Password-Protected Management Access . . . . 61
Strong Password Enforcement . . . . . . . . . . . 61
TACACS+ Client . . . . . . . . . . . . . . . . . . . 61
RADIUS Support . . . . . . . . . . . . . . . . . . 61
SSH/SSL . . . . . . . . . . . . . . . . . . . . . . . 62
Inbound Telnet Control . . . . . . . . . . . . . . . 62
Denial of Service . . . . . . . . . . . . . . . . . . 62
Port Protection . . . . . . . . . . . . . . . . . . . 62
Captive Portal . . . . . . . . . . . . . . . . . . . . 63
Dot1x Authentication (IEEE 802.1X) . . . . . . . . . 63
MAC-Based 802.1X Authentication . . . . . . . . . 63
Dot1x Monitor Mode . . . . . . . . . . . . . . . . 64
MAC-Based Port Security . . . . . . . . . . . . . 64
Access Control Lists (ACL) . . . . . . . . . . . . . 64
Time-Based ACLs . . . . . . . . . . . . . . . . . . 65
IP Source Guard (IPSG) . . . . . . . . . . . . . . . 65
DHCP Snooping . . . . . . . . . . . . . . . . . . . 65
Dynamic ARP Inspection . . . . . . . . . . . . . . 65
Protected Ports (Private VLAN Edge). . . . . . . . 66
4 Contents
Switching Features . . . . . . . . . . . . . . . . . . . 66
Flow Control Support (IEEE 802.3x) . . . . . . . . . 66
Head of Line Blocking Prevention . . . . . . . . . 66
Alternate Store and Forward (ASF). . . . . . . . . 66
Jumbo Frames Support . . . . . . . . . . . . . . . 67
Auto-MDI/MDIX Support . . . . . . . . . . . . . . 67
VLAN-Aware MAC-based Switching . . . . . . . . 67
Back Pressure Support . . . . . . . . . . . . . . . 67
Auto Negotiation . . . . . . . . . . . . . . . . . . 68
Broadcast Storm Control . . . . . . . . . . . . . . 68
Port Mirroring . . . . . . . . . . . . . . . . . . . . 68
Static and Dynamic MAC Address Tables . . . . . 69
Link Layer Discovery Protocol (LLDP) . . . . . . . 69
Link Layer Discovery Protocol (LLDP) for Media
Endpoint Devices . . . . . . . . . . . . . . . . . . 69
Connectivity Fault Management
(IEEE 802.1ag) . . . . . . . . . . . . . . . . . . . . 69
Priority-based Flow Control (PFC) . . . . . . . . . 70
Data Center Bridging Exchange (DBCx)
Protocol . . . . . . . . . . . . . . . . . . . . . . . 70
Fibre Channel over Ethernet (FCoE) Initialization
Protocol Snooping . . . . . . . . . . . . . . . . . 70
Cisco Protocol Filtering . . . . . . . . . . . . . . . 71
DHCP Layer 2 Relay . . . . . . . . . . . . . . . . . 71
Contents 5
Double VLANs . . . . . . . . . . . . . . . . . . . . 73
Routing Features . . . . . . . . . . . . . . . . . . . . . 77
Address Resolution Protocol (ARP) Table
Management . . . . . . . . . . . . . . . . . . . . 77
VLAN Routing . . . . . . . . . . . . . . . . . . . . 77
IP Configuration . . . . . . . . . . . . . . . . . . . 77
Open Shortest Path First (OSPF) . . . . . . . . . . 77
BOOTP/DHCP Relay Agent . . . . . . . . . . . . . 78
IP Helper and UDP Relay . . . . . . . . . . . . . . 78
Routing Information Protocol . . . . . . . . . . . . 78
Router Discovery . . . . . . . . . . . . . . . . . . 78
Routing Table . . . . . . . . . . . . . . . . . . . . 78
Virtual Router Redundancy Protocol (VRRP) . . . . 79
Tunnel and Loopback Interfaces . . . . . . . . . . 79
6 Contents
Quality of Service (QoS) Features . . . . . . . . . . . . 81
Differentiated Services (DiffServ) . . . . . . . . . 81
Class Of Service (CoS) . . . . . . . . . . . . . . . 81
Auto Voice over IP (VoIP) . . . . . . . . . . . . . . 81
Internet Small Computer System Interface
(iSCSI) Optimization . . . . . . . . . . . . . . . . . 82
3 Hardware Overview . . . . . . . . . . . . . . . . . 87
PowerConnect M6220, M6348, M8024, and M8024-k
Front Panel . . . . . . . . . . . . . . . . . . . . . . . . 87
PowerConnect M6220 Front Panel . . . . . . . . . 87
PowerConnect M6348 Front Panel . . . . . . . . . 89
PowerConnect M8024 Front Panel . . . . . . . . . 90
PowerConnect M8024-k Front Panel . . . . . . . . 91
Contents 7
Console (RS-232) Port . . . . . . . . . . . . . . . . . . 91
Console Redirect . . . . . . . . . . . . . . . . . . 92
LED Definitions . . . . . . . . . . . . . . . . . . . . . . 93
Port LEDs . . . . . . . . . . . . . . . . . . . . . . 93
System LEDs . . . . . . . . . . . . . . . . . . . . 96
Switch Addresses . . . . . . . . . . . . . . . . . . . . 97
8 Contents
Entering Abbreviated Commands . . . . . . . . . 112
Negating Commands . . . . . . . . . . . . . . . . 112
Understanding Error Messages . . . . . . . . . . 113
Recalling Commands from the History Buffer . . . 113
Specifying Physical Ports . . . . . . . . . . . . . 114
Contents 9
Enabling the DHCP Client on the Default
VLAN . . . . . . . . . . . . . . . . . . . . . . . 136
Managing DHCP Leases . . . . . . . . . . . . . 137
Configuring Static Network Information on the
OOB Port . . . . . . . . . . . . . . . . . . . . . 138
Configuring Static Network Information on the
Default VLAN . . . . . . . . . . . . . . . . . . . 138
Configuring and Viewing Additional Network
Information . . . . . . . . . . . . . . . . . . . . 139
10 Contents
Stack Summary . . . . . . . . . . . . . . . . . . . 160
Stack Firmware Synchronization . . . . . . . . . . 161
Supported Switches . . . . . . . . . . . . . . . . 162
Stack Port Summary . . . . . . . . . . . . . . . . 163
Stack Port Counters . . . . . . . . . . . . . . . . 164
Stack Port Diagnostics . . . . . . . . . . . . . . . 164
NSF Summary . . . . . . . . . . . . . . . . . . . . 165
Checkpoint Statistics . . . . . . . . . . . . . . . . 166
9 Configuring Authentication,
Authorization, and Accounting . . . . . . . 181
AAA Overview . . . . . . . . . . . . . . . . . . . . . . 181
Methods . . . . . . . . . . . . . . . . . . . . . . 182
Access Lines . . . . . . . . . . . . . . . . . . . . 183
Authentication . . . . . . . . . . . . . . . . . . . . . . 183
Authorization . . . . . . . . . . . . . . . . . . . . . . . 184
Exec Authorization Capabilities . . . . . . . . . . 185
Contents 11
Accounting . . . . . . . . . . . . . . . . . . . . . . . 186
12 Contents
Default Configurations . . . . . . . . . . . . . . . . . . 203
Method Lists . . . . . . . . . . . . . . . . . . . . 203
Access Lines (AAA) . . . . . . . . . . . . . . . . 203
Access Lines (Non-AAA) . . . . . . . . . . . . . . 204
Administrative Profiles . . . . . . . . . . . . . . . 204
Contents 13
Email Alert Subject Configuration . . . . . . . . 228
Email Alert To Address Configuration. . . . . . . 229
Email Alert Statistics . . . . . . . . . . . . . . . 230
14 Contents
Configuring General System Settings (Web) . . . . . . 254
System Information . . . . . . . . . . . . . . . . . 254
CLI Banner . . . . . . . . . . . . . . . . . . . . . 257
SDM Template Preference . . . . . . . . . . . . . 258
Operational Mode Configuration . . . . . . . . . . 259
Port Aggregator Global Configuration . . . . . . . 261
Port Aggregator Port Configuration . . . . . . . . 262
Port Aggregator Group Configuration . . . . . . . 264
Port Aggregator Internal Port VLAN
Configuration . . . . . . . . . . . . . . . . . . . . 266
Port Aggregator Port Channel Summary . . . . . . 268
Group VLAN MAC Summary . . . . . . . . . . . . 269
Clock . . . . . . . . . . . . . . . . . . . . . . . . 270
SNTP Global Settings . . . . . . . . . . . . . . . . 271
SNTP Authentication . . . . . . . . . . . . . . . . 272
SNTP Server . . . . . . . . . . . . . . . . . . . . 274
Summer Time Configuration . . . . . . . . . . . . 278
Time Zone Configuration . . . . . . . . . . . . . . 279
Slot Summary . . . . . . . . . . . . . . . . . . . . 280
Supported Cards . . . . . . . . . . . . . . . . . . 281
Contents 15
12 Configuring SNMP . . . . . . . . . . . . . . . . . 297
SNMP Overview . . . . . . . . . . . . . . . . . . . . 297
What Is SNMP? . . . . . . . . . . . . . . . . . . 297
What Are SNMP Traps? . . . . . . . . . . . . . 298
Why Is SNMP Needed? . . . . . . . . . . . . . . 299
16 Contents
13 Managing Images and Files . . . . . . . . . 333
Image and File Management Overview . . . . . . . . . 333
What Files Can Be Managed? . . . . . . . . . . . 333
Why Is File Management Needed?. . . . . . . . . 335
What Methods Are Supported for File
Management? . . . . . . . . . . . . . . . . . . . 337
What Factors Should Be Considered When
Managing Files? . . . . . . . . . . . . . . . . . . 337
How Is the Running Configuration Saved? . . . . . 339
Contents 17
14 Automatically Updating the Image
and Configuration . . . . . . . . . . . . . . . . . 357
Auto Configuration Overview . . . . . . . . . . . . . 357
What Is the DHCP Auto Configuration
Process? . . . . . . . . . . . . . . . . . . . . . 357
Monitoring and Completing the DHCP Auto
Configuration Process . . . . . . . . . . . . . . 362
What Are the Dependencies for DHCP Auto
Configuration? . . . . . . . . . . . . . . . . . . 363
18 Contents
sFlow Sampler Configuration . . . . . . . . . . . . 377
sFlow Poll Configuration . . . . . . . . . . . . . . 378
Interface Statistics . . . . . . . . . . . . . . . . . 379
Etherlike Statistics . . . . . . . . . . . . . . . . . 380
GVRP Statistics . . . . . . . . . . . . . . . . . . . 381
EAP Statistics . . . . . . . . . . . . . . . . . . . . 382
Utilization Summary . . . . . . . . . . . . . . . . 383
Counter Summary. . . . . . . . . . . . . . . . . . 384
Switchport Statistics . . . . . . . . . . . . . . . . 385
RMON Statistics . . . . . . . . . . . . . . . . . . 386
RMON History Control Statistics . . . . . . . . . . 387
RMON History Table . . . . . . . . . . . . . . . . 389
RMON Event Control . . . . . . . . . . . . . . . . 390
RMON Event Log . . . . . . . . . . . . . . . . . . 392
RMON Alarms . . . . . . . . . . . . . . . . . . . 393
Port Statistics . . . . . . . . . . . . . . . . . . . . 395
LAG Statistics . . . . . . . . . . . . . . . . . . . . 396
Port Mirroring . . . . . . . . . . . . . . . . . . . . 397
Contents 19
How Is Quality of Service Applied to iSCSI
Traffic Flows? . . . . . . . . . . . . . . . . . . . 410
How Does iSCSI Optimization Use ACLs? . . . . 411
What Information Does the Switch Track in
iSCSI Traffic Flows? . . . . . . . . . . . . . . . . 411
How Does iSCSI Optimization Interact With
Dell EqualLogic Arrays?. . . . . . . . . . . . . . 413
What Occurs When iSCSI Optimization Is
Enabled or Disabled? . . . . . . . . . . . . . . . 413
How Does iSCSI Optimization Interact with
DCBx? . . . . . . . . . . . . . . . . . . . . . . . 414
How Does iSCSI Optimization Interact with
Dell Compellent Arrays? . . . . . . . . . . . . . 414
iSCSI CoS and Priority Flow Control/Enhanced
Transmission Selection Interactions . . . . . . . 415
20 Contents
What Factors Should Be Considered When
Designing and Configuring a Captive Portal? . . . 427
How Does Captive Portal Work? . . . . . . . . . . 428
What Captive Portal Pages Can Be
Customized? . . . . . . . . . . . . . . . . . . . . 429
Contents 21
18 Configuring Port Characteristics . . . . . . 463
Port Overview . . . . . . . . . . . . . . . . . . . . . 463
What Physical Port Characteristics Can Be
Configured? . . . . . . . . . . . . . . . . . . . . 463
What is Link Dependency? . . . . . . . . . . . . 464
What Interface Types are Supported? . . . . . . 466
What is Interface Configuration Mode? . . . . . 466
22 Contents
How Does the Authentication Server Assign
DiffServ Filters? . . . . . . . . . . . . . . . . . . . 489
What is the Internal Authentication Server? . . . . 489
Default 802.1X Values . . . . . . . . . . . . . . . . 490
Configuring IEEE 802.1X (Web) . . . . . . . . . . . 491
Configuring IEEE 802.1X (CLI) . . . . . . . . . . . . 499
Configuring Internal Authentication Server
Users . . . . . . . . . . . . . . . . . . . . . . . . 504
IEEE 802.1X Configuration Examples . . . . . . . . 504
Contents 23
IPv6 ACL Rule Configuration . . . . . . . . . . . 538
ACL Binding Configuration . . . . . . . . . . . . 540
Time Range Entry Configuration . . . . . . . . . 541
24 Contents
GVRP Parameters. . . . . . . . . . . . . . . . . . 590
Protocol Group . . . . . . . . . . . . . . . . . . . 592
Adding a Protocol Group . . . . . . . . . . . . . . 593
Double VLAN Global Configuration . . . . . . . . . 595
Double VLAN Interface Configuration . . . . . . . 596
Voice VLAN . . . . . . . . . . . . . . . . . . . . . 598
Contents 25
MSTP with Multiple Forwarding Paths . . . . . . 635
What are the Optional STP Features? . . . . . . 636
26 Contents
Default IDSP and LLDP Values . . . . . . . . . . . . . 661
Contents 27
What are Protected Ports? . . . . . . . . . . . . 689
What is Link Local Protocol Filtering? . . . . . . 689
28 Contents
Topologies Where the Multicast Source Is
Not Directly Connected to the Querier . . . . . . . 713
Using Static Multicast MAC Configuration . . . . . 713
IGMP Snooping and GMRP . . . . . . . . . . . . . 713
PCM6220 Restrictions . . . . . . . . . . . . . . . 713
Contents 29
Configuring MVR . . . . . . . . . . . . . . . . . 753
Configuring GARP Timers and GMRP . . . . . . . 755
30 Contents
Dot1ag Configuration Example . . . . . . . . . . . . . 778
Contents 31
Configuring Traffic Snooping and Inspection
(CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . 810
Configuring DHCP Snooping . . . . . . . . . . . 810
Configuring IP Source Guard . . . . . . . . . . . 812
Configuring Dynamic ARP Inspection . . . . . . 813
32 Contents
Link Aggregation Configuration Examples . . . . . . . 834
Configuring Dynamic LAGs . . . . . . . . . . . . . 834
Configuring Static LAGs . . . . . . . . . . . . . . 835
Contents 33
Enhanced Transmission Selection Operation
with DCBx . . . . . . . . . . . . . . . . . . . . . . . 859
34 Contents
Tunnel Configuration . . . . . . . . . . . . . . . . 875
Tunnels Summary . . . . . . . . . . . . . . . . . . 876
Loopbacks Configuration . . . . . . . . . . . . . . 877
Loopbacks Summary . . . . . . . . . . . . . . . . 878
Contents 35
DHCP Server Configuration Examples . . . . . . . . . 902
Configuring a Dynamic Address Pool . . . . . . . 902
Configuring a Static Address Pool . . . . . . . . 904
36 Contents
34 Configuring L2 and L3 Relay
Features . . . . . . . . . . . . . . . . . . . . . . . . 931
L2 and L3 Relay Overview . . . . . . . . . . . . . . . . 931
What Is L3 DHCP Relay? . . . . . . . . . . . . . . 931
What Is L2 DHCP Relay? . . . . . . . . . . . . . . 932
What Is the IP Helper Feature? . . . . . . . . . . . 933
Contents 37
OSPF Feature Details. . . . . . . . . . . . . . . . . . 958
Max Metric . . . . . . . . . . . . . . . . . . . . 958
Static Area Range Cost . . . . . . . . . . . . . . 960
LSA Pacing . . . . . . . . . . . . . . . . . . . . 961
Flood Blocking . . . . . . . . . . . . . . . . . . 962
38 Contents
OSPFv3 Virtual Link Summary . . . . . . . . . . . 995
OSPFv3 Route Redistribution Configuration . . . . 996
OSPFv3 Route Redistribution Summary . . . . . . 997
NSF OSPFv3 Configuration (PCM6220, PCM6348,
and PCM8024-k Only) . . . . . . . . . . . . . . . . 998
Contents 39
36 Configuring RIP . . . . . . . . . . . . . . . . . . 1043
RIP Overview . . . . . . . . . . . . . . . . . . . . . . 1043
How Does RIP Determine Route
Information? . . . . . . . . . . . . . . . . . . . . 1043
What Is Split Horizon? . . . . . . . . . . . . . . 1044
What RIP Versions Are Supported? . . . . . . . 1044
40 Contents
Default VRRP Values . . . . . . . . . . . . . . . . . . 1061
Contents 41
Configuring IPv6 Routing Features (CLI) . . . . . . . . 1095
Configuring Global IP Routing Settings . . . . . . 1095
Configuring IPv6 Interface Settings . . . . . . . 1096
Configuring IPv6 Neighbor Discovery . . . . . . 1097
Configuring IPv6 Route Table Entries and
Route Preferences . . . . . . . . . . . . . . . . 1099
IPv6 Show Commands . . . . . . . . . . . . . . 1101
42 Contents
Configuring a DHCPv6 Pool for Specific Hosts . . 1118
Configuring DHCPv6 Interface Information . . . 1119
Monitoring DHCPv6 Information . . . . . . . . . 1120
40 Configuring Differentiated
Services . . . . . . . . . . . . . . . . . . . . . . . 1125
DiffServ Overview . . . . . . . . . . . . . . . . . . . 1125
How Does DiffServ Functionality Vary Based
on the Role of the Switch? . . . . . . . . . . . . 1126
What Are the Elements of DiffServ
Configuration? . . . . . . . . . . . . . . . . . . 1126
Contents 43
DiffServ Policy Creation. . . . . . . . . . . . . . 1143
DiffServ Policy Attributes Configuration . . . . . 1144
DiffServ Service Configuration . . . . . . . . . . 1146
44 Contents
CoS Configuration Example . . . . . . . . . . . . . . 1168
Contents 45
Multicast Interface Configuration . . . . . . . . 1198
Multicast Route Table . . . . . . . . . . . . . . . 1199
Multicast Admin Boundary Configuration . . . . 1200
Multicast Admin Boundary Summary . . . . . . 1201
Multicast Static MRoute Configuration . . . . . . 1202
Multicast Static MRoute Summary . . . . . . . . 1203
46 Contents
Configuring PIM for IPv4 and IPv6 (Web) . . . . . . . 1224
PIM Global Configuration . . . . . . . . . . . . . 1224
PIM Global Status . . . . . . . . . . . . . . . . 1225
PIM Interface Configuration . . . . . . . . . . . 1226
PIM Interface Summary . . . . . . . . . . . . . 1227
Candidate RP Configuration . . . . . . . . . . . 1228
Static RP Configuration . . . . . . . . . . . . . . 1230
SSM Range Configuration . . . . . . . . . . . . 1232
BSR Candidate Configuration . . . . . . . . . . 1234
BSR Candidate Summary . . . . . . . . . . . . . 1235
Contents 47
Configuring and Viewing DVMRP
Information . . . . . . . . . . . . . . . . . . . . 1260
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1275
48 Contents
1
Introduction
The Dell PowerConnect M6220, M6348, M8024, and M8024-k switches are
Layer 3, blade switches that operate in the Dell PowerEdge M1000e system.
The M1000e system can support up to 16 server blades and six PowerConnect
M6220, M6348, M8024, and M8024-k blade switches.
The PowerConnect M6220 switch supports stacking and provides 20 Gigabit
Ethernet (GbE) ports (16 internal, 4 external) and two expansion slots for
external uplinks. The expansion slots can support up to four small form-factor
pluggable + (SFP+) ports or two 10GBase-T ports. The M6220 also supports
a 48 Gbps stacking module in the expansion slot.
The PowerConnect M6348 switch supports stacking and provides 32 internal
GbE server ports (two per server blade), 16 external integrated RJ45 GbE
ports, two external CX4 ports, and two small form-factor pluggable +
(SFP+) 10 GbE ports.
The PowerConnect M8024 switch provides 16 internal 10-GbE ports and two
10-GbE expansion slots for external 10-GbE uplinks. Each expansion slot can
support an SFP+ module (four ports), CX4 module (three ports), or
10GBase-T module (two ports). The the M8024 supports mixed
environments using combinations of SFP+, 10GBase-T, and CX4 modules.
The PowerConnect M8024-k switch supports stacking and provides 16
internal 10-GbE ports, four external 10-GbE SFP+ ports, and one 10-GbE
expansion slot for external 10-GbE uplinks. The expansion slot can support
an SFP+ module (four ports), CX4 module (three ports), or 10GBase-T
module (two ports). PCM8024-k switches can be stacked with other
PCM8024-k switches using the 10G SFP+ fiber ports or CX-4 ports.
Introduction 49
Audience
This guide is for network administrators in charge of managing one or more
PowerConnect M6220, M6348, M8024, and M8024-k switches. To obtain the
greatest benefit from this guide, you should have a basic understanding of
Ethernet networks and local area network (LAN) concepts.
Document Conventions
Table 1-1 describes the typographical conventions this document uses.
Convention Description
Bold Page names, field names, menu options, button names, and
CLI commands and keywords.
courier font Command-line text (CLI output) and file names
[] In a command line, square brackets indicate an optional
entry.
{} In a command line, inclusive brackets indicate a selection of
compulsory parameters separated by the | character. One
option must be selected. For example: spanning-tree mode
{stp|rstp|mstp} means that for the spanning-tree mode
command you must enter either stp, rstp, or mstp
Italic In a command line, indicates a variable.
<Enter> Any individual key on the keyboard.
CTRL + Z A keyboard combination that involves pressing the Z key
while holding the CTRL key.
50 Introduction
Additional Documentation
The following documents for the PowerConnect M6220, M6348, M8024, and
M8024-k switches are available at support.dell.com/manuals:
• Getting Started Guide—provides information about the switch models in
the series, including front and back panel features. It also describes the
installation and initial configuration procedures.
• CLI Reference Guide—provides information about the command-line
interface (CLI) commands used to configure and manage the switch. The
document provides in-depth CLI descriptions, syntax, default values, and
usage guidelines.
Introduction 51
52 Introduction
2
Switch Features
This section describes the switch user-configurable software features.
NOTE: Before proceeding, read the release notes for this product. The release
notes are part of the firmware download.
Switch Features 53
System Management Features
Multiple Management Options
You can use any of the following methods to manage the switch:
• Use a web browser to access the Dell OpenManage Switch Administrator
interface. The switch contains an embedded Web server that serves
HTML pages.
• Use a telnet client, SSH client, or a direct console connection to access the
CLI. The CLI syntax and semantics conform as much as possible to
common industry practice.
• Use a network management system (NMS) to manage and monitor the
system through SNMP. The switch supports SNMP v1/v2c/v3 over the
UDP/IP transport protocol.
Nearly all switch features support a preconfiguration capability, even when
the feature is not enabled or the required hardware is not present.
Preconfigured capabilities become active only when enabled (typically via an
admin mode control) or when the required hardware is present (or both). For
example, a port can be preconfigured with both trunk and access mode
information. The trunk mode information is applied only when the port is
placed into trunk mode and the access mode information is only applied
when the port is placed into access mode. Likewise, OSPF routing can be
configured in the switch without being enabled on any port. This capability is
present in all of the management options.
Simple Mode
Users with a privilege level of 15 can configure the switch to operate in
normal mode or simple mode. By default, the switch operates in normal
mode. When the PowerConnect M6220/M6348/M8024/M8024-k switch is
operating in simple mode, a limited number of features are available to
configure. For features that are not available in simple mode, their
administrative Web pages and CLI commands are unavailable.
54 Switch Features
For information about enabling Simple mode, see "Managing General System
Settings" on page 243.
Port Aggregator
The Port Aggregator feature minimizes the administration required for
managing the PowerConnect M6220/M6348/M8024/M8024-k switch. When
the switch is operating in simple mode, the administrator can map internal
ports to external ports without having to know anything about STP, VLANs,
Link Aggregation or other L2/L3 protocols.
For information about configuring Port Aggregator features, see "Managing
General System Settings" on page 243.
Log Messages
The switch maintains in-memory log messages as well as persistent logs. You
can also configure remote logging so that the switch sends log messages to a
remote log server. You can also configure the switch to send log messages to a
configured SMTP server. This allows you to receive the log message in an e-
mail account of your choice. Switch auditing messages, CLI command
logging, Web logging, and SNMP logging can be enabled or disabled.
For information about configuring system logging, see "Monitoring and
Logging System Information" on page 207.
Switch Features 55
Integrated DHCP Server
PowerConnect M6220, M6348, M8024, and M8024-k switches include an
integrated DHCP server that can deliver host-specific configuration
information to hosts on the network. The switch DHCP server allows you to
configure IP address pools (scopes), and when a host’s DHCP client requests
an address, the switch DHCP server automatically assigns the host an address
from the pool.
For information about configuring the DHCP server settings, see
"Configuring DHCP Server Settings" on page 883.
56 Switch Features
File Management
You can upload and download files such as configuration files and system
images by using HTTP (web only), TFTP, Secure FTP (SFTP), or Secure
Copy (SCP). Configuration file uploads from the switch to a server are a good
way to back up the switch configuration. You can also download a
configuration file from a server to the switch to restore the switch to the
configuration in the downloaded file.
For information about uploading, downloading, and copying files, see
"Managing Images and Files" on page 333.
Switch Features 57
sFlow
sFlow is the standard for monitoring high-speed switched and routed
networks. sFlow technology is built into network equipment and gives
complete visibility into network activity, enabling effective management and
control of network resources. The PowerConnect M6220, M6348, M8024,
and M8024-k switches support sFlow version 5.
For information about configuring managing sFlow settings, see "Monitoring
Switch Traffic" on page 369.
58 Switch Features
Stacking Features (PCM6220, PCM6348, and
PCM8024-k Only)
Single IP Management
When multiple switches are connected together through the stack ports, they
operate as a single unit with a larger port count. The stack operates and is
managed as a single entity. One switch acts as the master, and the entire stack
is managed through the management interface (Web, CLI, or SNMP) of the
stack master.
Switch Features 59
Master Failover with Transparent Transition
The stacking feature supports a standby or backup unit that assumes the
stack master role if the stack master fails. As soon as a stack master failure is
detected, the standby unit initializes the control plane and enables all other
stack units with the current configuration. The standby unit maintains a
synchronized copy of the running configuration for the stack.
Security Features
Configurable Access and Authentication Profiles
You can configure rules to limit access to the switch management interface
based on criteria such as access type and source IP address of the
management host. You can also require the user to be authenticated locally or
by an external server, such as a RADIUS server.
60 Switch Features
For information about configuring access and authentication profiles, see
"Configuring Authentication, Authorization, and Accounting" on page 181.
TACACS+ Client
The switch has a TACACS+ client. TACACS+ provides centralized security
for validation of users accessing the switch. TACACS+ provides a centralized
user management system while still retaining consistency with RADIUS and
other authentication processes.
For information about configuring TACACS+ client settings, see
"Configuring Authentication, Authorization, and Accounting" on page 181.
RADIUS Support
The switch has a Remote Authentication Dial In User Service (RADIUS)
client and can support up to 32 named authentication and accounting
RADIUS servers. The switch also supports RADIUS Attribute 4, which is the
configuration of a NAS-IP address. You can also configure the switch to
accept RADIUS-assigned VLANs.
For information about configuring RADIUS client settings, see "Configuring
Authentication, Authorization, and Accounting" on page 181.
Switch Features 61
SSH/SSL
The switch supports Secure Shell (SSH) for secure, remote connections to
the CLI and Secure Sockets Layer (SSL) to increase security when accessing
the web-based management interface.
For information about configuring SSH and SSL settings, see "Configuring
Authentication, Authorization, and Accounting" on page 181.
Denial of Service
The switch supports configurable Denial of Service (DoS) attack protection
for eight different types of attacks.
For information about configuring DoS settings, see "Configuring Port and
System Security" on page 481.
Port Protection
A port may be put into the disabled state for any of the following reasons:
• BPDU Storm Protection: By default, if Spanning Tree Protocol (STP)
bridge protocol data units (BPDUs) are received at a rate of 15pps or
greater for three consecutive seconds on a port, the port will be
diagnostically disabled. The threshold is not configurable.
• DHCP Snooping: If DHCP packets are received on a port at a rate that
exceeds 15 pps, the port will be diagnostically disabled. The threshold is
configurable up to 300 pps for up to 15s long using the ip dhcp
snooping limit command. DHCP snooping is disabled by default.
The default protection limit is 15 pps.
62 Switch Features
• Dynamic ARP Inspection: By default, if Dynamic ARP Inspection packets
are received on a port at a rate that exceeds 15 pps for 1 second, the port
will be diagnostically disabled. The threshold is configurable up to 300 pps
and the burst is configurable up to 15s long using the ip arp
inspection limit command.
A port that is diagnostically disabled due to exceeding one of the above limits
may be returned to service using the no shut command.
Captive Portal
The Captive Portal feature blocks clients from accessing the network until
user verification has been established. When a user attempts to connect to
the network through the switch, the user is presented with a customized Web
page that might contain username and password fields or the acceptable use
policy. You can require users to be authenticated by a local or remote RADIUS
database before access is granted.
For information about configuring the Captive Portal features, see
"Configuring Captive Portal" on page 425.
Switch Features 63
Dot1x Monitor Mode
Monitor mode can be enabled in conjunction with Dot1x authentication to
allow network access even when the user fails to authenticate. The switch logs
the results of the authentication process for diagnostic purposes. The main
purpose of this mode is to help troubleshoot the configuration of a Dot1x
authentication on the switch without affecting the network access to the
users of the switch.
For information about enabling the Dot1X Monitor mode, see "Configuring
Port and System Security" on page 481.
64 Switch Features
Time-Based ACLs
With the Time-based ACL feature, you can define when an ACL is in effect
and the amount of time it is in effect.
For information about configuring time-based ACLs, see "Configuring Access
Control Lists" on page 523.
DHCP Snooping
DHCP Snooping is a security feature that monitors DHCP messages between
a DHCP client and DHCP server. It filters harmful DHCP messages and
builds a bindings database of (MAC address, IP address, VLAN ID, port)
tuples that are specified as authorized. DHCP snooping can be enabled
globally and on specific VLANs. Ports within the VLAN can be configured to
be trusted or untrusted. DHCP servers must be reached through trusted ports.
For information about configuring DHCP Snooping, see "Snooping and
Inspecting Traffic" on page 781.
Switch Features 65
Protected Ports (Private VLAN Edge)
Private VLAN Edge (PVE) ports are a Layer 2 security feature that provides
port-based security between ports that are members of the same VLAN. It is
an extension of the common VLAN. Traffic from protected ports is sent only
to the uplink ports and cannot be sent to other ports within the VLAN.
For information about configuring IPSG, see "Configuring Port-Based Traffic
Control" on page 687.
Switching Features
Flow Control Support (IEEE 802.3x)
Flow control enables lower speed switches to communicate with higher speed
switches by requesting that the higher speed switch refrains from sending
packets. Transmissions are temporarily halted to prevent buffer overflows.
For information about configuring flow control, see "Configuring Port-Based
Traffic Control" on page 687.
66 Switch Features
Jumbo Frames Support
Jumbo frames enable transporting data in fewer frames to ensure less
overhead, lower processing time, and fewer interrupts.
For information about configuring the port MTU, see "Configuring Port
Characteristics" on page 463.
Auto-MDI/MDIX Support
Your switch supports auto-detection between crossed and straight-through
cables. Media-Dependent Interface (MDI) is the standard wiring for end
stations, and the standard wiring for hubs and switches is known as Media-
Dependent Interface with Crossover (MDIX).
Switch Features 67
Auto Negotiation
Auto negotiation allows the switch to advertise modes of operation. The auto
negotiation function provides the means to exchange information between
two switches that share a point-to-point link segment, and to automatically
configure both switches to take maximum advantage of their transmission
capabilities.
PowerConnect M6220, M6348, M8024, and M8024-k switches enhance auto
negotiation by providing configuration of port advertisement. Port
advertisement allows the system administrator to configure the port speeds
that are advertised.
For information about configuring auto negotiation, see "Configuring Port
Characteristics" on page 463.
Port Mirroring
Port mirroring monitors and mirrors network traffic by forwarding copies of
incoming and outgoing packets from up to four source ports to a monitoring
port. The switch also supports flow-based mirroring, which allows you to copy
certain types of traffic to a single destination port. This provides flexibility—
instead of mirroring all ingress or egress traffic on a port the switch can mirror
a subset of that traffic. You can configure the switch to mirror flows based on
certain kinds of Layer 2, Layer 3, and Layer 4 information.
For information about configuring port mirroring, see "Monitoring Switch
Traffic" on page 369.
68 Switch Features
Static and Dynamic MAC Address Tables
You can add static entries to the switch’s MAC address table and configure
the aging time for entries in the dynamic MAC address table. You can also
search for entries in the dynamic table based on several different criteria.
For information about viewing and managing the MAC address table, see
"Managing the MAC Address Table" on page 861.
Switch Features 69
Priority-based Flow Control (PFC)
NOTE: PFC is supported only on the PCM8024-k. The PCM6220, PCM6348, and
PCM8024 switches do not support PFC.
The Priority-based Flow Control feature allows the switch to pause or inhibit
transmission of individual priorities within a single physical link. By
configuring PFC to pause a congested priority (priorities) independently,
protocols that are highly loss sensitive can share the same link with traffic that
has different loss tolerances. Priorities are differentiated by the priority field
of the 802.1Q VLAN header.
NOTE: An interface that is configured for PFC is automatically disabled for 802.3x
flow control.
For information about configuring the PFC feature, see "Configuring Data
Center Bridging Features" on page 837.
70 Switch Features
The FCoE Initialization Protocol (FIP) is used to perform the functions of
FC_BB_E device discovery, initialization, and maintenance as defined in the
ANSI T11 FC-BB-5 specification. The PCM8024-k switch supports FIP
snooping, which is a frame inspection method used by FIP Snooping Bridges
to monitor FIP frames and apply policies based upon the L2 header
information in those frames. For information about configuring the FIP
Snooping feature, see "Configuring Data Center Bridging Features" on
page 837.
VLAN Support
VLANs are collections of switching ports that comprise a single broadcast
domain. Packets are classified as belonging to a VLAN based on either the
VLAN tag or a combination of the ingress port and packet contents. Packets
sharing common attributes can be groups in the same VLAN. The
PowerConnect M6220, M6348, M8024, and M8024-k switches are in full
compliance with IEEE 802.1Q VLAN tagging.
Switch Features 71
Port-Based VLANs
Port-based VLANs classify incoming packets to VLANs based on their ingress
port. When a port uses 802.1X port authentication, packets can be assigned
to a VLAN based on the result of the 802.1X authentication a client uses
when it accesses the switch. This feature is useful for assigning traffic to
Guest VLANs or Voice VLANs.
IP Subnet-based VLAN
This feature allows incoming untagged packets to be assigned to a VLAN and
traffic class based on the source IP address of the packet.
MAC-based VLAN
This feature allows incoming untagged packets to be assigned to a VLAN and
traffic class based on the source MAC address of the packet.
Voice VLAN
The Voice VLAN feature enables switch ports to carry voice traffic with
defined priority. The priority level enables the separation of voice and data
traffic coming onto the port. Voice VLAN is the preferred solution for
enterprises wishing to deploy voice services in their network. The Voice VLAN
feature is not available only on the M6348 switch.
72 Switch Features
Guest VLAN
The Guest VLAN feature allows a switch to provide a distinguished service to
unauthenticated users. This feature provides a mechanism to allow visitors
and contractors to have network access to reach external network with no
ability to browse information on the internal LAN.
For information about configuring the Guest VLAN see "Configuring Port
and System Security" on page 481.
Double VLANs
The Double VLAN feature (IEEE 802.1QinQ) allows the use of a second tag
on network traffic. The additional tag helps differentiate between customers
in the Metropolitan Area Networks (MAN) while preserving individual
customer’s VLAN identification when they enter their own 802.1Q domain.
Switch Features 73
Spanning Tree Protocol Features
For information about configuring Spanning Tree Protocol features, see
"Configuring the Spanning Tree Protocol" on page 629.
74 Switch Features
Bridge Protocol Data Unit (BPDU) Guard
Spanning Tree BPDU Guard is used to disable the port in case a new device
tries to enter the already existing topology of STP. Thus devices, which were
originally not a part of STP, are not allowed to influence the STP topology.
BPDU Filtering
When spanning tree is disabled on a port, the BPDU Filtering feature allows
BPDU packets received on that port to be dropped. Additionally, the BPDU
Filtering feature prevents a port in Port Fast mode from sending and receiving
BPDUs. A port in Port Fast mode is automatically placed in the forwarding
state when the link is up to increase convergence time.
Link Aggregation
Up to eight ports can combine to form a single Link Aggregation Group
(LAG). This enables fault tolerance protection from physical link disruption,
higher bandwidth connections and improved bandwidth granularity.
Per IEEE 802.1AX, only links with the same operational characteristics, such
as speed and duplex setting, may be aggregated. PowerConnect switches
aggregate links only if they have the same operational speed and duplex
setting, as opposed to the configured speed and duplex setting. This allows
operators to aggregate links that use auto negotiation to set values for speed
and duplex. Dissimilar ports will not become active in the LAG if their
operational settings do not match those of the first member of the LAG.
PowerConnect switches also support setting the MTU on a LAG. When a link
becomes active in a LAG, its MTU is dynamically changed to the LAG MTU.
When the link leaves the LAG, its MTU reverts to the link setting.
Switch Features 75
achievable between a given pair of systems. LACP automatically determines,
configures, binds, and monitors the binding of ports to aggregators within the
system.
76 Switch Features
Routing Features
Address Resolution Protocol (ARP) Table Management
You can create static ARP entries and manage many settings for the dynamic
ARP table, such as age time for entries, retries, and cache size.
For information about managing the ARP table, see "Configuring IP Routing"
on page 907.
VLAN Routing
PowerConnect M6220, M6348, M8024, and M8024-k switches support VLAN
routing. You can also configure the software to allow traffic on a VLAN to be
treated as if the VLAN were a router port.
For information about configuring VLAN routing interfaces, see "Configuring
Routing Interfaces" on page 867.
IP Configuration
The switch IP configuration settings to allow you to configure network
information for VLAN routing interfaces such as IP address and subnet mask,
MTU size, and ICMP redirects. Global IP configuration settings for the
switch allow you to enable or disable the generation of several types of ICMP
messages and enable or disable the routing mode.
For information about managing global IP settings, see "Configuring IP
Routing" on page 907.
Switch Features 77
BOOTP/DHCP Relay Agent
The switch BootP/DHCP Relay Agent feature relays BootP and DHCP
messages between DHCP clients and DHCP servers that are located in
different IP subnets.
For information about configuring the BootP/DHCP Relay agent, see
"Configuring L2 and L3 Relay Features" on page 931.
Router Discovery
For each interface, you can configure the Router Discovery Protocol (RDP) to
transmit router advertisements. These advertisements inform hosts on the
local network about the presence of the router.
For information about configuring router discovery, see "Configuring IP
Routing" on page 907.
Routing Table
The routing table displays information about the routes that have been
dynamically learned. You can configure static and default routes and route
preferences. A separate table shows the routes that have been manually
configured.
For information about viewing the routing table, see "Configuring IP
Routing" on page 907.
78 Switch Features
Virtual Router Redundancy Protocol (VRRP)
VRRP provides hosts with redundant routers in the network topology without
any need for the hosts to reconfigure or know that there are multiple routers.
If the primary (master) router fails, a secondary router assumes control and
continues to use the virtual router IP (VRIP) address.
VRRP Route Interface Tracking extends the capability of VRRP to allow
tracking of specific route/interface IP states within the router that can alter
the priority level of a virtual router for a VRRP group.
For information about configuring VRRP settings, see "Configuring VRRP"
on page 1057.
Switch Features 79
IPv6 Routes
Because IPv4 and IPv6 can coexist on a network, the router on such a network
needs to forward both traffic types. Given this coexistence, each switch
maintains a separate routing table for IPv6 routes. The switch can forward
IPv4 and IPv6 traffic over the same set of interfaces.
For information about configuring IPv6 routes, see "Configuring IPv6
Routing" on page 1081.
OSPFv3
OSPFv3 provides a routing protocol for IPv6 networking. OSPFv3 is a new
routing component based on the OSPF version 2 component. In dual stack
IPv6, you can configure and use both OSPF and OSPFv3 components.
For information about configuring OSPFv3, see "Configuring OSPF and
OSPFv3" on page 955.
DHCPv6
DHCPv6 incorporates the notion of the “stateless” server, where DHCPv6 is
not used for IP address assignment to a client, rather it only provides other
networking information such as DNS, Network Time Protocol (NTP), and/or
Session Initiation Protocol (SIP) information.
For information about configuring DHCPv6 settings, see "Configuring
DHCPv6 Server and Relay Settings" on page 1105.
80 Switch Features
Quality of Service (QoS) Features
NOTE: Some features that can affect QoS, such as ACLs and Voice VLAN, are
described in other sections within this chapter.
Switch Features 81
Internet Small Computer System Interface (iSCSI) Optimization
IGMP Snooping
Internet Group Management Protocol (IGMP) Snooping is a feature that
allows a switch to forward multicast traffic intelligently on the switch.
Multicast traffic is traffic that is destined to a host group. Host groups are
identified by the destination MAC address, i.e. the range 01:00:5e:00:00:00 to
01:00:5e:7f:ff:ff:ff for IPv4 multicast traffic or 33:33:xx:xx:xx:xx for IPv6
multicast traffic. Based on the IGMP query and report messages, the switch
forwards traffic only to the ports that request the multicast traffic. This
prevents the switch from broadcasting the traffic to all ports and possibly
affecting network performance.
82 Switch Features
IGMP Snooping Querier
When Protocol Independent Multicast (PIM) and IGMP are enabled in a
network with IP multicast routing, the IP multicast router acts as the IGMP
querier. However, if it is desirable to keep the multicast network Layer 2
switched only, the IGMP Snooping Querier can perform the query functions
of a Layer 3 multicast router.
MLD Snooping
In IPv4, Layer 2 switches can use IGMP Snooping to limit the flooding of
multicast traffic by dynamically configuring Layer 2 interfaces so that
multicast traffic is forwarded to only those interfaces associated with IP
multicast address.
In IPv6, MLD snooping performs a similar function. With MLD snooping,
IPv6 multicast data is selectively forwarded to a list of ports intended to
receive the data (instead of being flooded to all of the ports in a VLAN). This
list is constructed by snooping IPv6 multicast control packets.
Switch Features 83
Layer 3 Multicast Features
For information about configuring L3 multicast features, see "Managing IPv4
and IPv6 Multicast" on page 1177.
IGMP Proxy
The IGMP Proxy feature allows the switch to act as a proxy for hosts by
sending IGMP host messages on behalf of the hosts that the switch
discovered through standard IGMP router interfaces.
84 Switch Features
Protocol Independent Multicast—Sparse Mode
Protocol Independent Multicast-Sparse Mode (PIM-SM) is used to efficiently
route multicast traffic to multicast groups that may span wide area networks,
and where bandwidth is a constraint. PIM-SM uses shared trees by default
and implements source-based trees for efficiency. This data threshold rate is
used to toggle between trees.
MLD/MLDv2 (RFC2710/RFC3810)
MLD is used by IPv6 systems (listeners and routers) to report their IP
multicast addresses memberships to any neighboring multicast routers. The
implementation of MLD v2 is backward compatible with MLD v1.
MLD protocol enables the IPv6 router to discover the presence of multicast
listeners, the nodes that want to receive the multicast data packets, on its
directly attached interfaces. The protocol specifically discovers which
multicast addresses are of interest to its neighboring nodes and provides this
information to the multicast routing protocol that make the decision on the
flow of the multicast data packets.
Switch Features 85
86 Switch Features
3
Hardware Overview
This section provides an overview of the switch hardware. The topics covered
in this section include:
• PowerConnect M6220, M6348, M8024, and M8024-k Front Panel
• Console (RS-232) Port
• Out-of-Band Management Port
• LED Definitions
• Switch Addresses
Hardware Overview 87
Figure 3-1. PowerConnect M6220 Front Panel
Stacking Module or
10 Gb Module
10 Gb Module
10/100/100Base-T Auto-sensing
Full-Duplex RJ-45 Ports
Console Port
88 Hardware Overview
PowerConnect M6348 Front Panel
The PowerConnect M6348 front panel provides 16 10/100/1000Base-T ports.
There are also 32 internal 1 gigabit ports that connect to each of the server
blades.
10/100/100Base-T Auto-sensing
Full-Duplex RJ-45 Ports
10 Gb SFP+ Ports
10 Gb CX4 Ports
Console Port
Hardware Overview 89
PowerConnect M8024 Front Panel
The PowerConnect M8024 front panel supports up to eight 10-gigabit ports.
It has two 10-gigabit bays that can support SFP+, CX-4, or 10GBase-T
modules. The SFP+ Module supports four ports, the CX-4 module supports
three ports, and the 10GBase-T module supports two ports. The modules can
be used in any combination and are sold separately. There are also 16 internal
10-gigabit ports that connect to each of the server blades.
10 Gb SFP+ Module
10 Gb CX4 Module
Console Port
90 Hardware Overview
PowerConnect M8024-k Front Panel
The PowerConnect M8024-k front panel includes four SFP+ ports and an
expansion slot for 10-Gigabit modules. The expansion slot can support
SFP+, CX-4, or 10GBase-T modules. The SFP+ Module supports four ports,
the CX-4 module supports three ports, and the 10GBase-T module supports
two ports. Each module is sold separately. There are also 16 internal
10-gigabit ports that connect to each of the server blades. PowerConnect
M8024-k switches can be stacked using the 10G SFP+ fiber ports.
Figure 3-4 shows the PowerConnect 8024-k front panel:
NOTE: The console port supports asynchronous data of eight data bits, one stop
bit, no parity bit, and no flow control. The default baud rate is 9600 bps. The
console port supports serial communication only and does not support USB flash
memory or other devices with a USB connector.
Hardware Overview 91
NOTE: If you are installing a stack of switches, you need to assemble and cable
the stack before powering up and configuring it. When a stack is powered up for
the first time, the switches elect a stack master, which may occupy any location
in the stack. Connect the terminal to the stack master. If you connect the terminal
to a subordinate switch, you will not be able to use the CLI.
Console Redirect
The Dell M1000e Server Chassis includes a console redirect feature that
allows you to manage each PCM6220, PCM6348, PCM8024, and
PCM8024-k module from a single serial connection to the chassis. For more
information about console redirect, see the Dell Blade Server CMC User's
Guide at support.dell.com/manuals.
NOTE: When you use console redirect to access a module, the external console
port on that module is inactive and any current console sessions are terminated.
92 Hardware Overview
LED Definitions
This section describes the LEDs on the front panel of the switch and on the
optional modules that plug into the back panel.
Port LEDs
The integrated external 10/100/1000Base-T switch ports on the
PowerConnect M6220 and M6348 switches include two LEDs. The
integrated SFP+ switch ports on the PowerConnect M8024-k include one
LED.
Link Activity
Table 3-1 contains port LED definitions for the integrated 10/100/1000
Base-T ports on the PowerConnect M6220 and M6348 switches.
Hardware Overview 93
SFP+ Port LEDs (PowerConnect M6348 and M8024-k)
Each integrated SFP port on the PowerConnect M6348 switch includes two
LEDs. Table 3-3 contains SFP port LED definitions for the PowerConnect
M6348.
Each integrated SFP port on the PowerConnect M8024-k switch includes one
LED. Table 3-3 contains SFP port LED definitions for the PowerConnect
M8024-k.
The 10GBase-T module has two or three LEDs per port, the SFP+ module
has one LED per port, and the Stacking/10 GbE module does not have any
LEDs.
94 Hardware Overview
Table 3-4. 10GBase-T Module Definitions
NOTE: On the PowerConnect M6220, the module must be inserted into Bay 2 to
operate. When the module is inserted into Bay 1, it will not operate and the
Wrong Bay LED is solid red.
Hardware Overview 95
System LEDs
The system LEDs for the PowerConnect M6220, M6348, M8024, and
M8024-k switches are located on the right side of the front panel next to the
console port.
Table 3-6 contains the status LED definitions for the PowerConnect M6220
and M6348 switches.
Table 3-6. PCM6220 and PCM6348 Power and Status LED Definitions
96 Hardware Overview
Table 3-7 contains the status LED definitions for the PowerConnect M8024
and M8024-k switches.
Table 3-7. PCM8024 and PCM8024-k Power and Status LED Definitions
Switch Addresses
The switch allocates MAC addresses from the Vital Product Data information
stored locally in flash. MAC addresses are used as follows:
Hardware Overview 97
Shown below are three commands that display the MAC addresses used by
the switch:
console#show system
Fans:
Power Supplies:
98 Hardware Overview
console#show ip interface out-of-band
IP Address..................................... 10.27.21.29
Subnet Mask.................................... 255.255.252.0
Default Gateway................................ 10.27.20.1
Configured IPv4 Protocol....................... DHCP
Burned In MAC Address.......................... 001E.C9F0.004E
Hardware Overview 99
100 Hardware Overview
4
Using Dell OpenManage Switch
Administrator
This section describes how to use the Dell OpenManage Switch
Administrator application. The topics covered in this section include:
• About Dell OpenManage Switch Administrator
• Starting the Application
• Understanding the Interface
• Using the Switch Administrator Buttons and Links
• Defining Fields
Browser Version
Internet Explorer v9
Mozilla Firefox v14
Safari v5.0
Chrome v21
NOTE: Additional operating systems and browsers might be compatible but have
not been explicitly tested with Dell OpenManage Switch Administrator.
NOTE: The switch is configured with a default user name of root, and the
default password is calvin. For information about creating a user and
password or changing the default password, see "Configuring
Authentication, Authorization, and Accounting" on page 181.
4 Click Submit.
NOTE: A few pages contain a button that occurs only on that page. Page-specific
buttons are described in the sections that pertain to those pages.
Defining Fields
User-defined fields can contain 1–159 characters, unless otherwise noted on
the Dell OpenManage Switch Administrator web page.
All characters may be used except for the following:
• \
• /
• :
• *
• ?
• <
• >
• |
Console Connection
Use the following procedures to connect to the CLI by connecting to the
console port. For more information about creating a serial connection, see the
Getting Started Guide available at support.dell.com/manuals.
1 Connect the DB-9 connector of the supplied serial cable to a management
station, and connect the USB type-A connector to the switch console port.
The console port is located on the right side of the front panel.
NOTE: For a stack of switches (PCM6220 and PCM6348 only), be sure to
connect to the console port on the Master switch. The Master LED (M) is
illuminated on the stack Master.
Telnet Connection
Telnet is a terminal emulation TCP/IP protocol. ASCII terminals can be
virtually connected to the local device through a TCP/IP protocol network.
Telnet connections are enabled by default, and the Telnet port number is 23.
The switch supports up to four simultaneous Telnet sessions. All CLI
commands can be used over a Telnet session.
To connect to the switch using Telnet, the switch must have an IP address,
and the switch and management station must have network connectivity. You
can use any Telnet client on the management station to connect to the
switch.
You can also initiate a Telnet session from the OpenManage Switch
Administrator. For more information, see "Initiating a Telnet Session from the
Web Interface" on page 255.
Enter a question mark (?) after each word you enter to display available
command keywords or parameters.
console(config)#vlan ?
If the help output shows a parameter in angle brackets, you must replace the
parameter with a value.
console#telnet ?
If the characters you entered are not enough for the switch to identify a single
matching command, continue entering characters until the switch can
uniquely identify the command. Use the question mark (?) to display the
available commands matching the characters already entered.
console(config)#
Negating Commands
For many commands, the prefix keyword no is entered to cancel the effect of
a command or reset the configuration to the default value. Many
configuration commands have this capability.
If you attempt to execute a command and receive an error message, use the
question mark (?) to help you determine the possible keywords or parameters
that are available.
Port Type
Table 5-4 describes how to enter the port type in the CLI. The port type is not
case sensitive.
Feature Default
IP address None
Subnet mask None
Default gateway None
DHCP client Enabled on out-of-band (OOB) interface.
VLAN 1 Members All switch ports
SDM template Dual IPv4 and IPv6 routing
Simple mode Disabled—PCM6220, PCM6348, and
PCM8024
Enabled —PCM8024-k
Users root
- password: calvin
- level: 15
Minimum password length 8 characters
IPv6 management mode Enabled
SNTP client Disabled
Global logging Enabled
Switch auditing Disabled
CLI command logging Disabled
Web logging Disabled
SNMP logging Disabled
Console logging Enabled (Severity level: debug and above)
Feature Default
RAM logging Enabled (Severity level: debug and above)
Persistent (FLASH) logging Disabled
DNS Enabled (No servers configured)
SNMP Enabled (SNMPv1)
SNMP Traps Enabled
Auto Configuration Enabled
Auto Save Disabled
Stacking (PCM6220, PCM6348, and Enabled
PCM8024-k)
Nonstop Forwarding on the Stack Enabled
(PCM6220, PCM6348, and PCM8024-k)
sFlow Enabled
ISDP Enabled (Versions 1 and 2)
RMON Enabled
TACACS+ Not configured
RADIUS Not configured
SSH/SSL Disabled
Telnet Enabled
Denial of Service Protection Disabled
Captive Portal Disabled
Dot1x Authentication (IEEE 802.1X) Disabled
MAC-Based Port Security All ports are unlocked
Access Control Lists (ACL) None configured
IP Source Guard (IPSG) Disabled
DHCP Snooping Disabled
Dynamic ARP Inspection Disabled
Protected Ports (Private VLAN Edge) None
Feature Default
Flow Control Support (IEEE 802.3x) Enabled
Head of Line Blocking Prevention Disabled
Maximum Frame Size 1500 bytes
Auto-MDI/MDIX Support Enabled
Auto Negotiation Enabled
Advertised Port Speed Maximum Capacity
Broadcast Storm Control Disabled
Port Mirroring Disabled
LLDP Enabled
LLDP-MED Disabled
MAC Table Address Aging 300 seconds (Dynamic Addresses)
Cisco Protocol Filtering (LLPF) No protocols are blocked
DHCP Layer 2 Relay Disabled
Default VLAN ID 1
Default VLAN Name Default
GVRP Disabled
GARP Timers Leave: 60 centiseconds
Leave All: 1000 centiseconds
Join: 20 centiseconds
Voice VLAN Disabled
Guest VLAN Disabled
RADIUS-assigned VLANs Disabled
Double VLANs Disabled
Spanning Tree Protocol (STP) Enabled
STP Operation Mode IEEE 802.1w Rapid Spanning Tree
Optional STP Features Disabled
STP Bridge Priority 32768
Feature Default
Multiple Spanning Tree Disabled
Link Aggregation No LAGs configured
LACP System Priority 1
Routing Mode Disabled
OSPF Admin Mode Enabled
OSPF Router ID 0.0.0.0
IP Helper and UDP Relay Enabled
RIP Enabled
VRRP Disabled
Tunnel and Loopback Interfaces None
IPv6 Routing Disabled
DHCPv6 Disabled
OSPFv3 Enabled
DiffServ Enabled
Auto VoIP Disabled
Auto VoIP Traffic Class 6
PFC (PCM8024-k only) Disabled; no classifications configured.
DCBx version (PCM8024-k only) Auto detect
FIP snooping (PCM8024-k only) Disabled globally and on all VLANs
iSCSI (PCM6348/PCM8024/PCM8024-k) Enabled
Bridge Multicast Filtering Enabled
MLD Snooping Enabled
IGMP Snooping Enabled
IGMP Snooping Querier Disabled
GMRP Disabled
IPv4 Multicast Disabled
IPv6 Multicast Disabled
Feature Description
IP Address On an IPv4 network, the a 32-bit number that uniquely
identifies a host on the network. The address is
expressed in dotted-decimal format, for example
192.168.10.1.
Subnet Mask Determines which bits in the IP address identify the
network, and which bits identify the host. Subnet
masks are also expressed in dotted-decimal format, for
example 255.255.255.0.
Feature Description
Default Gateway Typically a router interface that is directly connected to
the switch and is in the same subnet. The switch sends
IP packets to the default gateway when it does not
recognize the destination IP address in a packet.
DHCP Client Requests network information from a DHCP server on
the network.
Domain Name System Translates hostnames into IP addresses. The server
(DNS) Server maintains a domain name databases and their
corresponding IP addresses.
Default Domain Name Identifies your network, such as dell.com. If you enter a
hostname and do not include the domain name
information, the default domain name is automatically
appended to the hostname.
Host Name Mapping Allows you to statically map an IP address to a
hostname.
Configuring the DNS information, default domain name, and host name
mapping help the switch identify and locate other devices on the network and
on the Internet. For example, to upgrade the switch software by using a TFTP
NOTE: The OOB port is an internal Ethernet interface that is connected to the
chassis management controller through the chassis mid-plane.
Out-of-Band Interface
Use the Out of Band Interface page to assign the Out of Band Interface IP
address and subnet mask or to enable/disable the DHCP client for address
information assignment. DHCP is enabled by default on the OOB interface.
To display the Out of Band Interface page, click System → IP Addressing →
Out of Band Interface in the navigation panel.
To enable the DHCP client and allow a DHCP server on your network to
automatically assign the network information to the OOB interface, select
DHCP from the Protocol menu. If you statically assign the network
information, make sure the Protocol menu is set to None.
NOTE: You do not need to configure any additional fields on the page. For
information about VLAN routing interfaces, see "Configuring Routing Interfaces"
on page 867.
3 In the Next Hop IP Address field, enter the IP address of the default
gateway.
4 Click Apply.
For more information about configuring routes, see "Configuring IP Routing"
on page 907.
To configure DNS server information, click the Add link and enter the IP
address of the DNS server in the available field.
To map a host name to an IP address, click the Add link, type the name of the
host and its IP address in the appropriate fields, and then click Apply.
Use the Show All link to view all configured host name-to-IP address
mappings.
Command Purpose
configure Enter Global Configuration mode.
interface out-of-band Enter Interface Configuration mode for the OOB port.
ip address dhcp Enable the DHCP client.
CTRL + Z Exit to Privileged EXEC mode.
show ip interface out-of- Display network information for the OOB port.
band
Command Purpose
configure Enter Global Configuration mode.
interface vlan 1 Enter Interface Configuration mode for VLAN 1.
ip address dhcp Enable the DHCP client.
ipv6 address dhcp Enable the DHCPv6 client.
CTRL + Z Exit to Privileged EXEC mode.
show ip interface vlan 1 Display network information for VLAN 1.
Command Purpose
release dhcp interface Force the DHCPv4 client to release a leased address on the
specified interface.
renew dhcp interface Force the DHCP client to immediately renew an IPv4
address lease.
show dhcp lease Display IPv4 addresses leased from a DHCP server.
interface [interface]
show ipv6 dhcp interface Display information about the IPv6 DHCP information
[interface] for all interfaces or for the specified interface.
debug dhcp packet Display debug information about DHCPv4 client activities
and to trace DHCPv4 packets to and from the local
DHCPv4 client.
debug ipv6 dhcp Display debug information about DHCPv6 client activities
and to trace DHCPv6 packets to and from the local
DHCPv6 client.
Command Purpose
configure Enter Global Configuration mode.
interface out-of-band Enter Interface Configuration mode for the OOB
port.
ip address ip_address Configure a static IP address and subnet mask.
subnet_mask [gateway_ip] Optionally, you can also configure a default gateway.
CTRL + Z Exit to Privileged EXEC mode.
show ip interface out-of-band Verify the network information for the OOB port.
Command Purpose
configure Enter Global Configuration mode.
interface vlan 1 Enter Interface Configuration mode for VLAN 1.
ip address ip_address Enter the IP address and subnet mask.
subnet_mask
ipv6 address prefix/prefix-length Enter the IPv6 address and prefix.
[eui64]
ipv6 enable Enable IPv6 on the interface.
exit Exit to Global Configuration mode
ip default-gateway ip_address Configure the default gateway.
exit Exit to Privileged Exec mode.
show ip interface vlan 1 Verify the network information for VLAN 1.
show ipv6 interface vlan 1 Verify IPv6 network information for VLAN 1.
Command Purpose
configure Enter Global Configuration mode.
ip domain-lookup Enable IP DNS-based host name-to-address translation.
ip name-server Enter the IP address of an available name server to use to
ip_address resolve host names and IP addresses.
You can specify up to six DNS servers. The first server you
configure is the primary DNS server.
ip domain-name name Define a default domain name to complete unqualified
host names.
ip host name ip_address Use to configure static host name-to-address mapping in
the host cache.
ip address-conflict- Trigger the switch to run active address conflict detection
detect run by sending gratuitous ARP packets for IPv4 addresses on
the switch.
CTRL + Z Exit to Privileged EXEC mode.
show ip interface vlan 1 Verify the network information for VLAN 1.
show hosts Verify the configured network information and view the
dynamic host mappings.
show ip address-conflict View the status information corresponding to the last
detected address conflict.
clear ip address-conflict- Clear the address conflict detection status in the switch.
detect
IP Address........................ 10.27.22.153
Subnet Mask...................... 255.255.255.0
Default Gateway.................. 10.27.22.1
Protocol Current................. DHCP
Burned In MAC Address............ 001E.C9AA.AA08
5 View additional network information.
console#show hosts
Host name:
Default domain: sunny.dell.com dell.com
Name/address lookup is enabled
Name servers (Preference order): 10.27.138.20,
10.27.138.21
Configured host name-to-address mapping:
Host Addresses
----------- ------------------------------------
admin-laptop 10.27.65.103
Stacking Overview
PowerConnect M6220, PowerConnect M6348, and PowerConnect M8024-k
switches include a stacking feature that allows multiple switches to operate as
a single unit. PowerConnect M6220 and PowerConnect M6348 switches
support up to 12 switches in a stack, and PowerConnect M8024-k switches
support up to six switches in a stack. PCM8024-k modules can be stacked
using any port as long as the link bandwidth for parallel stacking links is the
same. The 10G SFP+ ports default to Ethernet mode, so the ports must be
reconfigured as stacking ports.
If Priority Flow Control (PFC) is enabled on any port in the stack, stacking is
supported at distances up to 100 meters on the stacking ports. If PFC is not
enabled, stacking is supported up to the maximum distance supported by the
transceiver on the stack links. Note that PFC cannot be enabled on stacking
ports - the system handles the buffering and flow control automatically.
A single switch in the stack manages all the units in the stack (the stack
master), and you manage the stack by using a single IP address. The IP
address of the stack does not change, even if the stack master changes.
M6220
Switches
Stacking
Cables
The stack in Figure 8-1 has six M6220 switches connected through the
stacking ports. The first stacking port on each switch is physically connected
to the second stacking port on the next switch by using a stacking cable. The
first stacking port on switch six is connected to the second stacking port on
switch one.
Stacking Cable
SFP+ Ports
Configured as
Stack Ports
Initiating a Failover
The NSF feature allows you to initiate a failover using the initiate failover
command, which causes the former stack master to reboot (cold start), and
the new master to perform a warm restart.
Initiating a failover reloads the stack master, triggering the backup unit to
take over. Before the failover, the stack master pushes application data and
other important information to the backup unit. Although the handoff is
controlled and causes minimal network disruption, some application state is
lost, such as pending timers and other pending internal events.
Checkpointing
Switch applications (features) that build up a list of data such as neighbors or
clients can significantly improve their restart behavior by remembering this
data across a warm restart. This data can either be stored persistently, as
DHCP server and DHCP snooping store their bindings database, or the stack
master can checkpoint this data directly to the standby unit. Persistent
storage allows an application on a standalone unit to retain its data across a
restart, but since the amount of storage is limited, persistent storage is not
always practical.
NOTE: The switch cannot guarantee that a backup unit has exactly the same data
that the stack master has when it fails. For example, the stack master might fail
before the checkpoint service gets data to the backup if an event occurs shortly
before a failover.
Table 8-1 lists the applications on the switch that checkpoint data and
describes the type of data that is checkpointed.
NOTE: Each switch is assigned three consecutive MAC addresses. The switch
uses the MAC addresses for the service port, network port, and routing
interfaces. A stack of switches uses the MAC addresses assigned to the stack
master.
If the backup unit assumes control due to a stack master failure or warm
restart, the backup unit continues to use the original stack master’s MAC
addresses. This reduces the amount of disruption to the network because
ARP and other L2 entries in neighbor tables remain valid after the failover to
the backup unit.
Stack units should always be connected with a ring topology (or other
biconnected topology), so that the loss of a single stack link does not divide
the stack into multiple stacks. If a stack is partitioned such that some units
lose all connectivity to other units, then both parts of the stack start using the
same MAC addresses. This can cause severe problems in the network.
If you move the stack master to a different place in the network, make sure
you power down the whole stack before you redeploy the stack master so that
the stack members do not continue to use the MAC address of the redeployed
switch.
NOTE: The changes you make to the Stacking configuration pages take effect only
after the device is reset.
Unit Configuration
Use the Unit Configuration page to change the unit number and unit type
(Management, Member, or Standby).
To display the Unit Configuration page, click System → Stack Management
→ Unit Configuration in the navigation panel.
3 Specify the switch ID, and select the model number of the switch.
4 Click Apply.
To display the Stack Port Summary page, click System → Stack Management
→ Stack Port Summary in the navigation panel.
NOTE: The OSPF feature uses NSF to enable the hardware to continue forwarding
IPv4 packets using OSPF routes while a backup unit takes over stack master
responsibility. To configure NSF on a stack that uses OSPF or OSPFv3, see "NSF
OSPF Configuration (PCM6220, PCM6348, and PCM8024-k Only)" on page 981 and
"NSF OSPFv3 Configuration (PCM6220, PCM6348, and PCM8024-k Only)" on
page 998.
To cause the maser unit to failover to the standby unit, click Initiate Failover.
The failover results in a warm restart of the stack master. Initiating a failover
reloads the stack master, triggering the backup unit to take over.
Command Purpose
configure Enter Global Configuration mode.
switch current_ID Change the switch ID number. The valid range is 1-10.
renumber new_ID NOTE: Changing the ID number causes all switches in the
stack to be reset to perform stack master renumbering. The
running configuration is cleared when the units reset.
stack Enter Global Stack Configuration mode.
initiate failover Move the management switch functionality from the
master switch to the standby switch.
standby unit Specify the stack member that will come up as the master
if a stack failover occurs.
set description unit Configure a description for the specified stack member.
NOTE: The OSPF feature uses NSF to enable the hardware to continue forwarding
IPv4 packets using OSPF routes while a backup unit takes over stack master
responsibility. Additional NSF commands are available in OSPF and OSPFv3
command modes. For more information, see "NSF OSPF Configuration (PCM6220,
PCM6348, and PCM8024-k Only)" on page 981 and "NSF OSPFv3 Configuration
(PCM6220, PCM6348, and PCM8024-k Only)" on page 998
Command Purpose
show switch [stack- View information about all stack members or the specified
member-number] member.
show switch stack- View the ID of the switch that will assume the role of the
standby stack master if it goes down.
show switch stack-port View information about the stacking ports.
show switch stack-port View the statistics about the data the stacking ports have
counters transmitted and received.
show supported View the PowerConnect models that are supported in the
switchtype stack and the switch index (SID) associated with each
model.
show nsf View summary information about the NSF feature.
show checkpoint View information about checkpoint messages generated by
statistics the stack master.
clear checkpoint Reset the checkpoint statistics counters to zero.
statistics
Basic Failover
In this example, the stack has four members that are connected in a ring
topology, as Figure 8-13 shows.
When all four units are up and running, the show switch CLI command gives
the following output:
console#show switch
SW Management Standby Preconfig Plugged- Switch Code
Status Status Model ID in Model Status Version
ID
--- --------- ------- -------- --------- ------- --------
1 Stack Member PCM6348 PCM6348 OK 9.19.0.2
2 Stack Member PCM6348 PCM6348 OK 9.19.0.2
3 Mgmt Switch PCM6348 PCM6348 OK 9.19.0.2
4 Stack Member PCM6348 PCM6348 OK 9.19.0.2
When the failed unit resumes normal operation, the previous configuration
that exists for that unit is reapplied by the stack master.
To permanently remove the unit from the stack, enter into Stack Config
Mode and use the member command, as the following example shows.
console#configure
console(config)#stack
console(config-stack)#no member 2
console(config-stack)#exit
console(config)#exit
console#show switch
SW Management Standby Preconfig Plugged- Switch Code
Status Status Model ID in Model Status Version
ID
--- --------- ------- -------- ------------------- --------
1 Stack Member PCM6348 PCM6348 OK 9.19.0.2
3 Mgmt Switch PCM6348 PCM6348 OK 9.19.0.2
4 Stack Member PCM6348 PCM6348 OK 9.19.0.2
If the stack master fails, all hosts connected to that unit lose network access
until that unit reboots. The hardware on surviving units continues to enforce
source filters IPSG installed prior to the failover. Valid hosts continue to
communicate normally. During the failover, the hardware continues to drop
data packets from unauthorized hosts so that security is not compromised.
When the stack master fails, session A drops. The initiator at 10.1.1.10
detects a link down on its primary NIC and attempts to reestablish the
session on its backup NIC to a different IP address on the disk array. The
hardware forwards the packets to establish this new session, but assuming the
session is established before the control plane is restarted on the backup unit,
the new session receives no priority treatment in the hardware.
Session B remains established and fully functional throughout the restart and
continues to receive priority treatment in the hardware.
If the stack master fails, its link to the aggregation router is removed from the
LAG. When the control plane restarts, both routing interfaces come back up
by virtue of the LAGs coming up. OSPF sends grace LSAs to inform its OSPF
neighbors (the aggregation routers) that it is going through a graceful restart.
NOTE: The graceful restart feature for OSPF is disabled by default. For information
about the web pages and commands to configure NSF for OSPF or OSPFv3, see
"Configuring OSPF and OSPFv3" on page 955.
The grace LSAs reach the neighbors before they drop their adjacencies with
the access router. PIM starts sending hello messages to its neighbors on the
aggregation routers using a new generation ID to prompt the neighbors to
quickly resend multicast routing information. PIM neighbors recognize the
new generation ID and immediately relay the group state back to the
restarting router. IGMP sends queries to relearn the hosts' interest in
multicast groups. IGMP tells PIM the group membership, and PIM sends
AAA Overview
AAA is a framework for configuring management security in a consistent way.
Three services make up AAA:
• Authentication—Validates the user identity. Authentication takes place
before the user is allowed access to switch services.
• Authorization—Determines which services the user is allowed to access.
• Accounting—Collects and sends security information about users and
commands.
Methods
A method performs the configured service. Not every method is available for
every service. Some methods require a username and password and other
methods only require a password. Table 9-1 summarizes the various methods:
Methods that never return an error cannot be followed by any other methods
in a method list.
• The enable method uses the enable password. If there is no enable
password defined, then the enable method will return an error.
Access Lines
There are five access lines: console, telnet, SSH, HTTP, and HTTPS. HTTP
and HTTPS are not configured using AAA method lists. Instead, the
authentication list for HTTP and HTTPS is configured directly
(authorization and accounting are not supported). The default method lists
for both the HTTP and HTTPS access lines consist of only the local method.
Each of the other access lines may be assigned method lists independently for
the AAA services.
Authentication
Authentication is the process of validating a user's identity. During the
authentication process, only identity validation is done. There is no
determination made of which switch services the user is allowed to access.
This is true even when RADIUS is used for authentication; RADIUS cannot
perform separate transactions for authentication and authorization. However,
the RADIUS server can provide attributes during the authentication process
that are used in the authorization process.
There are three types of authentication:
Authorization
Authorization is used to determine which services the user is allowed to
access. For example, the authorization process may assign a user’s privilege
level, which determines the set of commands the user can execute. There are
three kinds of authorization: commands, exec, and network.
• Commands: Command authorization determines which CLI commands
the user is authorized to execute.
• Exec: Exec authorization determines what the user is authorized to do on
the switch; that is, the user’s privilege level and an administrative profile.
Privilege Level
By setting the privilege level during exec authorization, a user can be placed
directly into Privileged EXEC mode when they log into the command line
interface.
Administrative Profiles
The Administrative Profiles feature allows the network administrator to
define a list of rules that control the CLI commands available to a user. These
rules are collected in a “profile.” The rules in a profile can define the set of
commands, or a command mode, to which a user is permitted or denied
access.
Within a profile, rule numbers determine the order in which the rules are
applied. When a user enters a CLI command, rules within the first profile
assigned to the user are applied in descending order until there is a rule that
matches the input. If no rule permitting the command is found, then the
other profiles assigned to the user (if any) are searched for rules permitting
the command. Rules may use regular expressions for command matching. All
Accounting
Accounting is used to record security events, such as a user logging in or
executing a command. Accounting records may be sent upon completion of
an event (stop-only) or at both the beginning and end of an event (start-
stop). There are three types of accounting: commands, dot1x, and exec.
• Commands—Sends accounting records for command execution.
• Dot1x—Sends accounting records for network access.
• Exec—Sends accounting records for management access (logins).
For more information about the data sent in accounting records, see "Which
RADIUS Attributes Does the Switch Support?" on page 198 and "Using
TACACS+ Servers to Control Management Access" on page 201.
Table 9-4 shows the valid methods for each type of accounting:
Authentication Examples
It is important to understand that during authentication, all that happens is
that the user is validated. If any attributes are returned from the server, they
are not processed during authentication. In the examples below, it is assumed
that the default configuration of authorization—that is, no authorization—is
used.
NOTE: A user logging in with this configuration would be placed in User EXEC
mode with privilege level 1. To access Privileged EXEC mode with privilege level 15,
use the enable command.
Notes:
• If the privilege level is zero (that is, blocked), then authorization will fail
and the user will be denied access to the switch.
• If the privilege level is higher than one, the user will be placed directly in
Privileged EXEC mode. Note that all commands in Privileged EXEC mode
require privilege level 14, so assigning a user a lower privilege level will be
of no value.
• A privilege level greater than 15 is invalid and treated as if privilege level
zero had been supplied.
• The shell service must be enabled on the TACACS+ server. If this service
is not enabled, authorization will fail and the user will be denied access to
the switch.
NOTE: If the priv-lvl attribute is also supplied, the user can also be placed directly
into privileged EXEC mode.
Notes:
• If the privilege level is zero (that is, blocked), then authorization will fail
and the user will be denied access to the switch.
• If the privilege level is higher than one, the user will be placed directly in
Privileged EXEC mode. Note that all commands in Privileged EXEC mode
require privilege level 14, so assigning a user a lower privilege level will be
of no value.
• A privilege level greater than 15 is invalid and treated as if privilege level
zero had been supplied.
PowerConnect Switch
Management
Network `
Management Host
The server can authenticate the user itself or make use of a back-end device to
ascertain authenticity. In either case a response may or may not be
forthcoming to the client. If the server accepts the user, it returns a positive
result with attributes containing configuration information. If the server
rejects the user, it returns a negative result. If the server rejects the client or
the shared secrets differ, the server returns no result. If the server requires
additional verification from the user, it returns a challenge, and the request
process begins again.
PowerConnect Switch
Management
Network `
Management Host
You can configure the TACACS+ server list with one or more hosts defined
via their network IP address. You can also assign each a priority to determine
the order in which the TACACS+ client will contact them. TACACS+
contacts the server when a connection attempt fails or times out for a higher
priority server.
Administrative Profiles
The administrative profiles shown in Table 9-10 are system-defined and may
not be deleted or altered. To see the rules in a profile, use the show admin-
profiles name profile name command.
Name Description
network-admin Allows access to all commands.
network-security Allows access to network security features such as 802.1X,
Voice VLAN, Dynamic ARP Inspection and IP Source
Guard.
router-admin Allows access to Layer 3 features such as IPv4 Routing, IPv6
Routing, OSPF, RIP, etc.
multicast-admin Allows access to multicast features at all layers, this includes
L2, IPv4 and IPv6 multicast, IGMP, IGMP Snooping, etc.
dhcp-admin Allows access to DHCP related features such as DHCP
Server and DHCP Snooping.
Name Description
CP-admin Allows access to the Captive Portal feature.
network-operator Allows access to all User EXEC mode commands and show
commands.
When you specify the severity level, messages with that severity level and
higher are sent to the log file. For example, if you specify the severity level as
critical, messages with a severity level of alert and emergency are also logged.
When you specify the severity level in a CLI command, you can use the
keyword or the numerical level.
• PRI—This consists of the facility code (see RFC 3164) multiplied by 8 and
added to the severity. The log messages use the local7 facility code (23).
This implies that a message of severity 0 will have a priority of 184 and a
message of severity 7 will have a priority of 191.
• Timestamp—This is the system up time. For systems that use SNTP, this
is UTC. When time zones are enabled, local time will be used.
• Host IP address—This is the IP address of the local system.
Device Information
The Device Information page displays after you successfully log on to the
switch by using the Dell OpenManage Switch Administrator. This page is a
virtual representation of the switch front panel. Use the Device Information
page to view information about the port status, system status, and the switch
stack. Click on a port to access the Port Configuration page for the selected
port.
To display the Device Information page, click Home in the navigation panel.
Click the Stack View link to view front panel representations for all units in
the stack.
For more information about the device view features, see "Understanding the
Device View" on page 106.
NOTE: Optical transceiver diagnostics can be performed only when the link is
present.
NOTE: When you select a severity level, all higher severity levels are
automatically selected.
6 Click Apply.
Click the Show All link to view or remove remote log servers configured on
the system.
4 Click Apply.
5 If desired, click Configuration to return to the Email Alert Mail Server
Configuration page to specify port and security settings for the mail server.
Click the Show All link to view or remove mail servers configured on the
switch.
To view all configured email alert subjects, click the Show All link.
Command Purpose
show system Display various system information.
show system power Displays the power supply status.
show system Displays the system temperature and fan status.
temperature
show memory cpu Displays the total and available RAM space on the switch.
show process cpu Displays the CPU utilization for each process currently
running on the switch.
NOTE: Cable diagnostics may give misleading results if green mode is enabled
on the port. Disable green mode prior to running any cable diagnostics.
Command Purpose
configure Enter Global Configuration mode.
logging on Globally enables logging.
logging audit Enable switch auditing.
logging cli-command Enable CLI command logging
logging web-sessions Enable logging of the switch management Web page visits.
logging snmp Enable logging of SNMP set commands.
Command Purpose
configure Enter Global Configuration mode.
logging {ip-address| Define a remote log server and enter the configuration
hostname} mode for the specified log server.
description description Describe the log server. Use up to 64 characters. If the
description includes spaces, surround it with quotation
marks.
level severity Specify the severity level of the logs that should be sent to
the remote log server. For information about severity
levels, see Table 10-1.
port udp-port Specify the UDP port to use for sending log messages. The
range is 1 to 65535, and the default is 514.
CTRL + Z Exit to Privileged EXEC mode.
show syslog-servers Verify the remote log server configuration.
Command Purpose
configure Enter Global Configuration mode.
mail-server ip-address Specify the IP address of the SMTP server on the network
and enter the configuration mode for the mail server.
security {tlsvl|none} (Optional) Specify the security protocol to use with the
mail server.
port {25|465} Configure the TCP port to use for SMTP, which can be 25
(SMTP) or 465 (SMTP over SSL).
username username If the SMTP server requires authentication, specify the
username to use for the switch.
The same username and password settings must be
configured on the SMTP host.
password password If the SMTP server requires authentication from clients,
specify the password to associate with the switch
username.
CTRL + Z Exit to Privileged EXEC mode.
show mail-server all View mail server configuration information for all
config configured mail servers.
Command Purpose
configure Enter Global Configuration mode.
logging email [severity] Enable email alerting and determine which non-critical log
messages should be emailed. Including the severity value
sets the lowest severity for which log messages are emailed.
These messages are collected and sent in a single email at
the configured log duration.
severity — (Optional) Enter the number or name of the
severity level for non-critical messages. Log messages at or
above this severity level are emailed. For information about
severity levels, see Table 10-1. Log messages below the
specified level are not emailed.
logging email urgent Determine which log messages are critical and should be
{severity | none} sent in a single email as soon as they are generated.
severity — (Optional) Enter the number or name of the
severity level for critical messages. For information about
severity levels, see Table 10-1.
logging email logtime Specify how often to send the non-critical email alerts that
minutes have been collected. . The valid range is 30 - 1440 minutes.
logging email message- Specify the email address of the recipient for log messages.
type {urgent | non-
urgent | both} to-addr
email-address
logging email from-addr Specify the email address of the sender, which is the
email-address switch.
logging email message- Specify the text that will appear in the subject line of email
type {urgent | non- alerts sent by the switch.
urgent | both} subject
subject
5 Verify the local logging configuration and view the log messages stored in
the buffer (RAM log).
console#show logging
Logging is enabled
Console Logging: level debugging. Console
Messages: 748 Dropped.
Buffer Logging: level notifications. Buffer
Messages: 79 Logged,
File Logging: level critical. File Messages: 973
Dropped.
CLI Command Logging : enabled
Switch Auditing : enabled
Web Session Logging : disabled
SNMP Set Command Logging : disabled
Syslog server 192.168.2.10 logging: debug.
Messages: 0 dropped
412 Messages dropped due to lack of resources.
Buffer Log:
<186> FEB 02 05:53:03 0.0.0.0-1 UNKN[1073741088]:
bootos.c(232) 1 %% Event(0xaaaaaaaa)
<189> FEB 02 05:53:03 0.0.0.0-1 UNKN[1073741088]:
bootos.c(248) 2 %% Starting code... BSP
initialization complete, starting application.
--More-- or (q)uit
Feature Description
System Name The switch name (host name). If you change the system name,
the CLI prompt changes from console to the system name.
System contact Identifies the person to contact for information regarding the
switch.
System location Identifies the physical location of the switch.
Asset tag Uniquely identifies the switch. Some organizations use asset tags
to identify, control, and track each piece of equipment.
CLI Banner Displays a message upon connecting to the switch or logging on
to the switch by using the CLI.
Feature Description
SDM Template Determines the maximum resources a switch or router can use
for various features. For more information, see "What Are SDM
Templates?" on page 248
The switch can obtain the time from a Simple Network Time Protocol
(SNTP) server, or you can set the time manually. Table 11-2 describes the
settings that help the switch keep track of time.
Feature Description
SNTP Controls whether the switch obtains its system time
from an SNTP server and whether communication
with the SNTP server requires authentication and
encryption. You can configure information for up to
eight SNTP servers. The SNTP client on the switch can
accept updates from both IPv4 and IPv6 SNTP servers.
Real time clock (RTC) If SNTP is disabled, you can manually enter the system
time and date.
Time Zone Allows you to specify the offset from Coordinated
Universal Time (UTC), which is also known as
Greenwich Mean Time (GMT).
Summer Time In some regions, the time shifts by one hour in the fall
and spring. In the United States, this is called daylight
saving time.
When Simple mode is enabled, negotiation, speed, duplex, VLAN, and MTU
configurations are allowed on the Aggregator Group but not on the individual
ports. These configurations are applied to all the member ports of the
Aggregator Group.
Simple mode has the following characteristics:
• A user with privilege level 15 can change the mode of operation using the
CLI, Web, and SNMP interfaces.
• Operational mode is set to Normal mode on resetting the configuration to
Factory defaults from the software boot menu.
• When you change the operational mode, a trap is generated apart from
logging a message.
• A limited set of configuration options are available from the web-based
interface, CLI, and SNMP. Additionally, SNMPv3 is not available.
• Routing -related features and QoS, are not supported.
• The switch maintains two separate configuration files, one for Simple
mode and another for Normal mode. The selection of the configuration
file while applying the configuration is based on the mode selection. If
there is no saved configuration, then the default configuration of the
selected mode is applied.
The following list shows the features that are available in Simple mode. Some
configuration options with the listed features might not be available.
• Management Security (No Telnet Server or Denial of Service)
• File Management
• Port Status and Statistics (Ethernet ports only)
• Port Channel Status
• Dot1x
NOTE: The default username (root) and password (calvin) is not available in
Simple mode. A user with privilege level of 15 must be configured to access the
switch management interface from a remote connection. For information about
configuring a user, see "Configuring Authentication, Authorization, and
Accounting" on page 181.
NOTE: The Port Aggregator feature is available only when the switch is
operating in Simple mode, which is disabled by default. For information about
changing the mode, see "Operational Mode Configuration" on page 259 (Web) or
"Configuring the Operational Mode and Port Aggregator Features" on page 284
(CLI).
NOTE: If you attach a unit to a stack and its template does not match the stack's
template, then the new unit will automatically reboot using the template used by
the management unit. To avoid the automatic reboot, you may first set the
template to the template used by the management unit. Then power off the new
unit, attach it to the stack, and power it on.
If the IPv4 Routing or IPv4 Data Center template is currently in use and you
attempt to configure IPv6 routing features without first selecting the Dual
IPv4-IPv6 Routing template, the IPv6 commands do not take effect. IPv6
features are not available when an IPv4-only template is active.
NOTE: In the default configuration, any external ports that do not belong to the
default PA group do not participate in any VLAN. Therefore, the external ports
that are not in the default PA groups cannot switch traffic.
Table 11-4, Table 11-5, and Table 11-6 show the default Port Aggregator
Group mappings for the PowerConnect M6220, M6348, M8024, and
M8024-k switches.
Table 11-5. PCM6348 Default Port Aggregator Group Mapping (Stack with Two
Members)
For the PCM6220 and PCM6348 switches, the same default configuration is
extended to each switch in the stack. The default configuration does not
include 10G ports as part of any Aggregator Group, although they can be
configured if desired.
NOTE: 1G and 10G external ports cannot be used at the same time within the
same Aggregator Group.
System Information
Use the System Information page to configure the system name, contact
name, location, and asset tag.
NOTE: From the System Information page, you can also initiate a Telnet session
to the switch.
NOTE: The Telnet client feature does not work with Microsoft Windows Internet
Explorer 7 and later versions. Initiating this feature from any browser running on
a Linux operating system is not supported.
The selected Telnet client launches and connects to the switch CLI.
4 Click Apply.
The switch loads the Simple mode configuration file, and you are
automatically logged off the system. To log on to the switch, you must enter a
username and password in the logon screen.
When the switch is operating in Simple mode, many of the pages available in
normal mode are not available, and the navigation panel displays only the
features that are available in Simple mode.
Viewing the Port Aggregator Member Port Summary and Configuring Members
To view a summary of the ports assigned to each aggregator group:
1 Open the Port Configuration page.
2 Click Summary.
3 To modify the port assignment, click any Modify link to access the Port
Configuration page.
4 If the system supports stacking, select the stack member to configure from
the Unit field.
5 Enter the Port Aggregator Group ID in the Group ID field for the ports to
add to a group.
Each port can only belong to only one Port Aggregator group.
6 Click Apply.
NOTE: To delete a single port from a group, click Modify to access the Port
Configuration page, delete the group ID from the port’s Group ID field, and
then click Apply.
3 To modify the settings for an aggregator group, click the Modify link
associated with the group to access the Group Configuration page for the
group.
3 To view the VLAN settings for a different group, select the group from the
Group ID menu.
NOTE: The system time cannot be set manually if the SNTP client is enabled. Use
the SNTP Global Settings page to enable or disable the SNTP client.
NOTE: The SNTP server must be configured with the same authentication
information to allow time synchronization to take place between the two devices.
SNTP Server
Use the SNTP Server page to view and modify information about SNTP
servers, and to add new SNTP servers that the switch can use for time
synchronization. The switch can accept time information from both IPv4 and
IPv6 SNTP servers.
To display the SNTP Server page, click System → Time Synchronization →
SNTP Server in the navigation panel. If no servers have been configured, the
fields in the following image are not displayed.
3 In the SNTP Server field, enter the IP address or host name for the new
SNTP server.
4 Specify whether the information entered in the SNTP Server field is an
IPv4 address, IPv6 address, or a hostname (DNS).
5 If you require authentication between the SNTP client on the switch and
the SNTP server, select the Encryption Key ID check box, and then select
the key ID to use.
To define a new encryption key, see "Adding an SNTP Authentication Key"
on page 272.
NOTE: The SNTP server must be configured with the same authentication
information to allow time synchronization to take place between the two
devices.
NOTE: The fields on the Summer Time Configuration page change when you
select or clear the Recurring check box.
To use the preconfigured summer time settings for the United States or
European Union, select the Recurring check box and specify USA or EU from
the Location menu.
Command Purpose
configure Enter Global Configuration mode.
hostname name Configure the system name. The CLI prompt changes to
the host name after you execute the command.
snmp-server contact Configure the name of the switch administrator. If the
name name contains a space, use quotation marks around the
name.
snmp-server location Configure the switch location.
location
asset-tag [unit unit_id] Configure the asset tag for the switch. Use the unit
tag keyword to configure the asset tag for each unit in a stack
of switches.
CTRL + Z Exit to Privileged EXEC mode.
show system [id] Display system information. Include the id keyword to
display additional system information.
Command Purpose
configure Enter Global Configuration mode.
banner Configure the banner message that displays when you
{motd|login|exec} text connect to the switch (motd and login) or enter User
EXEC mode (exec).
Use quotation marks around a message if it includes
spaces.
line Enter the terminal line configuration mode for Telnet,
{telnet|ssh|console} SSH, or the console.
motd-banner Specify that the configured MOTD banner displays. To
prevent the banner from displaying, enter no motd-
banner.
exec-banner Specify that the configured exec banner displays. To
prevent the banner from displaying, enter no exec-banner.
login-banner Specify that the configured login banner displays. To
prevent the banner from displaying, enter no login-banner.
CTRL + Z Exit to Privileged EXEC mode.
show banner Display the banner status on all line terminals.
Command Purpose
configure Enter Global Configuration mode.
sdm prefer {dual-ipv4- Select the SDM template to apply to the switch after the
and-ipv6 default| ipv4- next boot.
routing {data-center |
default}}
CTRL + Z Exit to Privileged EXEC mode.
show sdm prefer View information about the SDM template the switch is
[template] currently using. Use the template variable to view the
parameters for the specified template.
Command Purpose
configure Enter Global Configuration mode.
mode simple Enable Simple mode. Switching modes clears the running
configuration. You are prompted to confirm that you want
to continue.
NOTE: After the configuration clears, you are returned to
User EXEC mode if you are logged on through the console
port. If you are connected to the switch through Telnet or
SSH, the connection is terminated, and you must log on the
switch.
enable Enter Privileged EXEC mode.
configure Enter Global Configuration mode
port-aggregator group Enter the Port Aggregator mode for the specified group to
{1–8} configure aggregator group attributes.
Command Purpose
configure Enter Global Configuration mode.
sntp authentication-key Define an authentication key for SNTP. The variables are:
key_id md5 key_word • key_id— The encryption key ID, which is a number from
1–4294967295.
• key_word—The authentication key, which is a string of
up to eight characters.
sntp trusted-key key_id Specify the authentication key the SNTP server must
include in SNTP packets that it sends to the switch.
The key_id number must be an encryption key ID defined
in the previous step.
sntp authenticate Require authentication for communication with the SNTP
server.
A trusted key must be configured before this command is
executed.
Command Purpose
clock set {mm/dd/yyyy Configure the time and date. You can enter the time first
hh:mm:ss} | and then the date, or the date and then the time.
{hh:mm:ss • hh:mm:ss —Time in hours (24-hour format, from 01-24),
mm/dd/yyyy minutes (00-59), and seconds (00-59).
• mm/dd/yyyy — Two digit month (1-12), two-digit date of
the month (01-31), and four-digit year.
clock timezone hours- Configure the time zone settings.
offset hours-offset • hours-offset — Hours difference from UTC. (Range: –12 to
[minutes minutes- +13)
offset] [zone acronym]
• minutes-offset — Minutes difference from UTC. (Range:
0–59)
• acronym — The acronym for the time zone. (Range: Up to
four characters)
clock summer-time Use this command if the summer time starts and ends every
recurring {usa | eu | year based on a set pattern.
{week day month For switches located in the United States or European
hh:mm week day Union, use the usa or eu keywords to use the preconfigured
month hh:mm}} values. Otherwise, configure the start and end times by using
[offset offset] [zone the following values:
acronym]
• week — Week of the month. (Range: 1–5, first, last)
• day — Day of the week. (The first three letters by name)
• month — Month. (The first three letters by name; jan, for
example.)
• hh:mm — Time in 24-hour format in hours and minutes.
(Range: hh: 0–23, mm: 0–59)
• offset — Number of minutes to add during the
summertime. (Range:1–1440)
• acronym — The acronym for the time zone to be displayed
when summertime is in effect. (Up to four characters)
Command Purpose
show slot Display status information about the expansion slots.
show supported cardtype Display information about the modules the switch
supports.
Power Supplies:
Unicast servers:
Server Key Polling Priority
------------ ----------- --------- --------
192.168.10.30 23456465 Enabled 1
Unicast servers:
Server Status Last response
--------------- ------------ ---------------------
192.168.10.30 Other 09:12:43 Mar 1 2011
Time zone:
Acronym is EST
Offset is UTC-5:00
Summertime:
Acronym not configured
Recurring every year (USA)
Begins on second Sunday of Mar at 02:00
Ends on first Sunday of Nov at 02:00
Offset is +60 minutes
SNMP Overview
Simple Network Management Protocol (SNMP) provides a method for
managing network devices. The PowerConnect M6220, M6348, M8024, and
M8024-k switches support SNMP version 1, SNMP version 2, and SNMP
version 3.
What Is SNMP?
SNMP is a standard protocol that enables remote monitoring and
management of a device through communication between an SNMP
manager and an SNMP agent on the remote device. The SNMP manager is
typically part of a Network Management System (NMS) that runs on an
administrative host. The switch software includes Management Information
Base (MIB) objects that the SNMP agent queries and modifies. The switch
uses standard public MIBs and private MIBs.
A MIB acts as a structured road map for managed objects. A managed object
is any feature or setting that can be configured or monitored on the switch.
An Object Identifier (OID) is the unique number assigned to an object
defined in a MIB. An OID is written as a sequence of subidentifiers in
decimal notation.
Table 12-2 describes the two views that are defined by default.
By default, three groups are defined. Table 12-3 describes the groups. The
Read, Write, and Notify values define the preconfigured views that are
associated with the groups.
NOTE: For some features, the control to enable or disable traps is available from
a configuration page for that feature and not from the Trap Manager pages that
this chapter describes.
3 Specify a name for the view and a valid SNMP OID string.
4 Select the view type.
5 Click Apply.
The SNMP view is added, and the device is updated.
Click Show All to view information about configured SNMP Views.
NOTE: You can also use the Local User Database page under Management
Security to configure SNMPv3 settings for users. For more information, see
"Configuring Authentication, Authorization, and Accounting" on page 181.
To display the User Security Model page, click System → SNMP → User
Security Model in the navigation panel.
3 Specify the name of the filter, the OID for the filter.
4 Choose whether to send (include) traps or informs to the trap recipient or
prevent the switch from sending (exclude) the traps or informs.
5 Click Apply to update the switch.
Click Show All to view information about the filters that have already been
configured.
Notification Recipients
Use the Notification Recipients page to view information for defining filters
that determine whether traps are sent to specific users, and the trap type sent.
SNMP notification filters provide the following services:
• Identifying Management Trap Targets
• Trap Filtering
• Selecting Trap Generation Parameters
• Providing Access Control Checks
To display the Notification Recipients page, click System → SNMP →
Notification Recipient in the navigation panel.
Command Purpose
configure Enter Global Configuration mode
Command Purpose
configure Enter Global Configuration mode
snmp-server view view- Configure the SNMP view. When you configure groups,
name oid-tree {included users, and communities, you can specify a view to associate
| excluded} with the group, user, or community
• view-name — Specifies the name of the view. (Range: 1-
30 characters.)
• oid-tree — Specifies the object identifier of the ASN.1
subtree to be included or excluded from the view. To
identify the subtree, specify a text string consisting of
numbers, such as 1.3.6.2.4, or a word, such as
system. Replace a single subidentifier with the asterisk
(*) wildcard to specify a subtree family; for example
1.3.*.4.
• included — Indicates that the view type is included.
• excluded — Indicates that the view type is excluded.
Configuring Communities
Beginning in Privileged EXEC mode, use the following commands to
configure access rights for SNMPv1 and SNMPv2.
Command Purpose
configure Enter Global Configuration mode
snmp-server community Configure the community string and specify access criteria
string [ro | rw | su] for the community.
[view view-name] • community-string — Acts as a password and is used to
[ipaddress ip_address] authenticate the SNMP management station to the
switch. The string must also be defined on the NMS in
order for the NMS to access the SNMP agent on the
switch (Range: 1-20 characters)
• ro — Indicates read-only access
• rw — Indicates read-write access.
• view-name — Specifies the name of a previously defined
MIB view.
• ip_address — Specifies the IP address of the management
station. If no IP address is specified, all management
stations are permitted
Command Purpose
configure Enter Global Configuration mode
snmp-server enable traps Specify the traps to enable. The captive portal, OSPF and
[acl | all | auto-copy-sw OSPFv3 traps include several different traps that can be
| captive-portal cp-type enabled. For more information, use the CLI command
| dot1q | dvrmp | link | help or see the CLI Command Reference.
maclock | multiple-
users | ospf ospftype |
ospfv3 ospfv3type | pim
| poe | snmp
authentication |
spanning-tree | stack |
vrrp]
snmp-server filter filter- Configure a filter for SNMP traps and informs based on
name oid-tree {included OIDs. Each OID is linked to a device feature or a feature
| excluded} aspect.
• filter-name — Specifies the label for the filter record that
is being updated or created. The name is used to
reference the record. (Range: 1-30 characters.)
• oid-tree — Specifies the object identifier of the ASN.1
subtree to be included or excluded from the view. To
identify the subtree, specify a text string consisting of
numbers, such as 1.3.6.2.4, or a word, such as
system. Replace a single subidentifier with the asterisk
(*) wildcard to specify a subtree family; for example,
1.3.*.4.
• included — Indicates that the filter type is included.
• excluded — Indicates that the filter type is excluded.
Version 3 notifications
Target Addr. Type Username Security UDP Filter TO Retries
Level Port Name Sec
------------ ---- --------- ------- ----- ----- --- -------
System Contact:
System Location:
Configuring SNMPv3
This example shows how to complete a basic SNMPv3 configuration. The
commands create a view that includes objects from the internet MIB subtree
(OID 1.3.6.1), which includes all objects on the switch.
The user named admin has read-write privileges to all objects within the view
(in other words, all objects on the switch) after supplying the appropriate
authentication credentials (secretkey).
To configure the switch:
1 Configure the view. view_snmpv3 and specify the objects to include.
console#configure
console(config)#snmp-server view view_snmpv3
internet included
2 Create the group group_snmpv3 and allow read-write access to the view
configured in the previous step.
console(config)#snmp-server group group_snmpv3 v3
auth read view_snmpv3 write view_snmpv3
Version 3 notifications
Target Addr. Type Username Security UDP Filter TO Retries
Level Port Name Sec
------------ ---- --------- ------- ----- ----- --- -------
192.168.3.35 Trap admin Auth-NoP 162 15 3
System Contact:
System Location:
NOTE: For information about the Auto Configuration feature that enables the
switch to automatically upgrade the image or load a new configuration file during
the boot process, see Automatically Updating the Image and Configuration.
Image Files
The switch can store two firmware images, but only one is active. The other
image file is a backup image. By default, the switch has only one image. You
might copy an image or download an image to the switch for the following
reasons:
• To create a backup image
• To upgrade the firmware as new images become available
Configuration Files
Configuration files contain the CLI commands that change the switch from
its default configuration. The switch can maintain three separate
configuration files: startup-config, running-config, and backup-config. The
switch loads the startup-config file when the switch boots. Any configuration
NOTE: You must use the CLI to manage configuration scripts. The configuration
scripting feature is not available from the web interface.
When you apply (run) a configuration script on the switch, the commands in
the script are executed in the order in which they are written as if you were
typing them into the CLI. The commands that are executed in the
configuration script are added to the running-config file.
You might upload a configuration file from the switch to a remote server for
the following reasons:
• To create a backup copy
• To use the configuration file on another switch
• To manually edit the file
You might download a configuration file from a remote server to the switch
for the following reasons:
• To restore a previous configuration
• To load the configuration copied from another switch
• To load the same configuration file on multiple switches
Use a text editor to open a configuration file and view or change its contents.
SSH/SSL Files
If you use OpenManage Switch Administrator to manage the switch over an
HTTPS connection, you must copy the appropriate certificate files to the
switch. If you use the CLI to manage the switch over an SSH connection, you
must copy the appropriate key files to the switch.
Managing Images
When you download a new image to the switch, it overwrites the backup
image, if it exists. To use the new image, you must activate it and reload the
switch. The image that was previously the active image becomes the backup
image after the switch reloads. If you upgrade to a newer image and find that
it is not compatible with your network, you can revert to the original image.
If you activate a new image and reload the switch, and the switch is unable to
complete the boot process due to a corrupt image or other problem, you can
use the boot menu to activate the backup image. You must be connected to
the switch through the console port to access the boot menu. The image files
may contain firmware for the PHY processors on the switch. The PHY
firmware may be updated to the firmware version supported by the switch
firmware during the boot process or, in the case of switches that support the
hot swap of cards, when the card is inserted into the switch.
File System
Use the File System page to view a list of the files on the device and to modify
the image file descriptions.
To display the File System page, click System → File Management → File
System in the navigation panel.
Downloading Files
To download a file to the switch:
1 Open the File Download page.
2 Select the type of file to download to the switch.
3 Select the transfer mode.
If you select a transfer mode that requires authentication, additional fields
appear in the Download section. If you select HTTP as the download
method, some of the fields are hidden.
NOTE: If you are using HTTPS to manage the switch, the download method
will be HTTPS.
NOTE: After you start a file download, the page refreshes and a transfer
status field appears to indicate the number of bytes transferred. The web
interface is blocked until the file download is complete.
Uploading Files
To upload a file from the switch to a remote system:
1 Open the File Upload page.
2 Select the type of file to download to the remote server.
3 Select the transfer mode.
If you select a transfer mode that requires authentication, additional fields
appear in the Upload section. If you select HTTP as the upload method,
some of the fields are hidden.
4 To upload by using HTTP, click Apply. A dialog box opens to allow you to
open or save the file.
5 To upload by using any method other than HTTP, enter the IP address of
the server and specify a name for the file. For SFTP and SCP, provide the
user name and password.
6 Click Apply to begin the upload.
NOTE: For some file uploads and methods, the page refreshes and a
transfer status field appears to indicate the number of bytes transferred. The
web interface is blocked until the file upload is complete.
NOTE: Upload, download, and copy functions use the copy command. The basic
syntax for the command is copy source destination. This section shows several
different ways to use the copy command.
Command Purpose
copy tftp://{ip-address| Use TFTP to download the firmware image at the
hostname}/path/file- specified source to the non-active image.
name image If the image file is in the TFTP file system root (download
path), you do not need to specify the path in the
command.
show version View information about the currently active image.
filedescr {image1 | Add a description to the image files.
image2} description
boot system {image1 | Set the image to use as the boot (active) image after the
image2} switch resets.
reload Reboot the switch to make the new image the active
image.
You are prompted to verify that you want to continue.
Command Purpose
dir List the files in the flash file system.
rename current_name Rename a file in flash.
new_name
delete filename Remove the specified file.
erase {startup-config | Erase the startup configuration, the backup configuration
backup-image | backup- or the backup image.
config}
copy startup-config Save the startup configuration to the backup configuration
backup-config file.
copy running-config Copy the current configuration to the startup
startup-config configuration. This saves the current configuration to
NVRAM.
show startup-config View the contents of the startup-config file
show running-config View the contents of the running-config file
Command Purpose
copy file scp://user@{ip- Adds a description to an image file.
address|hostname}/path The file can be one of the following files:
/file-name
• backup-config
• image
• operational-log
• running-config
• script file-name
• startup-config
• startup-log
Password entry After you enter the copy command, the CLI prompts you
for the password associated with the username.
Command Purpose
copy sftp://user@{ip- Downloads the specified script from the remote server to
address|hostname}/path the switch.
/file-name script dest-
name
Password entry After you enter the copy command, the CLI prompts you
for the password associated with the username.
script validate script- Checks the specified script for syntax errors.
name The script is automatically validated when you download it
to the switch. You can validate again with this command.
script list View the list of available scripts.
script activate script- Executes the commands within the script in order. The
name configuration changes in the script are applied to the
running configuration.
script show script-name View the contents of the specified script.
4 Download the image to the switch. After you execute the copy command,
you must verify that you want to start the download.
The downloaded image replaces the currently inactive image, which may
be image1 or image2.
console#copy
tftp://10.27.65.103/images/dell_0308.stk image
Mode........................................... TFTP
Set TFTP Server IP............................. 10.27.65.103
TFTP Path...................................... images/
TFTP Filename.................................. dell_0308.stk
Data Type...................................... Code
image1 :
image2 :
Configuration Saved!
8 Reset the switch to boot the system with the new image.
console#reload
2 Save the file with an *.scr extension and copy it to the appropriate
directory on your TFTP server.
3 Download the file from the TFTP server to the switch.
console#copy tftp://10.27.65.103/labhost.scr
script labhost.scr
Mode........................................... TFTP
Set TFTP Server IP............................. 10.27.65.103
TFTP Path...................................... ./
TFTP Filename.................................. labhost.scr
configure
exit
configure
ip host labpc1 192.168.3.56
NOTE: Auto Install is not invoked if a valid configuration file is on the switch.
The TFTP client makes three unicast requests. If the unicast attempts fail, or
if the DHCP OFFER did not specify a TFTP server address, the TFTP client
makes three broadcast requests.
If the DHCP server does not specify a configuration file or download of the
configuration file fails, the Auto Configuration process attempts to download
a configuration file with the name dell-net.cfg. The switch unicasts or
broadcasts TFTP requests for a network configuration file in the same
manner as it attempts to download a host-specific configuration file.
The default network configuration file consists of a set of IP address-to-
hostname mappings, using the command ip host hostname address. The
switch finds its own IP address, as learned from the DHCP server, in the
configuration file and extracts its hostname from the matching command. If
the default network configuration file does not contain the switch's IP
address, the switch attempts a reverse DNS lookup to resolve its hostname.
A sample dell-net.cfg file follows:
config
...
ip host switch1 192.168.1.10
ip host switch2 192.168.1.11
... <other hostname definitions>
exit
Once a hostname has been determined, the switch issues a TFTP request for
a file named hostname.cfg , where hostname is the first thirty-two
characters of the switch's hostname.
If the switch is unable to map its IP address to a hostname, Auto
Configuration sends TFTP requests for the default configuration file
host.cfg.
Table 14-2 displays the determining factors for issuing unicast or broadcast
TFTP requests.
Saving a Configuration
The Auto Configuration feature includes an AutoSave capability that allows
the downloaded configuration to be automatically saved; however, AutoSave
is disabled by default. If AutoSave has not been enabled, you must explicitly
save the downloaded configuration in nonvolatile memory on the stack
master. This makes the configuration available for the next reboot. In the
CLI, this is performed by issuing a write command or copy running-config
startup-config command and should be done after validating the contents of
saved configuration.
Auto-Install Configuration
Use the Auto-Install Configuration page to allow the switch to obtain
network information (such as the IP address and subnet mask) and
automatically download a host-specific or network configuration file during
the boot process if no startup-config file is found.
To display the Auto Configuration page, click System → General → Auto-
Install Configuration in the navigation panel.
NOTE: The Auto Configuration feature begins automatically when the switch is
booted and no startup-config file is found or if the system boots and finds the
boot host dhcp command in the startup-config file.
Command Purpose
configure Enter Global Configuration mode.
boot autoinstall start Enable the Auto Configuration feature on the switch.
boot host dhcp Enable Auto Configuration for the next reboot cycle. The
command does not change the current behavior of Auto
Configuration, but it does save the command to NVRAM.
boot host autosave Allow the switch to automatically save the configuration file
downloaded to the switch by the Auto Configuration feature.
boot host retrycount Specify the number of attempts to download the file (by
retries sending unicast TFTP requests, and if unsuccessful,
broadcast TFTP requests) specified in the response from the
DHCP server.
The range for retries is 1–3.
boot host autoreboot Allow the switch to automatically reboot when the image is
successfully downloaded through the Auto Configuration
feature.
exit Exit to Privileged Exec mode.
show boot Displays the current status of the Auto Configuration process.
What is RMON?
Like sFlow, RMON is a technology that enables the collection and analysis of
a variety of data about network traffic. PowerConnect
M6220/M6348/M8024/M8024-k switch software includes an RMON probe
(also known as an RMON agent) that collect information and analyze
packets. The data that is collected is defined in the RMON MIB, RFC 2819.
RMON is defined in an Internet Engineering Task Force (IETF) specification
and is an extension of the SNMP MIB. You can view the RMON information
locally on the switch or by using a generic RMON console on a network
management station (NMS). SNMP does not need to be configured on the
switch to view the RMON data locally. However, if you use a management
station to view the RMON data that the switch collects and analyzes, you
must configure the following SNMP settings:
• Set up the SNMP community string to be used by the SNMP manager at a
given IP address.
• Specify the network management system IP address or permit
management access from all IP addresses.
For more information about configuring SNMP, see "Configuring SNMP" on
page 297.
NOTE: You can create a DiffServ policy class definition that mirrors specific types
of traffic to a destination port. For more information, see "Configuring Differentiated
Services" on page 1125.
Click Show All to view information about configured sampler data sources.
Click Show All to view information about the ports configured to collect
counter samples.
3 If the event sends an SNMP trap, specify the SNMP community to receive
the trap.
4 Optionally, provide a description of the event and the name of the event
owner.
5 Select an event type.
6 Click Apply.
The event is added to the RMON Event Table, and the device is updated.
3. Complete the fields on this page as needed. Use the help menu to learn
more information about the data required for each field.
4. Click Apply.
The RMON alarm is added, and the device is updated.
To view configured alarm entries, click the Show All tab. The Alarms Table
displays. From this page, you can remove configured alarms.
To chart port statistics, select the type of statistics to chart and (if desired)
the refresh rate, then click Draw.
To chart LAG statistics, select the type of statistics to chart and (if desired)
the refresh rate, then click Draw.
5 Click Apply.
6 Repeat the previous steps to add additional source ports.
7 Click Port Mirroring to return to the Port Mirroring page.
8 Enable the administrative mode and specify the destination port.
9 Click Apply.
Configuring sFlow
Beginning in Privileged EXEC mode, use the following commands to
configure the sFlow receiver and to configure the sampling and polling on
switch interfaces.
Command Purpose
configure Enter Global Configuration mode
sflow rcvr_index Configure the address of the sFlow receiver and
destination ip-address (optionally) the destination UDP port for sFlow
[port] datagrams.
• rcvr_index—The index of this sFlow receiver (Range:
1–8).
• ip-address—The sFlow receiver IP address.
• port —The destination Layer 4 UDP port for sFlow
datagrams. (Range: 1–65535).
sflow rcvr_index Specify the identity string of the receiver and set the
destination owner receiver timeout value.
owner_string timeout timeout—The number of seconds the configuration will
timeout be valid before it is automatically cleared. A value of 0
essentiality means the receiver is not configured.
sflow rcvr_index Specify the maximum number of data bytes that can be
maxdatagram size sent in a single sample datagram.
The receiver should also be set this value to avoid
fragmentation of the sFlow datagrams. (Range: 200–9116
bytes).
Configuring RMON
Beginning in Privileged EXEC mode, use the following commands to
configure RMON alarms, collection history, and events. The table also lists
the commands you use to view information collected by the RMON probe.
Command Purpose
configure Enter Global Configuration mode
rmon event number Configure an RMON event.
[log] [trap community] • number — The event index. (Range: 1–65535)
[description string]
[owner string] • log — Specify that an entry is made in the log table for
each event.
• trap community — If the event is an SNMP trap to be
sent, it is sent to the SNMP community specified by this
octet string. (Range: 0-127 characters)
• description string — A comment describing this event.
(Range 0-127 characters)
• owner string — Enter a name that specifies who
configured this event. If unspecified, the name is an
empty string.
Viewing Statistics
Use the following commands in Privileged EXEC mode to view statistics
about the traffic handled by the switch.
Command Purpose
show interfaces counters Display the number of octets and packets handled by all
[if_type if_number | interfaces or the specified interface.
port-channel interface]
show statistics Display detailed statistics for a specific port or LAG, or for
{switchport | interface} the entire switch. The interface variable includes the
interface type and number.
show gvrp statistics Displays GVRP statistics for the specified port or LAG.
interface
Command Purpose
configure Enter Global Configuration mode
monitor session Configure a source (monitored) port or CPU interface for
session_number source a monitor session.
interface {cpu | • session_number —The monitoring session ID, which is
interface} [rx | tx] always 1.
• interface—The Ethernet interface to be monitored.
• rx | tx — Monitor ingress (rx) or egress (tx) traffic. If you
not specify, both ingress and egress traffic is monitored.
monitor session Configure a destination (probe) port for a monitor session.
session_number • session_number —The monitoring session ID, which is
destination interface always 1.
interface
• interface—The Ethernet interface to which the
monitored source traffic is copied.
monitor session Enable the administrative mode for the configured port
session_number mode mirroring session to start sending the traffic from the
source port to the destination (probe) port.
exit Exit to Privileged EXEC mode.
show monitor session 1 View information about the configured port mirroring
session.
Configuring sFlow
This example shows how to configure the switch so that ports 10-15 and port
23 send sFlow datagrams to an sFlow receiver at the IP address 192.168.20.34.
The receiver owner is receiver1, and the timeout is 100000 seconds. A counter
sample is generated on the ports every 60 seconds (polling interval), and 1 out
of every 8192 packets is sampled. Note that sFlow monitoring is not enabled
until a receiver owner string is configured.
To configure the switch:
1 Configure information about the sFlow receiver.
console#configure
console(config)#sflow 1 destination 192.168.30.34
console(config)#sflow 1 destination owner
receiver1 timeout 100000
2 Configure the polling and sampling information for gigabit Ethernet ports
10-20.
console(config)#sflow 1 polling gi1/0/10-15 60
console(config)#sflow 1 sampling gi1/0/10-15 8192
3 Configure the polling and sampling information for gigabit Ethernet port
23.
console(config)#interface gi1/0/23
console(config-if-Gi1/0/23)#sflow 1 polling 60
console(config-if-Gi1/0/23)#sflow 1 sampling 8192
4 Verify the configured information.
console#show sflow 1 destination
Receiver Index.................... 1
Owner String...................... receiver1
Time out.......................... 99994
IP Address:....................... 192.168.30.34
To add an iSCSI Target, click Add at the top of the page and configure the
relevant information about the iSCSI target.
Command Purpose
configure Enter Global Configuration mode. iSCSI
optimization is enabled by default.
iscsi target port tcp-port-1 Configure an iSCSI target port and, optionally,
[tcp-port-2...tcp-port-16] address and name.
[address ip-address] [name • tcp-port-n—TCP port number or list of TCP port
targetname] numbers on which the iSCSI target listens to
requests. Up to 16 TCP ports can be defined in the
system in one command or by using multiple
commands.
• ip-address—IP address of the iSCSI target. When
the no form of this command is used, and the tcp
port to be deleted is one bound to a specific IP
address, the address field must be present.
• targetname—iSCSI name of the iSCSI target. The
name can be statically configured; however, it can be
obtained from iSNS or from sendTargets response.
The initiator must present both its iSCSI Initiator
Name and the iSCSI Target Name to which it wishes
to connect in the first login request of a new session
or connection.
The default target port and IP address criteria is used to determine which
packets are snooped for iSCSI session data (ports 860 and 3260; any IP
address).
3 If the array is a Compellent storage array, execute the Compellent macro
on the ports attached to the array:
console#config
console(config)#macro global apply profile-compellent-nas
$interface_name te1/0/21
console(config)#macro global apply profile-compellent-nas
$interface_name te1/0/22
console(config)#macro global apply profile-compellent-nas
$interface_name te1/0/23
NOTE: The Captive Portal feature is not available on the M6220, M8024, and
M8024-k switches.
Default Captive Portal Welcome Screen (Displays in Captive Portal User’s Browser)
The Captive Portal feature blocks hosts connected to the switch from
accessing the network until user verification has been established. You can
configure Captive Portal verification to allow access for both guest and
authenticated users. Authenticated users must be validated against a
database of authorized Captive Portal users before access is granted. The
database can be stored locally on the switch or on a RADIUS server.
The user types a name in the Username field, selects the Acceptance Use
Policy check box, and clicks Connect to gain network access. By default, the
user does not need to be defined in a database or enter a password to access
the network because the default verification mode is Guest. Note that
duplicate Username entries can exist in this mode because the client IP and
MAC addresses are obtained for identification.
Table 17-1 shows the default values for the Captive Portal feature.
Feature Value
Global Captive Portal Operational Disabled
Status
Additional HTTP or HTTPS Ports Disabled
Captive Portal can be configured to use an
additional HTTP and/or HTTPS port (in
support of Proxy networks).
Feature Value
Authentication Timeout 300 seconds
Configured Captive Portals 1
Captive Portal Name Default
Protocol Mode HTTP
Verification Mode Guest
URL Redirect Mode Off
User Group 1-Default
Session Timeout 86400 seconds
Local Users None configured
Interface associations None
Interface status Not blocked
If the Captive Portal is blocked, users cannot
gain access to the network through the
Captive Portal. Use this function to
temporarily protect the network during
unexpected events, such as denial of service
attacks.
Supported Captive Portal users 1024
Supported local users 128
Supported Captive Portals 10
NOTE: The image to download must be accessible from your local system.
The image should be 5 KB max, 200x200 pixels, GIF or JPG format.
3 Make sure Download is selected in the Available Images menu, and click
Browse.
NOTE: You can configure the Logout Page settings only if the User Logout
Mode is selected on the Configuration page. The User Logout Mode allows
an authenticated client to deauthenticate from the network.
10 Customize the look and feel of the Logout Page, such as the page title and
logout instructions.
11 Click Apply to save the settings to the running configuration or click
Preview to view what the user will see. To return to the default views, click
Clear.
12 Click the Logout Success Page link to configure the page that contains the
logout window. A user is required to logout only if the User Logout Mode
is selected on the Configuration page.
13 Customize the look and feel of the Logout Page, such as the background
image and successful logout message.
14 Click Apply to save the settings to the running configuration or click
Preview to view what the user will see. To return to the default views, click
Clear.
Local User
You can configure a portal to accommodate guest users and authorized users.
Guest users do not have assigned user names and passwords. Authorized users
provide a valid user name and password that must first be validated against a
local database or RADIUS server. Authorized users can gain network access
once the switch confirms the user’s credentials.
By default, each Captive Portal instance contains the default group. The
default group can be renamed, or a different group can be created and
assigned to each Captive Portal instance. A Captive Portal instance can be
associated to one user group only. A user, however, can be assigned to multiple
groups.
The Local User page allows you to add authorized users to the local database,
which can contain up to 128 user entries. You can also add and delete users
from the local database from the Local User page.
To display the Local User page, click System → Captive Portal → Local User.
NOTE: Multiple user groups can be selected by holding the CTRL key down while
clicking the desired groups.
From the Local User page, click Add to add a new user to the local database.
From the Local User page, click Show All to view summary information
about the local users configured in the local database.
To delete a configured user from the database, select the Remove check box
associated with the user and click Apply.
From the User Group page, click Show All to view summary information
about the user groups configured on the switch.
To delete a configured group, select the Remove check box associated with
the group and click Apply.
NOTE: When you associate an interface with a Captive Portal, the interface is
disabled in the Interface List. Each interface can be associated with only one
Captive Portal at a time.
NOTE: Use the Block and Unblock buttons to control the blocked status. If the
Captive Portal is blocked, users cannot gain access to the network through the
Captive Portal. Use this function to temporarily protect the network during
unexpected events, such as denial of service attacks.
Command Purpose
configure Enter global configuration mode.
captive-portal Enter Captive Portal mode.
http port port-num (Optional) Configure an additional HTTP port for
Captive Portal to monitor. Use this command on networks
that use an HTTP proxy server.
port-num — The port number to monitor (Range:
1–65535, excluding ports 80, 443, and the configured
switch management port).
https port port-num (Optional) Configure an additional HTTPS port for
Captive Portal to monitor. Use this command on networks
that use an HTTPS proxy server.
port-num — The port number to monitor Range:
1–65535, excluding ports 80, 443, and the configured
switch management port).
authentication timeout (Optional) Configure the number of seconds the user has
timeout to enter valid credentials into the verification page. If the
user exceeds the configured timeout, the verification page
needs to be served again in order for the client to gain
access to the network.
timeout — The authentication timeout (Range: 60–600
seconds).
enable Globally enable the Captive Portal feature.
Command Purpose
configure Enter global configuration mode.
captive-portal Enter Captive Portal mode.
configuration cp-id Enter the captive portal instance mode
cp-id — The Captive Portal instance (Range: 1–10). The
Captive Portal configuration identified by CP ID 1 is the
default CP configuration.
name string Add a name to the Captive Portal instance.
string — CP configuration name (Range: 1–32 characters).
protocol {http | https} Specify whether to use HTTP or HTTPs during the
Captive Portal user verification process.
verification {guest | Specify how to process user credentials the user enters on
local | radius} the verification page.
• guest — Allows access for unauthenticated users (users
that do not have assigned user names and passwords).
• local — Authenticates users against a local user database.
• radius — Authenticates users against a remote RADIUS
database.
radius-auth-server name Specify the name of the RADIUS server to use for
RADIUS verification. Use the commands described in
"Using RADIUS Servers to Control Management Access"
on page 196 to configure RADIUS server settings for the
switch.
NOTE: To return the default Captive Portal instance to its default values, use the
clear command in the Captive Portal Instance mode. You must also use the no
interface interface command to remove any associated interfaces from the
instance.
Command Purpose
configure Enter global configuration mode.
captive-portal Enter Captive Portal mode.
user group group-id Configure a group. Each Captive Portal that requires
[name name] authentication has a group associated with it. Only the
users who are members of that group can be authenticated
if they connect to the Captive Portal.
• group-id — Group ID (Range: 1–10).
• name — Group name (Range: 1–32 characters).
user user-id name name Create a new user for the local user authentication
database.
• user-id —User ID (Range: 1–128).
• name —user name (Range: 1–32 characters).
user user-id password Configure the password for the specified user.
password • user-id —User ID (Range: 1–128).
• password —User password (Range: 8–64 characters).
user user-id group group- Associate a group with a Captive Portal user. A user can be
id associated with more than one group.
• user-id — User ID (Range: 1–128).
• group-id — Group ID (Range: 1–10).
user user-id session- Enter the number of seconds to wait before terminating a
timeout timeout session for the specified user. The user is logged out once
the session timeout is reached.
• user-id — User ID (Range: 1–128).
• timeout — Session timeout. 0 indicates timeout not
enforced (Range: 0–86400 seconds)
Command Purpose
show captive-portal Display information about the clients authenticated to all
configuration [cp-id] Captive Portal configurations or a to specific
client status configuration.
cp-id — The Captive Portal instance (Range: 1–10).
show captive-portal Display information about clients authenticated on all
interface interface client interfaces or no a specific interface.
status interface — Specific Ethernet interface, such as gi1/0/8.
show captive-portal Display client connection details or a connection summary
client [macaddr] status for connected Captive Portal users.
macaddr — The MAC address of the client.
captive-portal client Deauthenticate a specific captive portal client.
deauthenticate macaddr macaddr — The MAC address of the client.
7. Customize the authentication, logout, and logout success web pages that a
Captive Portal user will see.
Dell recommends that you use Use Dell OpenManage Administrator to
customize the Captive Portal authentication, logout, and logout success
pages. A Preview button is available to allow you to see the pages that a
Captive Portal user will see.
8. If you use the local database for user authentication, configure the users on
the switch.
9. If you use a RADIUS server for authentication, add the users to the
database on the RADIUS server.
10. Associate interfaces with the Captive Portal instances.
11. Globally enable Captive Portal.
NOTE: Captive Portal page customization is supported only through the Web
interface. For information about customizing the Captive Portal pages, see
"Customizing a Captive Portal" on page 435.
Port Overview
A port is a physical interface. The PowerConnect M6220, M6348, M8024, and
M8024-k switches support both external and internal ports. The external
ports connect devices such as PCs or servers to the switch by using cables.
The internal ports are used to connect to server blades in the chassis. The
number and type of physical ports available on your PowerConnect
M6220/M6348/M8024/M8024-k switch depends on the model.
Feature Description
Administrative status Controls whether the port is administratively
enabled or disabled.
Description Provides a text-based description of the port.
Feature Description
Auto negotiation Enables a port to advertise its transmission rate,
duplex mode and flow control abilities to its
partner.
Speed Specifies the transmission rate for frames.
Duplex mode Specifies whether the interface supports
transmission between the switch and the
connected client in one direction at a time (half)
or both directions simultaneously (both).
Maximum frame size Indicates the maximum frame size that can be
handled by the port.
Flow control This is a global setting that affects all ports. For
more information about this feature, see
"Configuring Port-Based Traffic Control" on
page 687.
Storm control For more information about this feature, see
"Configuring Port-Based Traffic Control" on
page 687.
Port security For more information about this feature, see
"Configuring Port and System Security" on
page 481.
Protected port For more information about this feature, see
"Configuring Port-Based Traffic Control" on
page 687.
Link Action
The link action specifies the action that the group members will take when
the dependent port is down. The group members can transition to the same
state as the dependant port, or they can transition to the opposite state. In
other words, if the link action is down and the dependent port goes down, the
members ports will go down as well. Conversely, when the link action is up
and the dependant link goes down, the group member ports are enabled
(brought up).
Creating a link dependency group with the up link action essentially creates a
backup link for the dependent link and alleviates the need to implement STP
to handle the fail-over.
NOTE: Whether the member ports or LAGs are brought up or down depends on
the link action.
• Port dependent on port — If a port loses the link, the switch brings
up/down the link on another port.
• Port dependent on LAG — If all ports in a channel-group lose the link, the
switch brings up/down the link on another port.
• LAG dependent on port — If a port loses the link, the switch brings
up/down all links in a channel-group.
• Multiple port command — If a group of ports lose their link, the switch
brings up/down the link on another group of ports.
• Overlapping ports — Overlapping ports on different groups will be
brought up/down only if both dependent ports lose the link.
Feature Description
Administrative status All ports are enabled
Description None defined
Auto negotiation Enabled
Speed Auto negotiate
Duplex mode Auto negotiate
Flow control Enabled
Maximum frame size 1518
Link Dependency None configured
Port Configuration
Use the Port Configuration page to define port parameters.
To display the Port Configuration page, click Switching → Ports → Port
Configuration in the navigation panel.
6 Select the Copy Parameters From check box, and select the port with the
settings to apply to other ports.
7 In the Ports list, select the check box(es) in the Copy To column that will
have the same settings as the port selected in the Copy Parameters From
field.
8 Click Apply.
6 Click Apply.
The Link Dependency settings for the group are modified, and the device
is updated.
To configure a group, click the Modify link associated with the ID of the
group to configure. Clicking the Modify link takes you to the Link
Dependency Configuration page. The Group ID is automatically selected
based on the link that was clicked.
Command Purpose
configure Enter Global Configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example gigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
gigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12.
description string Add a description to the port. The text string can be
from1-64 characters.
shutdown Administratively disable the interface.
speed {10 Configure the speed of a given Ethernet interface or allow
|100|1000|10000 | auto the interface to automatically detect the speed.
[100|1000|10000]} If you use the 10, 100, or 1000 keywords with the auto
keyword, the port auto negotiates only at the specified
speeds.
On combo ports, it is possible to configure auto
negotiation even if only the fiber interface is active. The
auto negotiation settings will be utilized when the copper
port is active. Auto negotiation settings are ignored for the
fiber ports.
Command Purpose
configure Enter Global Configuration mode.
link-dependency group Enter the link-dependency mode to configure a link-
group_id dependency group.
add interface Add member ports to the group.
The interface variable includes the interface type and
number, for example gigabitethernet 1/0/3. You can also
add port channels (LAGs) as members by using the
keyword port-channel followed by an ID.
You can also specify a range of interfaces. For example,
interface gigabitethernet 1/0/8-10,1/0/20 configures
interfaces 8, 9, 10 and 20.
--More-- or (q)uit
Supplicant
Authenticator
Authentication
Server
LAN
NOTE: By default, all ports are in VLAN Access mode. A port that uses MAC-
based authentication should be configured to be in General mode.
When multiple hosts (for example, a PC, a printer, and a phone in the same
office) are connected to the switch on the same port, each of the connected
hosts authenticates separately with the RADIUS server.
If a port uses MAC-based 802.1X authentication, the option to use MAC
Authentication Bypass (MAB) is available. MAB is a supplemental
authentication mechanism that allows 802.1X unaware clients – such as
printers, fax machines, and some IP phones — to authenticate to the network
using the client MAC address as an identifier.
The known and allowable MAC address and corresponding access rights of
the client must be pre-populated in the authentication server.
When a port configured for MAB receives traffic from an unauthenticated
client, the switch (Authenticator):
• Sends a EAP Request packet to the unauthenticated client
• Waits a pre-determined period of time for a response
• Retries – resends the EAP Request packet up to three times
• Considers the client to be 802.1X unaware client (if it does not receive an
EAP response packet from that client)
The authenticator sends a request to the authentication server with the MAC
address of the client in a hexadecimal format as the username and the MD5
hash of the MAC address as the password. The authentication server checks
its database for the authorized MAC addresses and returns an Access-Accept
or an Access-Reject response, depending on whether the MAC address is
found in the database. MAB also allows 802.1X-unaware clients to be placed
in a RADIUS-assigned VLAN or to apply a specific Filter ID to the client
traffic.
Guest VLAN
The Guest VLAN feature allows a switch to provide a distinguished service to
unauthenticated users. This feature provides a mechanism to allow users
access to hosts on the guest VLAN. For example, a company might provide a
guest VLAN to visitors and contractors to permit network access that allows
visitors to connect to external network resources, such as the Internet, with
no ability to browse information on the internal LAN.
In port-based 802.1X mode, when a client that does not support 802.1X is
connected to an unauthorized port that is 802.1X-enabled, the client does not
respond to the 802.1X requests from the switch. Therefore, the port remains
in the unauthorized state, and the client is not granted access to the network.
If a guest VLAN is configured for that port, then the port is placed in the
configured guest VLAN and the port is moved to the authorized state,
allowing access to the client. However, if the port is in MAC-based 802.1X
authentication mode, it will not move to the authorized state. MAC-based
mode makes it possible for both authenticated and guest clients to use the
same port at the same time.
NOTE: MAB and the guest VLAN feature are mutually exclusive on a port.
NOTE: The IAS database does not handle VLAN assignments or DiffServ policy
assignments.
Feature Description
Global 802.1X status Disabled
802.1X authentication method none
Per-port 802.1X status Disabled
Port state automode
Periodic reauthentication Disabled
Seconds between reauthentication 3600
attempts
Authentication server timeout 30 seconds
Resending EAP identity Request 30 seconds
Quiet period 60 seconds
Supplicant timeout 30 seconds
Max EAP request 2 times
Maximum number of supplicants per port 16
for MAC-based authentication mode
Guest VLAN Disabled
Unauthenticated VLAN Disabled
Dynamic VLAN creation Disabled
RADIUS-assigned VLANs Disabled
IAS users none configured
Port security Unlocked
Port security traps Disabled
Maximum learned MAC addresses 100 (when locked)
Monitor mode Disabled
Dot1x Authentication
Use the Dot1x Authentication page to configure the 802.1X administrative
mode on the switch and to configure general 802.1X parameters for a port.
To display the Dot1x Authentication page, click Switching → Network
Security → Dot1x Authentication → Authentication in the navigation panel.
5 Click Apply.
Authenticated Users
The Authenticated Users page is used to display lists of ports that have
authenticated users.
To display the Authenticated Users page, click Switching → Network
Security → Authenticated Users in the navigation panel.
NOTE: The VLAN Assignment Mode field is the same as the Admin Mode field on
the System → Management Security → Authorization Network RADIUS page.
NOTE: If no users exist in the IAS database, the IAS Users Configuration Page
does not display the fields shown in the image.
4 Click Apply.
To view the Internal Authentication Server Users Table page, click Show All.
4 Click Apply.
Command Purpose
configure Enter Global Configuration mode.
aaa accounting dot1x Sets 802.1X accounting to the default operational mode
default
aaa authentication Specify the authentication method to use to authenticate
dot1x default method1 802.1X clients that connect to the switch.
method1—The method keyword can be radius, none, or
ias.
dot1x system-auth- Globally enable 802.1X authentication on the switch.
control
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example gigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
gigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12.
Command Purpose
configure Enter Global Configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example gigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
gigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12.
dot1x reauthentication Enable periodic re-authentication of the client.
dot1x timeout re- Set the number of seconds between re-authentication
authperiod seconds attempts.
dot1x timeout server- Set the time that the switch waits for a response from the
timeout seconds authentication server.
dot1x timeout tx-period Set the number of seconds that the switch waits for a
seconds response to an Extensible Authentication Protocol (EAP)-
request/identity frame from the client before resending the
request.
dot1x timeout quiet- Set the number of seconds that the switch remains in the
period seconds quiet state following a failed authentication exchange (for
example, the client provided an invalid password).
Command Purpose
configure Enter Global Configuration mode.
aaa authorization Allow the RADIUS server to assign VLAN IDs to clients.
network default radius
NOTE: When dynamically creating VLANs, the uplink port should be in trunk
mode so that it will automatically participate in all dynamically-created VLANs.
Otherwise, the supplicant may be placed in a VLAN that does not go beyond the
switch because no other ports are participating.
Command Purpose
configure Enter Global Configuration mode.
aaa ias-user username Add a user to the IAS user database. This command also
user changes the mode to the AAA User Config mode.
password password Configure the password associated with the user.
[encrypted]
CTRL + Z Exit to Privileged EXEC mode.
show aaa ias-users View all configured IAS users.
clear aaa ias-users Delete all IAS users from the database.
NOTE: The printer requires an entry in the client database that uses the printer
MAC address as the username.
PowerConnect Switch
Clients
(Port 8) LAN
LAN Uplink
(Port 24)
Printer
Server
(Port 7)
(Port 9)
Interface...................................... Gi1/0/1
User Name...................................... aoversmit
Supp MAC Address............................... 0012.1753.031A
Session Time................................... 756
Interface...................................... Gi1/0/3
User Name...................................... dflint
Supp MAC Address............................... 0004.5A55.EFAD
Session Time................................... 826
Filter Id......................................
VLAN Assigned.................................. 1 (Default)
Interface...................................... Gi1/0/7
User Name...................................... 0006.6B33.06BA
Supp MAC Address............................... 0006.6B33.06BA
Session Time................................... 826
Filter Id......................................
VLAN Assigned.................................. 1 (Default)
9 View a summary of the port status.
console#show dot1x
Administrative Mode............... Enabled
Quiet Period................................... 60
Transmit Period................................ 30
Maximum Requests............................... 2
Max Users...................................... 2
VLAN Assigned.................................. 1 (Default)
Supplicant Timeout............................. 30
Guest-vlan Timeout............................. 90
Server Timeout (secs).......................... 30
MAB mode (configured).......................... Disabled
MAB mode (operational)......................... Disabled
The commands in this example show how to configure the switch to control
VLAN assignment for the example network. This example also contains
commands to configure the uplink, or trunk, port (a port connected to a
router or the internal network), and to configure the downlink, or access,
ports (ports connected to one or more hosts). Ports 1–23 are downstream
ports. Port 24 is an uplink port. An external RADIUS server handles the
VLAN assignment.
NOTE: The configuration to control the VLAN assignment for authorized users is
done on the external RADIUS server.
console(config)#vlan 200
console(config-vlan200)#name Unauthorized
console(config-vlan200)#exit
console(config)#vlan 300
console(config-vlan300)#name Guest
console(config-vlan300)#exit
2 Configure information about the external RADIUS server the switch uses
to authenticate clients. The RADIUS server IP address is 10.10.10.10, and
the shared secret is qwerty123.
console(config)#radius-server key qwerty123
console(config)#radius-server host 10.10.10.10
console(Config-auth-radius)#exit
3 Enable 802.1X on the switch.
console(config)#dot1x system-auth-control
4 Create a default authentication login list and use the RADIUS server for
port-based authentication for connected clients.
console(config)#aaa authentication dot1x default
radius
5 Allow the switch to accept VLAN assignments by the RADIUS server.
console(config)#aaa authorization network default
radius
6 Enter interface configuration mode for the downlink ports.
console(config)#interface range gi1/0/1-23
7 Set the downlink ports to the access mode because each downlink port
connects to a single host that belongs to a single VLAN.
console(config-if)#switchport mode access
NOTE: The configuration to control the VLAN assignment for hosts is done on
the external RADIUS server.
Feature Description
Port security Unlocked
Port security traps Disabled
Maximum learned MAC addresses 100 (when locked)
Monitor mode Disabled
Port Security
Use the Port Security page to enable MAC locking on a per-port basis. When
a port is locked, you can limit the number of source MAC addresses that are
allowed to transmit traffic on the port.
To display the Port Security page, click Switching → Network Security →
Port Security in the navigation panel.
5 Click Apply.
Command Purpose
configure Enter Global Configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example gigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
gigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12.
port security [discard] Enable port security on the port. This prevents the switch
[trap seconds] from learning new addresses on this port after the
maximum number of addresses has been learned.
• discard — Discards frames with unlearned source
addresses. This is the default if no option is indicated.
• trap seconds — Sends SNMP traps and defines the
minimal amount of time in seconds between two
consecutive traps. (Range: 1–1000000)
port security max max- Set the maximum number of MAC addresses that can be
addr learned on the port while port security is enabled.
CTRL + Z Exit to Privileged EXEC mode.
show ports security View port security settings on all interfaces or the specified
[interface] interface.
show ports security View the current MAC addresses that have been learned
addresses [interface] on all ports or the specified port.
ACL Overview
Access Control Lists (ACLs) are a collection of permit and deny conditions,
called rules, that provide security by blocking unauthorized users and
allowing authorized users to access specific resources.
ACLs can also provide traffic flow control, restrict contents of routing
updates, and decide which types of traffic are forwarded or blocked. ACLs can
reside in a firewall router, a router connecting two internal networks, or a
Layer 3 switch, such as a PowerConnect M6220/M6348/M8024/M8024-k
switch.
You can also create an ACL that limits access to the management interfaces
based on the connection method (for example, Telnet or HTTP) and/or the
source IP address.
The PowerConnect M6220, M6348, M8024, and M8024-k switches support
ACL configuration in both the ingress and egress direction. Egress ACLs
provide the capability to implement security rules on the egress flows (traffic
leaving a port) rather than the ingress flows (traffic entering a port). Ingress
and egress ACLs can be applied to any physical port, port-channel (LAG), or
VLAN routing port.
NOTE: Every ACL is terminated by an implicit deny all rule, which covers any
packet not matching a preceding explicit rule.
You can set up ACLs to control traffic at Layer 2, Layer 3, or Layer 4. MAC
ACLs operate on Layer 2. IP ACLs operate on Layers 3 and 4. PowerConnect
M6220, M6348, M8024, and M8024-k switches support both IPv4 and IPv6
ACLs.
NOTE: Adding a conflicting periodic time range to an absolute time range will
cause the time range to become inactive. For example, consider an absolute time
range from 8:00 AM Tuesday March 1st 2011 to 10 PM Tuesday March 1st 2011.
Adding a periodic entry using the 'weekend' keyword will cause the time-range
to become inactive because Tuesdays are not on the weekend.
EtherType Protocol
0x0800 Internet Protocol version 4 (IPv4)
0x0806 Address Resolution Protocol (ARP)
0x0842 Wake-on LAN Packet
0x8035 Reverse Address Resolution Protocol (RARP)
0x8100 VLAN tagged frame (IEEE 802.1Q)
EtherType Protocol
0x86DD Internet Protocol version 6 (IPv6)
0x8808 MAC Control
0x8809 Slow Protocols (IEEE 802.3)
0x8870 Jumbo frames
0x888E EAP over LAN (EAPOL – 802.1x)
0x88CC Link Layer Discovery Protocol
0x8906 Fibre Channel over Ethernet
0x8914 FCoE Initialization Protocol
0x9100 Q in Q
IP ACL Configuration
Use the IP ACL Configuration page to add or remove IP-based ACLs.
To display the IP ACL Configuration page, click Switching → Network
Security → Access Control Lists → IP Access Control Lists →
Configuration in the navigation panel.
4 Click Apply.
NOTE: There is an implicit deny all rule at the end of an ACL list. This means that
if an ACL is applied to a packet and if none of the explicit rules match, then the
final implicit "deny all" rule applies and the packet is dropped.
4 Click Apply.
4 Click Apply.
3 Click Apply.
4 Click Configuration to return to the Time Range Entry Configuration
page.
5 In the Time Range Name field, select the name of the time range to
configure.
6 Specify an ID for the time range. You can configure up to 10 different time
range entries to include in the named range. However, only one absolute
time entry is allowed per time range.
7 Configure the values for the time range entry.
8 Click Apply.
9 To add additional entries to the named time range, repeat step 5 through
step 8.
Command Purpose
configure Enter global configuration mode.
access-list name {deny | Create a named ACL (if it does not already exist) and
permit} {every | {[icmp create a rule for the named ACL. If the ACL already exists,
| igmp | ip | tcp | udp | this command creates a new rule for the ACL.
number] {srcip srcmask • list-name — Access-list name up to 31 characters in
| any} [eq [portkey | length.
portvalue]] {dstip
dstmask | any} [eq • deny | permit — Specifies whether the IP ACL rule
[portkey | portvalue]] permits or denies an action.
[precedence precedence • every — Allows all protocols.
| tos tos tosmask | dscp
• eq — Equal. Refers to the Layer 4 port number being
dscp] [log] [time-range
used as match criteria. The first reference is source match
time-range-name]
criteria, the second is destination match criteria.
[assign-queue queue-id]
[redirect interface | • number — Standard protocol number. Protocol keywords
mirror interface]}} icmp, igmp, ip, tcp, udp.
• srcip — Source IP address.
• srcmask — Source IP mask.
• dstip — Destination IP address.
• dstmask — Destination IP mask.
Command Purpose
configure Enter global configuration mode.
mac access-list extended Create a named MAC ACL. This command also enters
name MAC Access List Configuration mode. If a MAC ACL
with this name already exists, this command enters the
mode to update the existing ACL.
{deny | permit} Specify the rules (match conditions) for the MAC access
{srcmac srcmacmask | list.
any} {dstmac • srcmac — Valid source MAC address in format
dstmacmask | any | xxxx.xxxx.xxxx.
bpdu } [{ethertypekey |
0x0600-0xFFFF }] [vlan • srcmacmask — Valid MAC address bitmask for the source
eq 0-4095 ] [cos 0-7] MAC address in format xxxx.xxxx.xxxx.
[secondary-vlan eq 0- • any — Packets sent to or received from any MAC address
4095 ] [secondary-cos
• dstmac — Valid destination MAC address in format
0-7] [log] [time-range
xxxx.xxxx.xxxx.
time-range-name]
[assign-queue queue-id] • destmacmask — Valid MAC address bitmask for the
[{mirror |redirect} destination MAC address in format xxxx.xxxx.xxxx.
interface ] • bpdu — Bridge protocol data unit
• ethertypekey — Either a keyword or valid four-digit
hexadecimal number. (Range: Supported values are
appletalk, arp, ibmsna, ipv4, ipv6, ipx, mplsmcast,
mplsucast, Netbios, novell, pppoe, rarp.)
• 0x0600-0xFFFF — Specify custom EtherType value
(hexadecimal range 0x0600-0xFFFF)
Command Purpose
configure Enter global configuration mode.
ipv6 access-list name Create a named IPv6 ACL. This command also enters IPv6
Access List Configuration mode. If an IPv6 ACL with this
name already exists, this command enters the mode to
update the existing ACL.
{permit | deny} {every | Specify the match conditions for the IPv6 access list.
{{icmp | igmp | ipv6 | • deny | permit — Specifies whether the IP ACL rule
tcp | udp | number} permits or denies an action.
{any | source ipv6
prefix/prefix length} [eq • every — Allows all protocols.
{portkey | portvalue}] • number — Standard protocol number or protocol
{any | destination ipv6 keywords icmp, igmp, ipv6, tcp, udp.
prefix/prefix length} [eq
• source ipv6 prefix — IPv6 prefix in IPv6 global address
{portkey | portvalue}]
format.
[flow-label value] [dscp
dscp]}} [log] [time- • prefix-length — IPv6 prefix length value.
range time-range-name] • eq — Equal. Refers to the Layer 4 port number being
[assign-queue queue-id] used as a match criteria. The first reference is source
[{mirror | redirect} match criteria, the second is destination match criteria.
interface]
• portkey — Or you can specify the portkey, which can be
one of the following keywords: domain, echo, efts,
ftpdata, http, smtp, snmp, telnet, tftp, and www.
• portvalue — The source layer 4 port match condition for
the ACL rule is specified by the port value parameter.
(Range: 0–65535).
Command Purpose
configure Enter global configuration mode.
time-range name Create a named time range and enter the Time-Range
Configuration mode for the range.
absolute {[start time Configure a nonrecurring time entry for the named time
date] [end time date ]} range.
• start time date — Time and date the ACL rule starts
going into effect. The time is expressed in a 24-hour
clock, in the form of hours:minutes. For example, 8:00 is
8:00 am and 20:00 is 8:00 pm. The date is expressed in
the format day month year. If no start time and date are
specified, the configuration statement is in effect
immediately.
• end time date — Time and date the ACL rule is no
longer in effect.
Configuring an IP ACL
The commands in this example set up an IP ACL that permits hosts in the
192.168.77.0/24 subnet to send TCP and UDP traffic only to the host with an
IP address of 192.168.77.50. The ACL is applied to port 2 on the
PowerConnect switch.
Port Gi 1/0/2
Inbound Interface(s):
ch1-48,Gi1/0/1-Gi1/0/48
Rule Number: 1
Action.................................. deny
Ethertype................................ ipx
Rule Number: 2
Action.................................. permit
Match All............................... TRUE
Inbound VLAN(s):
100
Rule Number: 1
Action............................ deny
Match All......................... FALSE
Protocol.......................... 6(tcp)
Source IP Address................. any
Destination IP Address............ any
Destination L4 Port Keyword........ 80(www/http)ip
Time Range Name....................work-hours
Rule Status....................... inactive
NOTE: Management ACLs can be applied only to in-band ports and cannot be
applied to the OOB port.
Command Purpose
configure Enter Global Configuration mode.
mgmt_ACL
--------
permit ip-source 10.27.65.0 mask 255.255.255.0
vlan 1 priority 1
permit ip-source 10.27.65.0 mask 255.255.255.0
Gi1/0/9 priority 2
! (Note: all other access implicitly denied)
6 Verify that the configured management ACL is in use.
VLAN Overview
By default, all switchports on a PowerConnect
M6220/M6348/M8024/M8024-k switch are in the same broadcast domain.
This means when one host connected to the switch broadcasts traffic, every
device connected to the switch receives that broadcast. All ports in a
broadcast domain also forward multicast and unknown unicast traffic to the
connected host. Large broadcast domains can result in network congestion,
and end users might complain that the network is slow. In addition to latency,
large broadcast domains are a greater security risk since all hosts receive all
broadcasts.
Virtual Local Area Networks (VLANs) allow you to divide a broadcast domain
into smaller, logical networks. Like a bridge, a VLAN switch forwards traffic
based on the Layer 2 header, which is fast, and like a router, it partitions the
network into logical segments, which provides better administration, security,
and management of multicast traffic.
Network administrators have many reasons for creating logical divisions, such
as department or project membership. Because VLANs enable logical
groupings, members do not need to be physically connected to the same
switch or network segment. Some network administrators use VLANs to
Each VLAN has a unique number, called the VLAN ID. The PowerConnect
M6220, M6348, M8024, and M8024-k switches support a configurable VLAN
ID range of 2–4093. A VLAN with VLAN ID 1 is configured on the switch by
default. VLAN 1 is named default, which cannot be changed. However, you
can associate names with any other VLANs that you create.
In a tagged frame, the VLAN is identified by the VLAN ID in the tag. In an
untagged frame, the VLAN identifier is the Port VLAN ID (PVID) specified
for the port that received the frame. For information about tagged and
untagged frames, see "VLAN Tagging" on page 565.
The PowerConnect M6220, M6348, M8024, and M8024-k switches support
adding individual ports and Link Aggregation Groups (LAGs) as VLAN
members.
Figure 21-1 shows an example of a network with three VLANs that are
department-based. The file server and end stations for the department are all
members of the same VLAN.
Router
Engineering
VLAN 100
Switch Payroll
VLAN 300
Tech Pubs
VLAN 200
In this example, each port is manually configured so that the end station
attached to the port is a member of the VLAN configured for the port. The
VLAN membership for this network is port-based or static.
PowerConnect M6220, M6348, M8024, and M8024-k switches also support
VLAN assignment based on any of the following criteria:
• MAC address of the end station
• IP subnet of the end station
• Protocol of the packet transmitted by the end station
Switchport Modes
You can configure each port on a PowerConnect
M6220/M6348/M8024/M8024-k switch to be in one of the following modes:
• Access — Access ports are intended to connect end-stations to the system,
especially when the end-stations are incapable of generating VLAN tags.
Access ports support a single VLAN (the PVID). Packets received untagged
are processed as if they are tagged with the access port PVID. Packets
received that are tagged with the PVID are also processed. Packets received
that are tagged with a VLAN other than the PVID are dropped.
• Trunk — Trunk-mode ports are intended for switch-to-switch links. Trunk
ports can receive both tagged and untagged packets. Tagged packets
received on a trunk port are forwarded on the VLAN contained in the tag.
Untagged packets received on a trunk port are forwarded on the native
VLAN. Packets received on another interface belonging to the native
VLAN are transmitted untagged on a trunk port.
When a port is in General mode, all VLAN features are configurable. When
ingress filtering is on, the frame is dropped if the port is not a member of the
VLAN identified by the VLAN ID in the tag. If ingress filtering is off, all
tagged frames are forwarded. The port decides whether to forward or drop the
frame when the port receives the frame.
VLAN Tagging
PowerConnect M6220, M6348, M8024, and M8024-k switches support IEEE
802.1Q tagging. Ethernet frames on a tagged VLAN have a 4-byte VLAN tag
in the header. VLAN tagging is required when a VLAN spans multiple
switches, which is why trunk ports transmit and receive only tagged frames.
Tagging may be required when a single port supports multiple devices that are
members of different VLANs. For example, a single port might be connected
to an IP phone, a PC, and a printer (the PC and printer are connected via
ports on the IP phone). IP phones are typically configured to use a tagged
VLAN for voice traffic, while the PC and printers typically use the untagged
VLAN.
GVRP
The GARP VLAN Registration Protocol (GVRP) helps to dynamically
manage VLAN memberships on trunk ports. When GARP is enabled,
switches can dynamically register (and de-register) VLAN membership
information with other switches attached to the same segment.
Information about the active VLANs is propagated across all networking
switches in the bridged LAN that support GVRP. You can configure ports to
forbid dynamic VLAN assignment through GVRP.
The operation of GVRP relies upon the services provided by the Generic
Attribute Registration Protocol (GARP). GVRP can create up to 1024 VLANs.
For information about GARP timers, see "What Are GARP and GMRP?" on
page 710.
Double-VLAN Tagging
For trunk ports, which are ports that connect one switch to another switch,
the PowerConnect M6220, M6348, M8024, and M8024-k switches support
double-VLAN tagging. This feature allows service providers to create Virtual
Metropolitan Area Networks (VMANs). With double-VLAN tagging, service
providers can pass VLAN traffic from one customer domain to another
through a metro core in a simple and cost-effective manner. By using an
Voice VLAN
The Voice VLAN feature enables switch ports to carry voice traffic with
defined priority. When multiple devices, such as a PC and an IP phone, are
connected to the same port, you can configure the port to use one VLAN for
voice traffic and another VLAN for data traffic.
Voice over IP (VoIP) traffic is inherently time-sensitive: for a network to
provide acceptable service, the transmission rate is vital. The priority level
enables the separation of voice and data traffic coming onto the port.
A primary benefit of using Voice VLAN is to ensure that the sound quality of
an IP phone is safeguarded from deteriorating when the data traffic on the
port is high. The switch uses the source MAC address of the traffic traveling
through the port to identify the IP phone data flow.
The Voice VLAN feature can be enabled on a per-port basis. This feature
supports a configurable voice VLAN DSCP value. This value is later retrieved
by LLDP when the LLDPDU is transmitted, if LLDP has been enabled on
the port and the required TLV is configured for the port.
After the VoIP phone receives its VLAN information, all traffic is tagged with
the VLAN ID of the Voice VLAN. The phone is considered to be authorized
to send traffic but not necessarily authenticated.
Private VLANs
Private VLANs partition a standard VLAN domain into two or more
subdomains. Each subdomain is defined by a primary VLAN and a secondary
VLAN. The primary VLAN ID is the same for all subdomains that belong to a
particular private VLAN instance. The secondary VLAN ID differentiates the
subdomains from each other and provides layer 2 isolation between ports on
the same private VLAN.
The following types of VLANs can be configured in a private VLAN:
• Primary VLAN—Forwards the traffic from the promiscuous ports to
isolated ports, community ports and other promiscuous ports in the same
private VLAN. Only one primary VLAN can be configured per private
VLAN. All ports within a private VLAN share the same primary VLAN.
R1
TE1/1/1
SW1 SW2
Gi1/0/12 Gi2/0/11
Gi1/0/10 Gi1/0/11 Gi2/0/10
Promiscuous Ports
An endpoint connected to a promiscuous port is allowed to communicate
with any endpoint within the private VLAN. Multiple promiscuous ports can
be defined for a single private VLAN domain.
In the configuration shown in Figure 21-3, the port connected from SW1 to
R1 (TE1/1/1) is configured as a promiscuous port. It is possible to configure a
port-channel as a promiscuous port in order to provide a level of redundancy
on the private VLAN uplink.
Community Ports
An endpoint connected to a community port is allowed to communicate with
the endpoints within a community and can also communicate with any
configured promiscuous port. The endpoints that belong to one community
cannot communicate with endpoints that belong to a different community, or
with endpoints connected to isolated ports.
To
From promiscuous community 1 community 2 isolated stack (trunk)
To
From promiscuous community 1 community 2 isolated stack (trunk)
To
From promiscuous community 1 community 2 isolated stack (trunk)
Feature Value
Default VLAN VLAN 1
VLAN Name No VLAN name is configured except for VLAN 1,
whose name “default” cannot be changed.
VLAN Range 2–4093
Switchport mode Access
Double-VLAN tagging Disabled
If double-VLAN tagging is enabled, the default
EtherType value is 802.1Q
Maximum number of 128
configurable MAC-to-VLAN
bindings
Maximum number of 64
configurable
IP Subnet-to-VLAN bindings
GVRP Disabled
If GVRP is enabled, the default port parameters are:
• GVRP State: Disabled
• Dynamic VLAN Creation: Disabled
• GVRP Registration: Disabled
Number of dynamic VLANs 1024
that can be assigned through
GVRP
Voice VLAN Disabled
Voice VLAN DSCP value 46
Voice VLAN authentication Enabled
mode
VLAN Membership
Use the VLAN Membership page to create VLANs and define VLAN groups
stored in the VLAN membership table.
To display the VLAN Membership page, click Switching → VLAN → VLAN
Membership in the navigation panel.
The VLAN Membership tables display which Ports and LAGs are members of
the VLAN, and whether they’re tagged (T), untagged (U), or forbidden (F).
The tables have two rows: Static and Current. Only the Static row is
configurable. The Current row is updated either dynamically through GVRP
or when the Static row is changed and Apply is clicked.
There are two tables on the page:
• Ports — Displays and assigns VLAN membership to ports. To assign
membership, click in Static for a specific port. Each click toggles between
U, T, and blank. See Table 21-8 for definitions.
• LAGs — Displays and assigns VLAN membership to LAGs. To assign
membership, click in Static for a specific LAG. Each click toggles between
U, T, and blank. See Table 21-8 for definitions.
Adding a VLAN
To create a VLAN:
4 Click Apply.
4 Click Apply.
5 Verify that the ports have been added to the VLAN.
NOTE: You can add ports to a VLAN through the table on the VLAN Membership
page or through the PVID field on the Port Settings page. The PVID is the VLAN
that untagged received packets are assigned to. To include a general-mode port
in multiple VLANs, use the VLAN Membership page.
To display the Port Settings page, click Switching → VLAN → Port Settings
in the navigation panel.
From the Port Settings page, click Show All to see the current VLAN settings
for all ports. You can change the settings for one or more ports by clicking the
Edit option for a port and selecting or entering new values.
From the Bind MAC to VLAN page, click Show All to see the MAC
addresses that are mapped to VLANs. From this page, you can change the
settings for one or more entries or remove an entry.
From the GVRP Parameters page, click Show All to see the GVRP
configuration for all ports. From this page, you can change the settings for
one or more entries.
NOTE: Per-port and per-LAG GVRP Statistics are available from the
Statistics/RMON page. For more information, see "Monitoring Switch Traffic" on
page 369.
4 Click Apply.
5 Click Protocol Group to return to the main Protocol Group page.
6 From the Group ID field, select the group to configure.
7 In the Protocol Settings table, select the protocol and interfaces to
associate with the protocol-based VLAN.
In Figure 21-20, the Protocol Group 1 (named IPX) is associated with the
IPX protocol and ports 14–16. Ports 20-22 are selected in Available Ports
list. After clicking the right arrow, they will be added to the Selected Ports
list.
8 Click Apply.
9 Click Show All to see the protocol-based VLANs and their members.
To view a summary of the double VLAN configuration for all interfaces and to
edit settings for one or more interfaces, click Show All.
NOTE: IEEE 802.1X must be enabled on the switch before you disable voice
VLAN authentication. Voice VLAN authentication can be disabled in order to
allow VoIP phones that do not support authentication to send and receive
unauthenticated traffic on the Voice VLAN.
Creating a VLAN
Beginning in Privileged EXEC mode, use the following commands to
configure a VLAN and associate a name with the VLAN.
Command Purpose
configure Enter global configuration mode.
vlan {vlan-id |vlan- Create a new VLAN or a range of VLANs and enter the
range} interface configuration mode for the specified VLAN or
VLAN range.
• vlan-id—A valid VLAN IDs (Range: 2–4093).
• vlan-range — A list of valid VLAN IDs to be added. List
separate, non-consecutive VLAN IDs separated by
commas (without spaces); use a hyphen to designate a
range of IDs. (Range: 2–4093)
name string Add a name to the specified VLAN.
string — Comment or description to help identify a
specific VLAN (Range: 1–32 characters).
CTRL + Z Exit to Privileged EXEC mode.
show vlan [id vlan-id | Display VLAN information.
name vlan-name] • vlan-id — A valid VLAN ID. (Range: 1–4093)
• vlan-name — A valid VLAN name string. (Range: 1–32
characters)
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example gigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
gigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12.
switchport mode access Configure the interface as an untagged layer 2 VLAN
interface.
switchport access vlan Configure the interface as a member of the specified
vlan-id VLAN.
vlan-id — A valid VLAN ID of the VLAN to which the port
is configured. (Range: 1–4093)
CTRL + Z Exit to Privileged EXEC mode.
show interfaces Display information about the VLAN settings configured
switchport interface for the specified interface.
Command Purpose
configure Enter global configuration mode.
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example gigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
gigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12.
switchport mode general Configure the interface as a tagged and an untagged layer
2 VLAN interface.
switchport general Configure the VLAN membership for the port. You can
allowed vlan also use this command to change the egress tagging for
[add|remove] vlan-list packets without changing the VLAN assignment.
{tagged|untagged} • add vlan-list — List of VLAN IDs to add. Separate
nonconsecutive VLAN IDs with a comma and no spaces.
Use a hyphen to designate a range of IDs. (Range:
1–4093)
• remove vlan-list — List of VLAN IDs to remove. Separate
nonconsecutive VLAN IDs with a comma and no spaces.
Use a hyphen to designate a range of IDs.
• tagged — Sets the port to transmit tagged packets for the
VLANs. If the port is added to a VLAN without specifying
tagged or untagged, the default is untagged.
• untagged — Sets the port to transmit untagged packets
for the VLANs.
Command Purpose
configure Enter global configuration mode.
interface port-channel Enter interface configuration mode for the specified
channel-id interface.
channel-id — Specific port channel. (Range 1–48). You
can also specify a range of LAGs with the interface range
port-channel command, for example, interface range port-
channel 4-8.
switchport mode Configure the interface as an untagged layer 2 VLAN
[access|general|trunk] interface.
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example gigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
gigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12.
mode dvlan-tunnel Enable Double VLAN Tunneling on the specified
interface.
exit Exit to global configuration mode
dvlan-tunnel ethertype Configure the EtherType to use for interfaces with double
{802.1Q | vman | VLAN tunneling enabled.
custom <0-65535>} • 802.1Q — Configures the EtherType as 0x8100.
[primary-tpid]
• vman — Configures the EtherType as 0x88A8.
• custom — Custom configures the EtherType for the
DVLAN tunnel. The value must be 0-65535.
• primary-tpid — Configure the primary (outer) TPID. If
this parameter is not present, the inner TPID is
configured.
CTRL + Z Exit to Privileged EXEC mode.
show dvlan-tunnel Display all interfaces enabled for Double VLAN Tunneling
show dvlan-tunnel Display detailed information about Double VLAN
interface {interface | Tunneling for the specified interface or all interfaces.
all}
Command Purpose
configure Enter global configuration mode.
vlan database Enter VLAN database mode.
vlan association mac Associate a MAC address with a VLAN.
mac-address vlan-id • mac-address — MAC address to associate. (Range: Any
MAC address in the format xxxx.xxxx.xxxx or
xx:xx:xx:xx:xx:xx)
• vlanid — VLAN to associate with subnet. (Range: 1-
4093)
CTRL + Z Exit to Privileged EXEC mode.
show vlan association Display the VLAN associated with a specific configured
mac [mac-address] MAC address. If no MAC address is specified, the VLAN
associations of all the configured MAC addresses are
displayed.
Command Purpose
configure Enter global configuration mode.
vlan database Enter VLAN database mode.
vlan association subnet Associate an IP subnet with a VLAN.
ip-address subnet-mask • ip-address — Source IP address. (Range: Any valid IP
vlanid address)
• subnet-mask — Subnet mask. (Range: Any valid subnet
mask)
• vlanid — VLAN to associated with subnet. (Range: 1-
4093)
CTRL + Z Exit to Privileged EXEC mode.
show vlan association Display the VLAN associated with a specific configured IP-
subnet [ip-address ip- Address and netmask. If no IP Address and net mask are
mask ] specified, the VLAN associations of all the configured IP-
subnets are displayed.
Configuring GVRP
Beginning in Privileged EXEC mode, use the following commands to enable
GVRP on the switch and on an interface, and to configure various GVRP
settings.
Command Purpose
configure Enter global configuration mode.
gvrp enable Enable GVRP on the switch.
interface interface Enter interface configuration mode for the specified port
or LAG. The interface variable includes the interface type
and number, for example gigabitethernet 1/0/3 or port-
channel 3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
gigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12.
gvrp enable Enable GVRP on the interface.
Command Purpose
configure Enter global configuration mode.
voice vlan Enable the voice vlan capability on the switch.
interface interface Enter interface configuration mode for the specified
interface.
interface — Specific interface, such as gi1/0/8. You can also
specify a range of interfaces with the interface range
command, for example, interface range gi1/0/8-12 enters
Interface Configuration mode for ports 8–12.
voice vlan {vlanid | Enable the voice vlan capability on the interface.
dot1p priority | none | • vlanid —The voice VLAN ID.
untagged | data priority
{trust | untrust} | auth • priority —The Dot1p priority for the voice VLAN on the
{enable | disable} | port.
dscp value} • trust—Trust the dot1p priority or DSCP values
contained in packets arriving on the voice vlan port.
• untrust—Do not trust the dot1p priority or DSCP values
contained in packets arriving on the voice vlan port.
• auth {enable | disable} — Use enable to allow voice
traffic on unauthorized voice vlan port. Use disable to
prevent voice traffic on an Unauthorized voice vlan port
• dscp value —The DSCP value (Range: 0–64).
CTRL + Z Exit to Privileged EXEC mode.
show voice vlan Display voice VLAN configuration information for the
[interface {interface switch, for the specified interface, or for all interfaces.
|all}]
NOTE: For an example that shows how to use a RADIUS server to provide VLAN
information, see "Controlling Authentication-Based VLAN Assignment" on
page 509. For an example that shows how to allow the switch to dynamically
create RADIUS-assigned VLANS, see "Allowing Dynamic VLAN Creation of
RADIUS-Assigned VLANs" on page 513.
This example assumes that network administrator wants to create the VLANs
in Table 21-9:
LAN/WAN
Switch 1 Switch 2
Port/LAG Function
Switch 1
1 Connects to Switch 2
2–15 Host ports for Payroll
16–20 Host ports for Marketing
LAG1 (ports 21–24) Connects to Payroll server
Switch 2
1 Connects to Switch 1
2–10 Host ports for Marketing
11–30 Host ports for Engineering
LAG1 (ports 35–39) Connects to file server
LAG2 (ports 40–44) Uplink to router.
e Repeat steps b–d to create VLANs 300 (Sales) and 400 (Payroll).
3 Click Apply.
4 Assign ports 2–15 and LAG1 to the Payroll VLAN.
a From the Switching → VLAN → VLAN Membership page, select
400-Payroll from the Show VLAN field.
b In the Static row, click the space for ports 2–15 and LAG 1 so the U
(untagged) displays for each port, and then click Apply.
Port: Gi1/0/1
VLAN Membership mode:Trunk Mode
Operating parameters:
PVID: 1
Ingress Filtering: Enabled
Acceptable Frame Type: VLAN Only
Default Priority: 0
GVRP status:Disabled
Interface............................. Gi1/0/10
Voice VLAN Interface Mode............. Enabled
Voice VLAN ID......................... 25
Voice VLAN COS Override............... False
Voice VLAN DSCP Value................. 46
Voice VLAN Port Status................ Disabled
Voice VLAN Authentication............. Disabled
VLAN Type
---- -----------------------
100 primary
101 community
102 isolated
console(config)#show vlan
STP Overview
STP is a layer 2 protocol that provides a tree topology for switches on a
bridged LAN. STP allows a network to have redundant paths without the risk
of network loops. STP uses the spanning-tree algorithm to provide a single
path between end stations on a network.
PowerConnect M6220, M6348, M8024, and M8024-k switches support
Classic STP, Multiple STP, and Rapid STP.
Assume that Switch A is elected to be the Root Bridge, and Port 1 on Switch
B and Switch C are calculated to be the root ports for those bridges, Port 2 on
Switch B and Switch C would be placed into the Blocking state. This creates a
loop-free topology. End stations in VLAN 10 can talk to other devices in
VLAN 10, and end stations in VLAN 20 have a single path to communicate
with other VLAN 20 devices.
For VLAN 10 this single STP topology is fine and presents no limitations or
inefficiencies. On the other hand, VLAN 20's traffic pattern is inefficient. All
frames from Switch B will have to traverse a path through Switch A before
arriving at Switch C. If the Port 2 on Switch B and Switch C could be used,
these inefficiencies could be eliminated. MSTP does just that, by allowing the
configuration of MSTIs based upon a VLAN or groups of VLANs. In this
simple case, VLAN 10 could be associated with Multiple Spanning Tree
Instance (MSTI)1 with an active topology similar to Figure 22-2 and VLAN
20 could be associated with MSTI 2 where Port 1 on both Switch A and
Switch B begin discarding and all others forwarding. This simple modification
creates an active topology with a better distribution of network traffic and an
increase in available bandwidth.
BPDU Flooding
The BPDU flooding feature determines the behavior of the switch when it
receives a BPDU on a port that is disabled for spanning tree. If BPDU
flooding is configured, the switch will flood the received BPDU to all the
ports on the switch which are similarly disabled for spanning tree.
Port Fast
The PortFast feature reduces the STP convergence time by allowing edge
ports that are connected to end devices (such as a desktop computer, printer,
or file server) to transition to the forwarding state without going through the
listening and learning states.
BPDU Filtering
Ports that have the PortFast feature enabled continue to transmit BPDUs.
The BPDU filtering feature prevents PortFast-enabled ports from sending
BPDUs.
If BPDU filtering is configured globally on the switch, the feature is
automatically enabled on all operational PortFast-enabled ports. These ports
are typically connected to hosts that drop BPDUs. However, if an operational
edge port receives a BPDU, the BPDU filtering feature disables PortFast and
allows the port to participate in the spanning-tree calculation.
Enabling BPDU filtering on a specific port prevents the port from sending
BPDUs and allows the port to drop any BPDUs it receives.
Loop Guard
Loop guard protects a network from forwarding loops induced by BPDU
packet loss. The reasons for failing to receive packets are numerous, including
heavy traffic, software problems, incorrect configuration, and unidirectional
link failure. When a non-designated port no longer receives BPDUs, the
spanning-tree algorithm considers that this link is loop free and begins
transitioning the link from blocking to forwarding. Once in forwarding state,
the link may create a loop in the network.
Enabling loop guard prevents such accidental loops. When a port is no longer
receiving BPDUs and the max age timer expires, the port is moved to a loop-
inconsistent blocking state. In the loop-inconsistent blocking state, traffic is
not forwarded so the port behaves as if it is in the blocking state. The port will
remain in this state until it receives a BPDU. It will then transition through
the normal spanning tree states based on the information in the received
BPDU.
3 For each port to configure, select the check box in the Edit column in the
row associated with the port.
4 Select the desired settings.
5 Click Apply.
3 For each LAG to configure, select the check box in the Edit column in the
row associated with the LAG.
4 Select the desired settings.
5 Click Apply.
3 For each Instance ID to modify, select the check box in the Edit column in
the row associated with the VLAN.
4 Update the Instance ID settings for the selected VLANs.
5 Click Apply.
3 For each interface to configure, select the check box in the Edit column in
the row associated with the interface.
4 Update the desired settings.
5 Click Apply.
Command Purpose
configure Enter global configuration mode.
spanning-tree Enable spanning tree on the switch.
spanning tree mode {stp Specify which spanning tree mode to use on the switch.
| rstp |mst}
spanning-tree priority Specify the priority of the bridge. (Range: 0–61440). The
priority switch with the lowest priority value is elected as the root
switch.
spanning-tree max-age Specify the switch maximum age time, which indicates the
seconds amount of time in seconds a bridge waits before
implementing a topological change. Valid values are from
(6 to 40) seconds.
spanning-tree forward- Specify the switch forward delay time, which indicates the
time seconds amount of time in seconds a bridge remains in a listening
and learning state before forwarding packets. Valid values
are from (4 to 30) seconds.
spanning-tree max-hops Configure the maximum number of hops for the Spanning
hops tree. Valid values are from (6 to 40).
spanning-tree transmit Set the maximum number of BPDUs that a bridge is
hold-count [value] allowed to send within a hello time window (2 seconds).
The range for value is 1–10.
CTRL + Z Exit to Privileged EXEC mode.
Command Purpose
configure Enter global configuration mode.
spanning-tree bpdu Allow the flooding of BPDUs received on non-spanning-
flooding tree ports to all other non-spanning-tree ports.
spanning-tree portfast Enable PortFast on all switch ports.
spanning-tree portfast Prevent ports configured in PortFast mode from sending
bpdufilter default BPDUs.
spanning-tree loopguard Enable loop guard on all ports.
default
spanning-tree bpdu- Enable BPDU protection on the switch.
protection
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example gigabitethernet 1/0/3 or port-
channel 4.
You can also specify a range of interfaces with the interface
range command, for example, interface range
gigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12. The range keyword is also valid for LAGs (port
channels).
spanning-tree auto- Set the port to auto portfast mode. This enables the port
portfast to become a portfast port if it does not see any BPDUs for
3 seconds.
spanning-tree guard Enable loop guard or root guard (or disable both) on the
{root | loop | none} interface.
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example gigabitethernet 1/0/3 or port-
channel 4.
You can also specify a range of interfaces with the interface
range command, for example, interface range
gigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12. The range keyword is also valid for LAGs (port
channels).
spanning-tree disable Disable spanning-tree on the port.
spanning-tree port- Specify the priority of the port. (Range: 0–240).
priority priority The priority value is used to determine which ports are put
in the forwarding state and which ports are put in the
blocking state. A port with a lower priority value is more
likely to be put into a forwarding state.
spanning-tree cost cost Specify the spanning-tree path cost for the port. (Range:
0–200,000,000). The default cost is 0, which signifies that
the cost is automatically calculated based on port speed.
CTRL + Z Exit to Privileged EXEC mode.
show spanning-tree View spanning tree configuration information for the
interface specified port or LAG (port channel).
Command Purpose
configure Enter global configuration mode.
spanning-tree mst Enable configuring an MST region by entering the
configuration multiple spanning-tree (MST) mode.
name string Define the MST configuration name
revision version Identify the MST configuration revision number.
instance instance-id Map VLANs to an MST instance.
{add | remove} vlan • instance-ID — ID of the MST instance. (Range: 1-4094)
vlan-range
• vlan-range — VLANs to be added to the existing MST
instance. To specify a range of VLANs, use a hyphen. To
specify a series of VLANs, use a comma. (Range: 1-4093)
exit Return to global configuration mode.
spanning-tree mst Set the switch priority for the specified spanning-tree
instance-id priority instance.
priority • instance-id — ID of the spanning-tree instance. (Range:
1-4094)
• priority — Sets the switch priority for the specified
spanning-tree instance. This setting affects the likelihood
that the switch is selected as the root switch. A lower
value increases the probability that the switch is selected
as the root switch. (Range: 0-61440)
CTRL + Z Exit to Privileged EXEC mode.
show spanning-tree mst- View multiple spanning tree configuration information.
configuration
show spanning-tree View information about the specified MSTI.
instance instance-id
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified interface.
The interface variable includes the interface type and number,
for example gigabitethernet 1/0/3 or port-channel 4.
You can also specify a range of interfaces with the interface
range command, for example, interface range gigabitethernet
1/0/8-12 configures interfaces 8, 9, 10, 11, and 12. The range
keyword is also valid for LAGs (port channels).
spanning-tree mst 0 Set the external cost for the common spanning tree. (Range:
external-cost cost 0–200000000)
spanning-tree mst Configure the path cost for MST calculations. If a loop occurs,
instance-id cost cost the spanning tree considers path cost when selecting an
interface to put in the forwarding state.
• instance-ID — ID of the spanning -tree instance. (Range: 1-
4094)
• cost — The port path cost. (Range: 0–200,000,000)
spanning-tree mst Specify the priority of the port.
instance-id port- The priority value is used to determine which ports are put in
priority priority the forwarding state and which ports are put in the blocking
state. A port with a lower priority value is more likely to be put
into a forwarding state.
• instance-ID — ID of the spanning-tree instance. (Range: 1-
4094)
• priority — The port priority. (Range: 0–240 in multiples of 16)
CTRL + Z Exit to Privileged EXEC mode.
show spanning-tree View MST configuration information for the specified port or
interface instance LAG (port channel) and instance.
instance-id
Configuring STP
This example shows a LAN with four switches. On each switch, ports 1, 2, and
3 connect to other switches, and ports 4–20 connect to hosts (in Figure 22-16,
each PC represents 17 host systems).
To make multiple switches be part of the same MSTP region, make sure the
STP operational mode for all switches is MSTP. Also, make sure the MST
region name and revision level are the same for all switches in the region.
To configure the switches:
1 Create VLAN 10 (Switch A and Switch B) and VLAN 20 (all switches).
NOTE: Even Switch B does not have any ports that are members of VLAN 10,
this VLAN must be created to allow the formation of MST regions made up of
all bridges that exchange the same MST Configuration Identifier. It is only
within these MST Regions that multiple instances can exist.
console#configure
console(config)#vlan 10,20
console(config-vlan10,20)#exit
console(config-vlan)#exit
What Is ISDP?
The Industry Standard Discovery Protocol (ISDP) is a proprietary Layer 2
network protocol that inter-operates with Cisco devices running the Cisco
Discovery Protocol (CDP). ISDP is used to share information between
neighboring devices. The switch software participates in the CDP protocol
and is able to both discover and be discovered by other CDP-supporting
devices.
What is LLDP?
LLDP is a standardized discovery protocol defined by IEEE 802.1AB. It allows
stations residing on an 802 LAN to advertise major capabilities physical
descriptions, and management information to physically adjacent devices
allowing a network management system (NMS) to access and display this
information.
What is LLDP-MED?
LLDP-MED is an extension of the LLDP standard. LLDP-MED uses LLDP's
organizationally-specific Type- Length-Value (TLV) extensions and defines
new TLVs that make it easier for a VoIP deployment in a wired or wireless
LAN/MAN environment. It also makes mandatory a few optional TLVs from
LLDP and recommends not transmitting some TLVs.
The TLVs only communicate information; these TLVs do not automatically
translate into configuration. An external application may query the MED
MIB and take management actions in configuring functionality.
Command Purpose
configure Enter Global Configuration mode.
isdp enable Administratively enable ISDP on the switch.
isdp advertise-v2 Allow the switch to send ISDPv2 packets.
isdp holdtime time Specify the number of seconds the device that receives
ISDP packets from the switch should store information
sent in the ISDP packet before discarding it.
isdp timer time Specify the number of seconds to wait between sending
new ISDP packets.
exit Exit to Privileged EXEC mode.
show isdp View global ISDP settings.
Command Purpose
configure Enter Global Configuration mode.
interface interface Enter interface configuration mode for the specified
interface.
isdp enable Administratively enable ISDP on the switch.
exit Exit to Global Config mode.
exit Exit to Privileged Exec mode.
show isdp interface all View the ISDP mode on all interfaces.
Command Purpose
show isdp entry {all | View information about all entries or a specific entry in the
deviceid} ISDP table.
show isdp neighbors View the neighboring devices discovered through ISDP.
clear isdp table Clear all entries, including discovered neighbors, from the
ISDP table.
show isdp traffic View ISDP statistics.
clear isdp counters Reset all ISDP statistics to zero.
Command Purpose
configure Enter Global Configuration mode.
lldp notification- Specify how often, in seconds, the switch should send
interval interval remote data change notifications.
lldp timers [interval Configure the timing for local data transmission on ports
transmit-interval] [hold enabled for LLDP.
hold-value] [reinit reinit- • transmit-interval — The interval in seconds at which to
delay] transmit local data LLDP PDUs. (Range: 5–32768
seconds)
• hold-value — Multiplier on the transmit interval used to
set the TTL in local data LLDP PDUs. (Range: 2–10)
• reinit-delay — The delay in seconds before re-
initialization. (Range: 1–10 seconds)
exit Exit to Privileged EXEC mode.
show lldp View global LLDP settings.
Command Purpose
configure Enter Global Configuration mode.
interface interface Enter interface configuration mode for the specified
Ethernet interface.
lldp transmit Enable the LLDP advertise (transmit) capability.
lldp receive Enable the LLDP receive capability so that the switch can
receive LLDP Protocol Data Units (LLDP PDUs) from
other devices.
lldp transmit-mgmt Include the transmission of local system management
address information in the LLDP PDUs.
Command Purpose
show lldp local-device View LLDP information advertised by all ports or the
{all | interface | detail specified port. Include the keyword detail to see additional
interface} information.
show lldp remote-device View LLDP information received by all ports or by the
{all | interface | detail specified port. Include the keyword detail to see additional
interface} information.
clear lldp remote-data Delete all LLDP information from the remote data table.
show lldp statistics View LLDP traffic statistics.
clear lldp statistics Reset the LLDP statistics counters to zero.
Command Purpose
configure Enter Global Configuration mode.
lldp med Specifies the number of LLDP PDUs that will be
faststartrepeatcount transmitted when the protocol is enabled.
count
interface interface Enter interface configuration mode for the specified
Ethernet interface.
lldp med Enable LLDP-MED on the interface.
lldp med Allow the port to send topology change notifications.
confignotification
lldp med transmit-tlv Specify which optional TLVs in the LLDP MED set are
[capabilities] [network- transmitted in the LLDP PDUs.
policy] [location]
[inventory]
exit Exit to Global Config mode.
exit Exit to Privileged EXEC mode.
show lldp med View global LLDP-MED settings.
show lldp med interface View LLDP-MED settings for all ports or for the specified
{all | interface} port.
Command Purpose
show lldp med local- View LLDP information advertised by the specified port.
device detail interface
show lldp remote-device View LLDP-MED information received by all ports or by
{all | interface | detail the specified port. Include the keyword detail to see
interface} additional information.
Configuring ISDP
This example shows how to configure ISDP settings on the switch.
To configure the switch:
1 Specify the number of seconds that a remote device should keep the ISDP
information sent by the switch before discarding it.
console#configure
console(config)#isdp holdtime 60
2 Specify how often, in seconds, the ISDP-enabled ports should transmit
information.
console(config)#isdp timer 45
3 Enable ISDP on interface 1/0/3.
console(config)#interface gigabitEthernet1/0/3
console(config-if-Gi1/0/3)#isdp enable
Interface Mode
--------------- ----------
Gi1/0/3 Enabled
Configuring LLDP
This example shows how to configure LLDP settings for the switch and to
allow Gigabit Ethernet port 1/0/3 to transmit all LLDP information available.
To configure the switch:
1 Configure the transmission interval, hold multiplier, and reinitialization
delay for LLDP PDUs sent from the switch.
console#configure
console(config)#lldp timers interval 60 hold 5
reinit 3
2 Enable port 1/0/3 to transmit and receive LLDP PDUs.
console(config)#interface gigabitEthernet1/0/3
console(config-if-Gi1/0/3)#lldp transmit
console(config-if-Gi1/0/3)#lldp receive
Interface: Gi1/0/3
Feature Description
Flow control Allows traffic transmission between a switch port and another
Ethernet device to be paused for a specified period of time when
congestion occurs.
Storm control Limits the amount of broadcast, unknown unicast, and multicast
frames accepted and forwarded by the switch.
Protected ports Prevents traffic from flowing between members of the same
protected port group.
LLPF Filters proprietary protocols that should not normally be relayed
by a bridge.
Feature Default
Flow control Enabled
Storm control Disabled
Protected ports None
LLPF No protocols are blocked
5 Click Apply.
5 Click Apply.
6 Click Protected Port Configuration to return to the main page.
7 Select the port to add to the group.
8 Select the protected port group ID.
9 Click Apply.
10 To view protected port group membership information, click Show All.
11 To remove a port from a protected port group, select the Remove check
box associated with the port and click Apply.
LLPF Configuration
Use the LLPF Interface Configuration page to filter out various proprietary
protocol data units (PDUs) and/or ISDP if problems occur with these
protocols running on standards-based switches.
To display the LLPF Interface Configuration page, click Switching →
Network Security → Proprietary Protocol Filtering → LLPF Interface
Configuration the navigation menu.
To view the protocol types that have been blocked for an interface, click Show
All.
Command Purpose
configure Enter global configuration mode.
flowcontrol Globally enable flow control.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example gigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
gigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12.
storm-control broadcast Enable broadcast storm recovery mode on the interface
[level rate] and (optionally) set the threshold.
rate — threshold as percentage of port speed. The
percentage is converted to a PacketsPerSecond value based
on a 512 byte average packet size.
storm-control multicast Enable multicast storm recovery mode on the interface
[level rate] and (optionally) set the threshold.
rate — threshold as percentage of port speed. The
percentage is converted to a PacketsPerSecond value based
on a 512 byte average packet size.
storm-control unicast Enable unknown unicast storm recovery mode on the
[level rate] interface and (optionally) set the threshold.
rate — threshold as percentage of port speed. The
percentage is converted to a PacketsPerSecond value based
on a 512 byte average packet size.
Command Purpose
configure Enter global configuration mode.
switchport protected Specify a name for one of the three protected port groups.
groupid name name • groupid — Identifies which group the port is to be
protected in. (Range: 0-2)
• name — Name of the group. (Range: 0-32 characters)
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example gigabitethernet 1/0/3.
switchport protected Add the interface to the specified protected port group.
groupid
CTRL + Z Exit to Privileged EXEC mode.
show switchport View protected group and port information.
protected
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example gigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
gigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12.
service-acl input Use the appropriate keyword, or combination of keywords
{blockcdp | blockvtp | to block any (or all) of the following PDUs on the
blockdtp | blockudld | interface:
blockpagp | blocksstp | • VTP
blockall}
• DTP
• UDLD
• PAgP
• SSTP
• All
CTRL + Z Exit to Privileged EXEC mode.
show service-acl View information about the blocked PDUs on the
interface {interface | specified interface or all interfaces.
all}
Protocol Mode
--------------- ----------
CDP Disabled
VTP Enabled
DTP Disabled
UDLD Disabled
PAGP Enabled
SSTP Disabled
ALL Disabled
L2 Multicast Overview
Multicast traffic is traffic from one source that has multiple destinations. The
L2 multicast features on the switch help control network flooding of Ethernet
multicast and IP multicast traffic by keeping track of multicast group
membership. It is essential that a multicast router be connected to a
PowerConnect layer 2 multicast switch for IGMP/MLD snooping to operate
properly. The presence of a multicast router allows the snooping switch to
relay IGMP reports to the router and to forward multicast data sources to the
multicast router as well as restrict flooding of multicast sources in a VLAN.
When IGMP snooping querier is enabled, the querier switch sends out
periodic IGMP queries that trigger IGMP report messages from the hosts that
want to receive IP multicast traffic. The IGMP snooping feature listens to
these IGMP reports to identify multicast router ports. If there is another
querier in the network and the local querier is in election mode, then the
querier with the lower IP address is elected and the other querier stops
querying. If the local querier is not in election mode and another querier is
detected, the local querier stops querying.
PCM6220 Restrictions
The PCM6220 floods unregistered IPv4 and IPv6 multicast on all ports (same
behavior as in release 5.0). There is no configurable option to change this
behavior. In addition, the PCM6220 may not flood all reserved IPv6 multicast
to all ports as it only supports registration/filtering on the last four octets of
the IPv6 multicast address. For example, if a multicast host registers for
33:33::05 on interface gi1/0/3, traffic addressed to FF:FF:00:05 (OSPFv3) will
not be flooded to all ports, but will instead be forwarded to gi1/0/3. This
behavior does not affect IPv4 multicast control plane traffic.
MRouter Status
Use the MRouter Status page to display the status of dynamically learned
multicast router interfaces.
To access this page, click Switching → Multicast Support → MRouter Status
in the navigation panel.
5 Click Apply.
The IGMP snooping settings are modified, and the device is updated.
Adding a New VLAN and Configuring its MLD Snooping VLAN Querier Settings
To configure an MLD snooping VLAN querier:
1 From the VLAN Querier page, click Add.
The page refreshes, and the Add VLAN page displays.
Use the MVR Global Configuration page to enable the MVR feature and
configure global parameters. To display the MVR Global Configuration
page, click Switching → MVR Configuration → Global Configuration in
the navigation panel.
3 For each port or LAG to configure, select the check box in the Edit
column in the row associated with the port.
4 Specify the desired timer values.
5 Click Apply.
GMRP Parameters
Use the GMRP Parameters page to configure the administrative mode of
GMRP on the switch and on each port or LAG.
To display the GMRP Parameters page, click Switching → GARP → GMRP
Parameters in the navigation panel.
3 For each port or LAG to configure, select the check box in the Edit
column in the row associated with the port.
4 Specify the desired timer values.
5 Click Apply.
Command Purpose
configure Enter global configuration mode.
mac address-table static Register a MAC-layer Multicast address in the bridge
mac-multicast-address table.
vlan vlan-id interface • mac-multicast-address — MAC multicast address in the
interface-id format xxxx.xxxx.xxxx or xx:xx:xx:xx:xx:xx.
• interface-id — A physical interface or port-channel.
mac address-table Forbid adding a specific Multicast address to specific ports.
multicast forbidden • mac-multicast-address — MAC multicast address in the
address vlan vlan-id format xxxx.xxxx.xxxx.
{mac-multicast-address
| ip-multicast-address} • ip- multicast-address — IP multicast address.
{add | remove} • add — Adds ports to the group. If no option is specified,
interface interface-list this is the default option.
• remove — Removes ports from the group.
• interface-list — Specifies the interface type (port-
channel, gigabitethernet, tengigabitethernet) and
number. Separate nonconsecutive interfaces with a
comma and no spaces; use a hyphen to designate a range
of ports.
exit Exit to Privileged EXEC mode.
Command Purpose
configure Enter global configuration mode.
ip igmp snooping vlan Enable IGMP snooping on the specified VLAN.
vlan-id
ip igmp snooping vlan Specify the host time-out value for the specified VLAN. If
vlan-id an IGMP report for a multicast group is not received in
groupmembership- the number of seconds specified by the seconds value, this
interval seconds port is deleted from the VLAN member list of that
multicast group. This command also enables IGMP
snooping on the VLAN.
ip igmp snooping vlan Specify the leave time-out value for the VLAN. If an
vlan-id last-member- IGMP report for a multicast group is not received within
query-interval seconds the number of seconds configured with this command
after an IGMP leave was received from a specific interface,
the current port is deleted from the VLAN member list of
that multicast group.
ip igmp snooping vlan Enables IGMP snooping immediate-leave mode on the
vlan-id immediate-leave specified VLAN. Enabling immediate-leave allows the
switch to immediately remove the layer 2 LAN interface
from its forwarding table entry upon receiving an IGMP
leave message for that multicast group without first
sending out MAC-based general queries to the interface.
Command Purpose
configure Enter global configuration mode.
ip igmp snooping querier Enable the IGMP snooping querier on the switch or on
[vlan vlan-id] [address the VLAN specified with the vlan-id parameter.
ip-address] Use the optional ip-address parameter to specify the IP
address that the snooping querier switch should use as the
source address when generating periodic queries.
ip igmp snooping querier Set the IGMP snooping querier query interval time, which
query-interval interval- is the amount of time in seconds that the switch waits
count before sending another periodic query. The range is
1–1800 seconds.
ip igmp snooping querier Set the IGMP snooping querier timer expiration period.
timer expiry seconds This is the time period, in seconds, that the switch
remains in non-querier mode after it has discovered that
there is a multicast querier in the network.
ip igmp snooping querier Set the IGMP version of the query that the switch sends
version version periodically. The version range is 1–2.
ip igmp snooping querier Enable the IGMP snooping querier on the specified
vlan-id VLAN.
Command Purpose
configure Enter global configuration mode.
ipv6 mld snooping vlan Enable MLD snooping on the specified VLAN.
vlan-id
ipv6 mld snooping vlan Specify the host time-out value for the specified VLAN. If
vlan-id an MLD report for a multicast group is not received in the
groupmembership- number of seconds specified by the seconds value, this
interval seconds VLAN is deleted from the member list of that multicast
group.
ipv6 mld snooping vlan- Specify the leave time-out value for the VLAN. If an MLD
id last-listener-query- report for a multicast group is not received within the
interval seconds number of seconds configured with this command after
an MLD leave was received from a specific interface, the
current port is deleted from the VLAN member list of that
multicast group.
Command Purpose
configure Enter global configuration mode.
ipv6 mld snooping Enable the MLD snooping querier on the switch.
querier
ipv6 mld snooping Enable the MLD snooping querier on VLAN specified
querier vlan vlan-id with the vlan-id parameter.
[address ipv6-address] Use the optional ip-address parameter to specify the IP
address that the snooping querier switch should use as the
source address when generating periodic queries.
Configuring MVR
Command Purpose
configure Enter global configuration mode.
Command Purpose
configure Enter global configuration mode.
garp timer {join | leave | Adjust the GARP application join, leave, and leaveall
leaveall} timer_value GARP timer values
The timer_value variable is in centiseconds. The range is
10-100 for join, 20-600 for leave, and 200-6000 for
leaveall.
gmrp enable Enable GMRP globally on the switch.
interface interface Enter interface configuration mode for the specified port
or LAG. The interface variable includes the interface type
and number, for example gigabitethernet 1/0/3. For a
LAG, the interface type is port-channel.
You can also specify a range of ports with the interface
range command, for example, interface range
gigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12.
gmrp enable Enable GMRP on the interface or range of interfaces.
exit Exit to Global Config mode.
exit Exit to Privileged EXEC mode.
show gmrp configuration View the administrative status of GMRP on the switch
and all interfaces.
Dot1ag Overview
With the emergence of Ethernet as a Metropolitan and Wide-Area
Networking technology, different operators often work together to provide
end-to-end services to enterprise customers. This has driven the need of a
new set of OAM (Operations, Administration, and Maintenance) Protocols.
Service-Level Connectivity Fault Management (CFM) is the OAM protocol
provision for end-to-end service-layer instances in carrier networks. CFM
provides mechanisms to support the administrator in performing connectivity
checks, fault detection, fault verification and isolation, and fault notification
per service in the network domain of interest. Unlike Ethernet OAM (IEEE
Access
Customer Links, Customer
Site 1 802.3ah Site 2
Customer
Provider
Operator 1 Operator 3
802.1ag Operator 2
Maintenance Associations
An MA is a logical connection between one or more MEPs that enables
monitoring a particular service instance. Each MA is associated with a unique
SVLAN ID. An MA is identified by a maintenance association ID. All MEPs
in the MA are assigned the maintenance identifier (MAID) for the
association.
An MD consists of one or more MAs at the same domain level.
Figure 26-3 depicts one provider-level domain and two operator-level
domains. Dot1ag operation for a service instance is indicated by the path that
traverses the different domains to provide the end-to-end connectivity fault
management for the service.
Configuration Tasks
The administrator defines the maintenance domains by configuring the
domain level (from 0–7) and a name. For each domain, the administrator
defines maintenance associations that are specified by a SVLAN ID and an
MA name. Then the administrator defines the switch ports that serve as
MEPs for a service instance and as MIPs within a domain.
When you associate endpoints with SVLAN IDs, the following default values
apply and are configurable:
Dot1ag MD Configuration
Use the MD Configuration page to configure maintenance domain levels
and names.
To display the page, click Switching → Dot1ag → MD Configuration in the
tree view.
Dot1ag MA Configuration
Use the MA Configuration page to associate a maintenance domain level
with one or more VLAN ID, provide a name for each maintenance association
(MA), and to set the interval between continuity check messages sent by
MEPs for the MA.
To display the page, click Switching → Dot1ag → MA Configuration in the
tree view.
Dot1ag L2 Traceroute
Use the L2 Traceroute page to generate a Link Trace message from a specified
MEP. The MEP can be specified by the MAC address, or by the remote MEP
ID.
To display the page, click Switching → Dot1ag → L2 Traceroute in the tree
view.
No Binding
Discover Release
Request NACK
Decline
NACK
The binding database includes data for clients only on untrusted ports.
To remove a static binding, select the Remove checkbox associated with the
binding and click Apply.
To view a summary of the DAI status for all interfaces, click Show All.
To view a summary of the DAI status for all VLANs, click Show All.
To remove an ARP ACL, select the Remove checkbox associated with the
ACL and click Apply.
To view a summary of the ARP ACL rules that have been created, click Show
All.
To remove an ARP ACL rule, select the Remove checkbox associated with the
rule and click Apply.
Command Purpose
configure Enter global configuration mode.
ip dhcp snooping Enable DHCP snooping on the switch.
ip dhcp snooping verify Enable the verification of the source MAC address with
mac-address the client MAC address in the received DHCP message.
ip dhcp snooping log- Enable the logging of DHCP messages filtered by the
invalid DHCP Snooping application.
ip dhcp snooping Configure a static binding in the DHCP snooping static
binding mac-address bindings database.
vlan vlan-id ip-address • mac-address —The client's MAC address.
interface interface
• vlan-id —The number of the VLAN the client is
authorized to use.
• ip-address —The IP address of the client.
• interface —The interface on which the client is
authorized. The form is unit/port.
ip dhcp snooping Configure the persistent storage location of the DHCP
database {local | snooping database.
tftp://hostIP/filename } • hostIP —The IP address of the remote host.
• filename —The name of the file for the database on the
remote host.
ip dhcp snooping Configure the interval, in seconds, at which the DHCP
database write-delay Snooping database will be stored in persistent storage. The
seconds number of seconds can range from 15–86400.
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified port
or LAG. The interface variable includes the interface type
and number, for example gigabitethernet 1/0/3. For a
LAG, the interface type is port-channel.
You can also specify a range of ports with the interface
range command, for example, interface range
gigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12.
ip verify source [port- Enable IPSG on the port or LAG to prevent packet
security] forwarding if the source IP address in the packet is not in
the DHCP snooping binding database. Use the option
port-security keyword to also prevent packet forwarding if
the sender MAC address is not in forwarding database
table or the DHCP snooping binding database. \
NOTE: To enforce filtering based on the source MAC
address, port security must also be enabled on the interface
by using the port security command in Interface
Configuration mode.
exit Exit to Global Config mode.
ip verify binding Configure a static binding for IPSG.
mac_addr vlan vlan_id
ipaddr interface interface
exit Exit to Privileged EXEC mode.
show ip verify interface View IPSG parameters for a specific port or LAG. The
interface interface parameter includes the interface type
(gigabitethernet, tengigabitethernet, or port-channel)
and number.
show ip verify source View IPSG bindings configured on the switch or on a
[interface interface] specific port or LAG.
show ip source binding View IPSG bindings.
Command Purpose
configure Enter global configuration mode.
ip arp inspection vlan Enable Dynamic ARP Inspection on a single VLAN or a
vlan-range [logging] range of VLANs. Use the logging keyword to enable
logging of invalid packets.
ip arp inspection Enable additional validation checks like source MAC
validate {[src-mac] [dst- address validation, destination MAC address validation, or
mac] [ip]} IP address validation on the received ARP packets.
Each command overrides the configuration of the
previous command. For example, if a command enables
source MAC address and destination validations and a
second command enables IP address validation only, the
source MAC address and destination MAC address
validations are disabled as a result of the second
command.
• src-mac—For validating the source MAC address of an
ARP packet.
• dst-mac—For validating the destination MAC address of
an ARP packet.
• ip—For validating the IP address of an ARP packet.
arp access-list acl-name Create an ARP ACL with the specified name (1–31
characters) and enter ARP Access-list Configuration mode
for the ACL.
permit ip host sender-ip Configure a rule for a valid IP address and MAC address
mac host sender-mac combination used in ARP packet validation.
• sender-ip — Valid IP address used by a host.
• sender-mac —Valid MAC address in combination with
the above sender-ip used by a host.
exit Exit to Global Config mode.
The commands in this example also enforce rate limiting and remote storage
of the bindings database. The switch has a limited amount of storage space in
NVRAM and flash memory, so the administrator specifies that the DHCP
snooping bindings database is stored on an external TFTP server.
VLAN
When members are added to a LAG, they are removed from all existing
VLAN membership. When members are removed from a LAG they are added
back to the VLANs that they were previously members of as per the
configuration file. Note that a port’s VLAN membership can still be
configured when it's a member of a LAG. However this configuration is only
actually applied when the port leaves the LAG.
The LAG interface can be a member of a VLAN complying with IEEE
802.1Q.
STP
Spanning tree does not maintain state for members of a LAG, but the
Spanning Tree does maintain state for the LAG interface. As far as STP is
concerned, members of a LAG do not exist. (Internally, the STP state of the
LAG interface is replicated for the member links.)
When members are deleted from a LAG they become normal links, and
spanning tree maintains their state information.
Statistics
Statistics are maintained for all LAG interfaces as they are done for the
physical ports, besides statistics maintained for individual members as per the
802.3ad MIB statistics.
LAG Configuration
Use the LAG Configuration page to set the name and administrative status
(up/down) of a LAG.
To display the LAG Configuration page, click Switching → Ports → LAG
Configuration in the navigation panel.
3 Select the Edit check box associated with each port to configure.
4 Specify the LACP port priority and LACP timeout for each port.
5 Click Apply.
3 Click Apply.
The LAG port is added as a dynamic LAG member to the selected LAG.
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified LAG.
The interface variable includes the interface type, which is
port-channel, and the LAG number, for example port-
channel 3.
You can also specify a range of LAGs with the interface
range port-channel command, for example, interface
range port-channel 3-6 configures LAGs 3, 4, 5, and 6.
description description Configure a description for the LAG or range of LAGs
port-channel min-links Set the minimum number of links that must be up in
minimum order for the port channel interface to be declared up.
exit Exit to Global Config mode.
CTRL + Z Exit to Privileged EXEC mode.
show interfaces View the configured description for the specified LAG.
description port-channel
port-channel number
show interfaces port- View LAG information for the specified LAG or for all
channel [port-channel LAGs.
number]
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified port.
The interface variable includes the interface type and
number, for example gigabitethernet 1/0/3.
You can also specify a range of ports with the interface
range command, for example, interface range
gigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12.
channel-group port- Add the port(s) to the LAG specified with the port-
channel-number mode channel-number value. Use the auto keyword to add the
{on | auto} port(s) as dynamic members, or use on to specify that the
LAG membership is static.
• port-channel-number — Number of a valid port-channel
for the current port to join.
• on — Forces the port to join a channel without LACP
(static LAG).
• active — Forces the port to join a channel with LACP
(dynamic LAG).
exit Exit to Global Config mode.
interface port-channel Enter interface configuration mode for the specified LAG.
number You can also specify a range of LAGs to configure with the
interface range port-channel command, for example,
interface range port-channel 1-3,10 configures LAGs 1, 2,
3, and 10.
Command Purpose
configure Enter global configuration mode.
lacp system-priority Set the Link Aggregation Control Protocol priority for the
value switch. the priority value range is 1–65535.
interface port-channel Enter interface configuration mode for the specified LAG.
number You can also specify a range of LAGs to configure with the
interface range port-channel command, for example,
interface range port-channel 1-3,10 configures LAGs 1, 2,
3, and 10.
lacp port-priority value Set the Link Aggregation Control Protocol priority for the
port or range of ports. The priority value range is 1–65535.
lacp timeout {long | Specify whether to wait a long or short time between
short} LACP PDU transmissions.
exit Exit to Privileged EXEC mode.
show lacp interface View LACP parameters for an Ethernet interface or a LAG.
The interface parameter includes the interface type
(gigabitethernet, tengigabitethernet, or port-channel)
and number.
NOTE: The examples in this section show the configuration of only one switch.
Because LAGs involve physical links between two switches, the LAG settings
and member ports must be configured on both switches.
NOTE: Data Center features are supported only on the PCM8024-k for
PowerConnect modular switches. The PCM6220, PCM6348, and PCM8024
switches do not support the features in this chapter.
Feature Description
PFC Provides a way to distinguish which traffic on a physical link is
paused when congestion occurs based on the priority of the traffic.
Feature Description
DCBx Allows DCB devices to exchange configuration information, using
type-length-value (TLV) information elements over LLDP, with
directly connected peers.
FIP Snooping Inspects and monitors FIP frames and applies policies based upon
the L2 header information in those frames
Feature Default
PFC (PCM8024-k only) Disabled, no priority classifications are
configured.
DCBx version Auto detect
FIP snooping Disabled globally and on all VLANs
FC map value 0x0efc00
FIP snooping port mode Host facing (not FCF facing)
When PFC is disabled, the interface defaults to the IEEE 802.3 Annex 31B
flow control setting for the interface. PFC is disabled by default.
If you enable priority-based flow control for a particular priority value on an
interface, ensure that VLAN tagging is enabled on the interface so that the
802.1p priority values are carried through the network (see "VLAN Tagging"
on page 565). Additionally, make sure that 802.1p priority values are mapped
to CoS values (see "Configuring Class-of-Service" on page 1153). If DCBX is
enabled, the manually configured PFC parameters (no-drop priorities) must
match the peers PFC parameters. If they do not match, PFC will not be
operationally enabled and the port will continue to operate in the configured
legacy flow control mode (IEEE 802.3 Annex 31B mode or none).
PFC can be configured using the web interface and the command line
interface.
NOTE: FIP snooping can be enabled, configured, and monitored only by using
the CLI.
NOTE: If DCBx is enabled and the switch is set to autoconfigure from a DCBX
peer, configuring PFC is not necessary because the DCBx protocol automatically
configures the PFC parameters.
Command Purpose
configure Enter global configuration mode.
CAUTION: All ports may be briefly shutdown when modifying either flow
control (FC) or PFC settings. PFC uses a control packet defined in
802.1Qbb and is not compatible with IEEE 802.3 Annex 31B flow
control.
Configuring DCBx
You can use the CLI to configure DCBx.
Beginning in Privileged EXEC mode, use the following commands to
configure DCBx.
Command Purpose
configure Enter global configuration mode.
lldp dcbx version {auto Optionally configure the administrative version for the
| cin | cee | ieee} DCBx protocol:
• auto—Automatically select the version based on the peer
response (default)
• cin—Force the mode to Cisco-Intel-Nuova. (DCBx 1.0)
• cee—Force the mode to CEE (DCBx 1.06)
• ieee—Force the mode to IEEE 802.1Qaz
lldp tlv-select dcbxp Enable LLDP to send specific DCBx TLVs if LLDP is
[pfc | application- enabled to transmit on the given interface. Entering the
priority] command with no parameters enables transmission of all
TLVs.
• pfc—Transmit the PFC configuration TLV
• application-priority—Transmit the application priority
TLV
NOTE: The PowerConnect M8024-k FIP Snooping Bridge feature supports the
configuration of the perimeter port role and FCF-facing port roles and is intended
for use only at the edge of the switched network.
NOTE: FIP snooping will not allow FIP or FCoE frames to be forwarded over a
port until the port is operationally enabled for PFC. VLAN tagging must be
enabled on the interface in order to carry the dot1p values through the network.
This section describes the FIP snooping commands only. For an example of
configuring FIP snooping on the switch, see "FIP Snooping Configuration
Example" on page 857.
Command Purpose
configure Enter global configuration mode.
feature fip-snooping Globally enable FIP snooping on the switch.
vlan vlan_id Enter VLAN configuration mode for a VLAN or range of
VLANs.
fip-snooping enable Enable the snooping of FIP packets on the specified VLAN
or VLAN range. FIP snooping must be enabled on both the
native VLAN on trunk ports and all VLANs configured to
carry FCoE traffic.
fip-snooping fc-map Optionally configure the FC-MAP value on a VLAN. The
fc_map_value FC map value is used to help prevent the switch from
being incorrectly configured. The range for fc_map_value
is 0x0–0xffffff.
The FC map value configured on the switch must match
the FC map value configured on the FCF for the VLAN.
ip igmp snooping Enabling flooding of the ALL-FCF_MAC and ALL-
unregistered floodall ENode-MAC addressed packets.
exit Exit to global configuration mode.
FCF Switch
Chassis
FC SAN
VM on Blade PowerConnect
Server Switch FCF Switch
with CNA
FC SAN
Command Purpose
configure Enter global configuration mode.
mac address-table static Add a static MAC source address to the MAC address table.
mac-address vlan vlan-id • mac-address — A valid MAC address in the format
interface interface xxxx.xxxx.xxxx.
• vlan-id —A valid VLAN.
• interface — A valid port or LAG, including the interface
type and number.
mac address-table Specify the number of seconds that must pass before an
aging-time {0 | 10- unused dynamically-learned MAC address is removed from
1000000} the MAC address table. A value of 0 disables the aging time
for the MAC address table.
exit Exit to Privileged EXEC mode.
show mac address-table View information about the entries in the MAC address
[static | dynamic] table. Use the keywords static or dynamic to specify the
address type to view.
For dynamic entries, you can use the clear mac address-
table command to remove entries from the table.
show mac address-table View information about the MAC addresses that have been
{vlan vlan | interface configured or learned on the switch, a specific VLAN, or an
interface [vlan vlan-id]} interface (Ethernet port or LAG/port-channel).
show mac address-table View information about the number of addresses that have
count [{vlan vlan-id been configured or learned on the switch, a specific VLAN,
|interface interface}] or an interface (Ethernet port or LAG/port-channel).
NOTE: In this context, loopback interfaces should not be confused with the
loopback IP address, usually 127.0.0.1, assigned to a host for handling self-routed
packets.
The loopback interface does not behave like a network switching port.
Specifically, there are no neighbors on a loopback interface; it is a pseudo-
device for assigning local addresses so that the other layer 3 devices can
communicate with the switch by using the loopback IP address. The loopback
interface is always up and can receive traffic from any of the existing active
interfaces. Thus, given reachability from a remote client, the address of the
loopback can be used to communicate with the switch through various
VLAN Routing
VLAN routing is required when the switch is used as a layer 3 device. VLAN
routing must be configured to allow the switch to forward IP traffic between
subnets and allow hosts in different networks to communicate.
In Figure 31-1 the PowerConnect switch is configured as an L3 device and
performs the routing functions for hosts connected to the L2 switches. For
Host A to communicate with Host B, no routing is necessary. These hosts are
in the same VLAN. However, for Host A in VLAN 10 to communicate with
Host C in VLAN 20, the PowerConnect switch must perform inter-VLAN
routing.
PowerConnect Switch
L2 Switch
L2 Switch
` ` `
VLAN 10 VLAN 20
Tunnel Interface
Tunnels can be used in networks that support both IPv6 and IPv4. The tunnel
allows non-contiguous IPv6 networks to be connected over an IPv4
infrastructure.
When you create a tunnel, it has the default values shown in Table 31-2
IP Interface Configuration
Use the IP Interface Configuration page to update IP interface data for this
switch. The IP interface configuration includes the ability to configure the
bandwidth, Destination Unreachable messages, and ICMP Redirect
messages.
To display the page, click Routing → IP → IP Interface Configuration in the
navigation panel.
Tunnel Configuration
Use the Tunnels Configuration page to create, configure, or delete a tunnel.
To display the page, click Routing → Tunnels → Configuration in the
navigation panel.
Command Purpose
configure Enter Global Configuration mode.
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN.
ip address {dhcp | none Configure the IP address.
|ip_address subnet_mask Use the dhcp keyword to enable the DHCP client and
[secondary]} obtain an IP address from a network DHCP server. Use
none to release the address obtained from the DHCP
server.
Use ip_address and subnet_mask to assign a static IP
address. If you configure a static address, you can use
the secondary keyword to specify that the address is a
secondary IP address.
ip netdirbcast Enable the forwarding of network-directed broadcasts.
encapsulation {ethernet | Configure the link-layer encapsulation type for the
snap} packet. Routed frames are always ethernet encapsulated
when a frame is routed to a VLAN.
ip proxy-arp Enable proxy ARP on the interface. Without proxy ARP,
the switch responds to an ARP request only if the target
IP address is an address configured on the interface
where the ARP request arrived. This command is not
available in interface range mode.
Command Purpose
configure Enter Global Configuration mode.
interface loopback Create the loopback interface and enter Interface
loopback-id Configuration mode for the specified loopback
interface.
ip address ip_address Configure a static IP address and subnet mask. Use the
subnet_mask [secondary] secondary keyword to specify that the address is a
secondary IP address.
CTRL + Z Exit to Privileged EXEC mode.
show ip interface loopback View interface configuration information for the
loopback-id specified loopback interface.
NOTE: For information about configuring the IPv6 interface characteristics for a
tunnel, see "Configuring IPv6 Routing" on page 1081.
Command Purpose
configure Enter Global Configuration mode.
interface tunnel tunnel-id Create the tunnel interface and enter Interface
Configuration mode for the specified tunnel.
tunnel mode ipv6ip [6to4] Specify the mode of the tunnel. If you use the 6to4
keyword, the tunnel is an automatic tunnel. If you omit
the keyword, the tunnel is a point-to-point (configured)
tunnel.
ipv6 enable Enable IPv6 on this interface using the Link Local
address.
tunnel source {ipv4addr | Specify the source transport address of the tunnel,
vlan vlan-id} either, which can be an IPv4 address or a VLAN routing
interface.
tunnel destination Specify the destination transport IPv4 address of the
ipv4addr tunnel.
CTRL + Z Exit to Privileged EXEC mode.
show interfaces tunnel View configuration information for all tunnels or for the
[tunnel-id] specified tunnel.
DHCP Overview
DHCP is generally used between clients and servers for the purpose of
assigning IP addresses, gateways, and other network settings such as DNS and
SNTP server information.
DH C PD ISC O V ER (broadcast)
DH C PO FFE R (unicast)
` DH C PR EQ U ES T (broadcast)
D HC PA CK (unicast)
5 Click Apply.
4 Click Apply.
Address Pool
Use the Address Pool page to create the pools of IP addresses and other
network information that can be assigned by the server.
To display the Address Pool page, click Routing → IP → DHCP Server →
Address Pool in the navigation panel.
4 Click Apply.
4 Click Apply.
5 Click Apply.
6 To verify that the option has been added to the address pool, open the
Address Pool Options page.
DHCP Bindings
Use the DHCP Bindings page to view information about the clients that
have leased IP addresses from the DHCP server.
To display the DHCP Bindings page, click Routing → IP → DHCP Server
→ DHCP Bindings in the navigation panel.
Command Purpose
configure Enter Global Configuration mode.
service dhcp Enable the DHCP server.
ip dhcp ping packets Specify the number, in a range from 2-10, of packets a
DHCP server sends to a pool address as part of a ping
operation.
ip dhcp conflict logging Enable conflict logging on DHCP server
ip dhcp bootp Enable the allocation of the addresses to the BootP client.
automatic
ip dhcp excluded- Specify the IP addresses that a DHCP server should not
address lowaddress assign to DHCP clients. You can specify a single IP
[highaddress] address, or you can specify a contiguous range by using
both the low-address and high-address variables.
exit Exit to Privileged EXEC mode.
show ip dhcp global Verify the global DHCP server configuration.
configuration
Command Purpose
configure Enter Global Configuration mode.
ip dhcp pool name Create a DHCP address pool and enters DHCP pool
configuration mode.
network network-ip Configure the subnet number and mask for a DHCP
[mask | prefixlength] address pool. Clients requesting an IP address can be
assigned any non-excluded IP address within this network.
lease [duration] | Specify the duration of the lease for an IP address that is
infinite}] assigned from a DHCP server to a DHCP client.
• duration— Days the lease is valid. You can optionally
specify the hours and minutes after specifying the days.
• infinite — 60 day lease
default-router address1 Specify the list of default gateway IP addresses to be
[address2....address8] assigned to the DHCP client.
dns-server address1 Specify the list of DNS server IP addresses to be assigned
[address2....address8] to the DHCP client.
domain-name domain Specify the domain name for a DHCP client.
option code {ascii string Manually configure DHCP options.
| hex string1
[string2...string8] | ip
address1
[address2...address8]}
CTRL + Z Exit to Privileged EXEC mode.
show ip dhcp pool View the settings for the specified address pool or for all
configuration {name | configured address pools.
all}
Command Purpose
configure Enter Global Configuration mode.
ip dhcp pool name Create a DHCP address pool and enters DHCP pool
configuration mode.
client-name name Specify the DHCP client name.
hardware-address mac Specify the hardware address of the client in the static
[type] pool.
• mac—MAC address of the hardware platform of the
client consisting of 6 bytes in dotted hexadecimal format.
• type — Indicates the protocol of the hardware platform.
It is 1 for Ethernet and 6 for IEEE 802.
client-identifier Specify the unique identifier for a DHCP client. The
uniqueidentifier unique-identifier is a valid notation in hexadecimal
format.
In some systems, such as Microsoft DHCP clients, the
client identifier is required instead of hardware addresses.
The unique-identifier is a concatenation of the media type
and the MAC address. For example, the Microsoft client
identifier for Ethernet address c819.2488.f177 is
01c8.1924.88f1.77 where 01 represents the Ethernet media
type.
host address [mask | Specify the IP address and (optionally) network mask for a
prefix-length] manual binding to a DHCP client.
lease [duration] | Specify the duration of the lease for an IP address that is
infinite}] assigned from a DHCP server to a DHCP client.
• duration— Days the lease is valid. You can optionally
specify the hours and minutes after specifying the days.
• infinite — 60 day lease
Command Purpose
show ip dhcp binding View the current binding information in the DHCP server
[address] database. Specify the IP address to view a specific binding.
clear ip dhcp binding Delete an automatic address binding from the DHCP
{address | *} server database. Use * to clear all bindings.
show ip dhcp conflict View the current binding conflicts in the DHCP server
[address] database. Specify the IP address to view a specific conflict.
clear ip dhcp conflict Clear an address conflict from the DHCP Server database.
{address | *} Use * to clear all conflicts.
show ip dhcp server View DHCP server statistics.
statistics
clear ip dhcp server Reset all DHCP server statistics to zero.
statistics
Service DHCP...................Enable
Number of Ping Packets.........2
Excluded Address...............192.168.2.1 to 192.168.2.20
1.2.2.2 to 1.5.5.5
192.168.5.1 to 192.168.5.20
192.168.5.100 to 192.168.5.100
Conflict Logging...............Enable
Bootp Automatic................Disable
9 View information about all configured address pools.
console#show ip dhcp pool configuration all
Pool: Engineering
Pool Type.......................... Network
Network............................ 192.168.5.0 255.255.255.0
Lease Time......................... 1 days 0 hrs 0 mins
DNS Servers........................ 192.168.5.11
Default Routers.................... 192.168.5.1
Domain Name........................ engineering.dell.com
Pool: Tyler PC
Pool Type..........................Static
Client Name........................TylerPC
Hardware Address.................. 00:1c:23:55:e9:f3
Hardware Address Type..............ethernet
Host.............................. 192.168.2.10 255.255.255.0
Lease Time........................ 1 days 0 hrs 0 mins
DNS Servers....................... 192.168.2.101
Default Routers................... 192.168.2.1
Domain Name....................... executive.dell.com
Option............................ 69 ip 192.168.1.33
IP Routing Overview
The PowerConnect M6220, M6348, M8024, and M8024-k switches are
multilayer switches that support static and dynamic routing. Table 33-1
describes some of the general routing features that you can configure on the
switch.
Feature Description
ICMP message control You can configure the type of ICMP messages that
the switch responds to as well as the rate limit and
burst size.
Default gateway The switch supports a single default gateway. A
manually configured default gateway is more
preferable than a default gateway learned from a
DHCP server.
Feature Description
ARP table The switch maintains an ARP table that maps an
IP address to a MAC address. You can create static
ARP entries in the table and manage various ARP
table settings such as the aging time of
dynamically-learned entries.
ICMP Router Discovery Hosts can use IRDP to identify operational routers
Protocol (IRDP) on the subnet. Routers periodically advertise their
IP addresses. Hosts listen for these advertisements
and discover the IP addresses of neighboring
routers.
Routing table entries You can configure the following route types in the
routing table:
• Default: The default route is the route the switch
will use to send a packet if the routing table does
not contain a longer matching prefix for the
packet's destination.
• Static: A static route is a route that you manually
add to the routing table.
• Static Reject: Packets that match a reject route
are discarded instead of forwarded. The router
may send an ICMP Destination Unreachable
message.
Route preferences The common routing table collects static, local,
and dynamic (routing protocol) routes. When
there is more than one route to the same
destination prefix, the routing table selects the
route with the best (lowest) route preference.
IP Configuration
Use the Configuration page to configure routing parameters for the switch as
opposed to an interface. The IP configuration settings allow you to enable or
disable the generation of various types of ICMP messages.
To display the page, click Routing → IP → Configuration in the navigation
panel.
3 Next to Route Type, use the drop-down box to add a Default, Static, or
Static Reject route.
The fields to configure are different for each route type.
• Default — Enter the default gateway address in the Next Hop IP
Address field.
• Static — Enter values for Network Address, Subnet Mask, Next Hop
IP Address, and Preference.
• Static Reject — Enter values for Network Address, Subnet Mask, and
Preference.
4 Click Apply.
The new route is added to the routing table.
NOTE: For a static reject route, the next hop interface value is Null0. Packets to
the network address specified in static reject routes are intentionally dropped.
To remove a configured route, select the check box in the Remove column of
the route to delete, and click Apply.
Command Purpose
configure Enter global configuration mode.
ip routing Globally enable IPv4 routing on the switch.
ip icmp echo-reply Allow the switch to generate ICMP Echo Reply messages.
ip icmp error-interval Limit the rate at which IPv4 ICMP error messages are sent.
burst-interval [burst- • burst-interval — How often the token bucket is
size] initialized (Range: 0–2147483647 milliseconds).
• burst-size — The maximum number of messages that
can be sent during a burst interval (Range: 1–200).
ip redirects Allow the switch to generate ICMP Redirect messages.
ip default-gateway ip- Configure the global default gateway for the switch. The
address gateway configured here takes precedence over a default
gateway assigned by a network DHCP server.
exit Exit to Privileged EXEC mode.
show ip brief View the global IP settings for the switch.
Command Purpose
configure Enter global configuration mode.
arp ip-address hardware- Create a static ARP entry in the ARP table.
address • ip-address — IP address of a device on a subnet attached
to an existing routing interface.
• hardware-address — A unicast MAC address for that
device.
arp timeout seconds Configure the ARP entry ageout time.
arp resptime seconds Configure the ARP request response timeout.
arp retries integer Configure the ARP count of maximum requests for
retries. The range is 1–10.
arp cachesize integer Configure the maximum number of entries in the ARP
cache.
arp dynamicrenew Allow the ARP component to automatically renew
dynamic ARP entries when they age out.
exit Exit to Privileged EXEC mode.
show arp [brief] View the user-configured (static) ARP entries. The static
entries display regardless of whether they are reachable
over an interface. Use the brief keyword to view only the
ARP table settings.
clear arp-cache [gateway] Remove all dynamic ARP entries from the ARP cache.
Include the keyword gateway to remove gateway entries as
well.
clear arp-cache Remove all dynamic ARP entries from the ARP cache that
management were learned on the management interface.
arp purge ip-address Remove the specified IP address from the ARP cache.
This command removes dynamic and gateway ARP entries
only.
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified
VLAN routing interface. The interface variable includes
the interface type (vlan) and number, for example vlan
100.
ip irdp Enable IRDP on the interface.
ip irdp address ip-address Configure the address that the interface uses to send the
router discovery advertisements.
The allowed addresses are 224.0.0.1 (all-hosts IP
multicast address) or 255.255.255.255 (limited broadcast
address)
ip irdp holdtime seconds Configure the value of the holdtime field of the router
advertisement sent from this interface.
ip irdp maxadvertinterval Configure the maximum time allowed between sending
seconds router advertisements from the interface.
ip irdp minadvertinterval Configure the minimum time allowed between sending
seconds router advertisements from the interface.
ip irdp preference integer Configure the preference of the address as a default
router address relative to other router addresses on the
same subnet.
exit Exit to Global Config mode.
exit Exit to Privileged EXEC mode.
show ip irdp [vlan vlan-id] View the router discovery information for all interfaces,
or for a specified interface.
Command Purpose
configure Enter global configuration mode.
ip route default Configure the default route.
nextHopRtr [preference ] • nextHopRtr — IP address of the next hop router.
• preference — Specifies the preference value
(administrative distance) of an individual static route.
(Range: 1-255)
ip route ip-addr Configure a static route. Use the keyword null instead of
{subnetmask | prefix the next hop router IP address to configure a static reject
length } {nextHopRtr | route.
null} [preference ] • ip-address — IP address of destination interface.
• subnet-mask — Subnet mask of destination interface.
• prefix-length — Length of prefix. Must be preceded
with a forward slash (/). (Range: 0-32 bits)
• nextHopRtr — IP address of the next hop router.
• null — Specifies that the route is a static reject route.
• preference — Specifies the preference value
(administrative distance) of an individual static route.
(Range: 1-255)
ip route distance integer Set the default distance (preference) for static routes.
Lower route preference values are preferred when
determining the best route.
exit Exit to Privileged EXEC mode.
The system limits the number of relay entries to four times the maximum
number of routing interfaces (512 relay entries). There is no limit to the
number of relay entries on an individual interface, and no limit to the number
of servers for a given {interface, UDP port} pair.
Certain configurable DHCP relay options do not apply to relay of other
protocols. You may optionally set a maximum hop count or minimum wait
time using the bootpdhcprelay maxhopcount and bootpdhcprelay
minwaittime commands.
The relay agent relays DHCP packets in both directions. It relays broadcast
packets from the client to one or more DHCP servers, and relays packets to
the client that the DHCP server unicasts back to the relay agent. For other
protocols, the relay agent only relays broadcast packets from the client to the
server. Packets from the server back to the client are assumed to be unicast
directly to the client. Because there is no relay in the return direction for
protocols other than DHCP, the relay agent retains the source IP address from
the original client packet. The relay agent uses a local IP address as the source
IP address of relayed DHCP client packets.
When a switch receives a broadcast UDP packet on a routing interface, the
relay agent verifies that the interface is configured to relay to the destination
UDP port. If so, the relay agent unicasts the packet to the configured server IP
addresses. Otherwise, the relay agent verifies that there is a global
NOTE: If the packet matches a discard relay entry on the ingress interface, the
packet is not forwarded, regardless of the global configuration.
The relay agent relays packets that meet only the following conditions:
• The destination MAC address must be the all-ones broadcast address
(FF:FF:FF:FF:FF:FF).
• The destination IP address must be the limited broadcast address
(255.255.255.255) or a directed broadcast address for the receive interface.
• The IP time-to-live (TTL) must be greater than 1.
• The protocol field in the IP header must be UDP (17).
• The destination UDP port must match a configured relay entry.
3. Select a UDP Destination port name from the menu or enter the UDP
Destination Port ID. Select the Default Set to configure for the relay entry
for the default set of protocols.
4. Enter the IP address of the server to which the packets with the given UDP
Destination Port will be relayed.
5. Click Apply.
The UDP/Helper Relay is added and the device is updated.
Command Purpose
configure Enter global configuration mode.
dhcp l2relay Globally enable L2 DHCP relay on the switch
interface interface Enter interface configuration mode for the specified port
or LAG. The interface variable includes the interface type
and number, for example gigabitethernet 1/0/3. For a
LAG, the interface type is port-channel.
You can also specify a range of ports with the interface
range command, for example, interface range
gigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12.
dhcp l2relay Enable L2 DHCP relay on the port(s) or LAG(s).
dhcp l2relay trust Configure the interface(s) to mandate Option-82 on
receiving DHCP packets.
exit Exit to Global Configuration mode.
dhcp l2relay vlan vlan- Enable the L2 DHCP Relay agent for a set of VLANs. All
range DHCP packets which arrive on interfaces in the configured
VLAN are subject to L2 Relay processing.
dhcp l2relay circuit-id Enable setting the DHCP Option 82 Circuit ID for a
vlan vlan-range VLAN. When enabled, the interface number is added as
the Circuit ID in DHCP option 82.
Command Purpose
configure Enter global configuration mode.
ip helper enable Use this command to enable the IP helper feature. It is
enabled by default.
ip helper-address server- Configure the relay of certain UDP broadcast packets
address [dest-udp-port | received on any interface. Specify the one of the protocols
dhcp | domain | isakmp defined in the command or the UDP port number.
| mobile-ip | • server-address — The IPv4 unicast or directed broadcast
nameserver | netbios- address to which relayed UDP broadcast packets are sent.
dgm | netbios-ns | ntp | The server address cannot be an IP address configured on
pim-auto-rp | rip | any interface of the local router.
tacacs | tftp | time]
• dest-udp-port — A destination UDP port number from 0
to 65535.
interface vlan vlan-id Enter interface configuration mode for the specified
VLAN routing interface.
You can also specify a range of VLAN routing interfaces
with the interface range vlan command, for example,
interface range vlan 10,20,30 configures VLAN interfaces
10, 20, and 30.
NOTE: All VLANs must be configured as VLAN routing
interfaces.
DHCP Server
192.168.40.22
DNS Server
192.168.40.43
DHCP Server
192.168.40.35 SNMP Server
192.168.23.1
VLAN 30
L3 Switch
` ` `
`
DHCP Clients
VLAN 10 VLAN 20 (No DHCP)
This example assumes that multiple VLAN routing interfaces have been
created, and configured with IP addresses.
To configure the switch:
1 Relay DHCP packets received on VLAN 10 to 192.168.40.35
console#config
console(config)#interface vlan 10
console(config-if-vlan10)#ip helper-address
192.168.40.35 dhcp
IP helper is enabled
NOTE: In this chapter references to OSPF apply to OSPFv2 and OSPFv3 unless
otherwise noted.
Max Metric
RFC 3137 introduced stub router behavior to OSPFv2. As a stub, a router can
inform other routers that it is not available to forward data packets. This can
be useful if OSPF has run out of resources (for example, memory) to compute
a complete routing table, or to avoid routing transients as OSPF learns its
neighbors and a complete set of routes at startup. Thus, OSPF can enter stub
router mode either automatically (as a result of a resource condition) or by
configuration.
When OSPF enters stub router mode, it re-originates its router LSAs and sets
the metric on each of its non-stub links to the maximum value, 0xFFFF.
Whenever OSPF originates a router LSA while in stub router mode, it sets
the metrics in this way. Stub router mode is global and applies to router LSAs
for all areas. Other routers prefer alternate paths that avoid the stub router;
however, if no alternate path is available, another router may compute a
transit route through a stub router. Because the stub router does not adjust
the metric for stub links in its router LSA, routes to destinations on these
networks are unaffected. Thus, stub router mode does not affect
management connections to the router, even if the router and management
station depend on OSPF routes to communicate with each other.
The feature supports two modes of operation. The network administrator can
put OSPF in stub router mode. OSPF remains in stub router mode until the
network administrator takes OSPF out of stub router mode. Alternatively, the
network administrator can configure OSPF to start in stub router mode for a
configurable period of time after the router boots up. On a stack, the startup
period also applies when a unit takes over as the management unit. The
clear configuration command also restarts OSPF in stub router
OSPF Configuration
Use the Configuration page to enable OSPF on a router and to configure the
related OSPF settings.
To display the page, click Routing → OSPF → Configuration in the
navigation panel.
Use the Delete Stub Area button to remove the stub area.
After you create a virtual link, additional fields display, as the Figure 35-13
shows.
OSPFv3 Configuration
Use the Configuration page to activate and configure OSPFv3 for a switch.
To display the page, click IPv6 → OSPFv3 → Configuration in the
navigation panel.
Use the Delete Stub Area button to remove the stub area.
Command Purpose
configure Enter global configuration mode.
router ospf Enter OSPF configuration mode.
router-id ip-address Set the 4-digit dotted-decimal number that uniquely
identifies the router.
auto-cost reference- Set the reference bandwidth used in the formula to
bandwidth ref_bw compute link cost for an interface:
link cost = ref_bw÷interface bandwidth
The ref_bw variable is the reference bandwidth in Mbps
(Range: 1–4294967).
capability opaque Allow OSPF to store and flood opaque LSAs. An opaque
LSA is used for flooding user defined information within
an OSPF router domain.
compatible rfc1583 (Optional) Enable compatibility with RFC 1583.
If all OSPF routers in the routing domain are capable of
operating according to RFC 2328, OSPF 1583
compatibility mode should be disabled.
Command Purpose
configure Enter global configuration mode.
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN.
ip ospf area area-id Enables OSPFv2 on the interface and sets the area ID of
[secondaries none] an interface. This command supersedes the effects of
network area command.
The area-id variable is the ID of the area (Range: IP
address or decimal from 0 –4294967295)
Use the secondaries none keyword to prevent the interface
from advertising its secondary addresses into the OSPFv2
domain.
ip ospf priority number- Set the OSPF priority for the interface. The number-value
value variable specifies the priority of an interface (Range: 0 to
255).
The default priority is 1, which is the highest router
priority. A value of 0 indicates that the router is not
eligible to become the designated router on this network.
ip ospf retransmit- Set the OSPF retransmit interval for the interface.
interval seconds The seconds variable is the number of seconds between
link-state advertisements for adjacencies belonging to this
router interface.
This value is also used when retransmitting database
descriptions and link-state request packets. Valid values
range from 0 to 3600 seconds (1 hour).
ip ospf hello-interval Set the OSPF hello interval for the interface. This
seconds parameter must be the same for all routers attached to a
network.
The seconds variable indicates the number of seconds to
wait before sending Hello packets from the interface.
(Range: 1–65535).
Command Purpose
configure Enter global configuration mode.
router ospf Enter OSPF configuration mode.
area area-id stub Create a stub area for the specified area ID.
area area-id stub no- Prevent Summary LSAs from being advertised into the
summary stub area.
Command Purpose
configure Enter global configuration mode.
router ospf Enter OSPF configuration mode.
area area-id virtual-link Create the OSPF virtual interface for the specified area-
neighbor-id id and neighbor router. The neighbor-id variable is the IP
address of the neighboring router.
area area-id virtual-link Create the OSPF virtual interface for the specified area-
router-id [authentication id and neighbor router.
[message-digest | null]] Use the optional parameters to configure authentication
[[authentication-key key] for the virtual link. If the area has not been previously
| [message-digest-key key- created, it is created by this command. If the area already
id md5 key]] exists, the virtual-link information is added or modified.
• authentication—Specifies authentication type.
• message-digest—Specifies that message-digest
authentication is used.
• null—No authentication is used. Overrides password or
message-digest authentication if configured for the
area.
• md5—Use MD5 Encryption for an OSPF Virtual Link
• key—Authentication key for the specified interface.
(Range: 8 bytes or less if the authentication type is
simple and 16 bytes or less if the type is encrypt.)
• key-id—Authentication key identifier for the
authentication type encrypt. (Range: 0-255)
area area-id virtual-link Set the OSPF retransmit interval for the virtual link
neighbor-id retransmit- interface.
interval seconds The seconds variable is the number of seconds to wait
between retransmitting LSAs if no acknowledgement is
received. (Range: 0–3600)
Command Purpose
configure Enter global configuration mode.
router ospf Enter OSPF configuration mode.
area area-id range Configure a summary prefix for routes learned in a given area.
ip-address mask • area-id — Identifies the OSPF NSSA to configure. (Range: IP
{summarylink | address or decimal from 0–4294967295)
nssaexternallink}
[advertise • ip-address — IP address.
|not-advertise] • subnet-mask — Subnet mask associated with IP address.
• summarylink — Specifies a summary link LSDB type.
• nssaexternallink — Specifies an NSSA external link LSDB
type.
• advertise — Advertisement of the area range.
• not-advertise — Suppresses advertisement of the area range.
exit Exit to Global Config mode.
exit Exit to Privileged EXEC mode.
show ip ospf range View information about the area ranges for the specified
area-id area-id.
Command Purpose
configure Enter global configuration mode.
router ospf Enter OSPF configuration mode.
Command Purpose
configure Enter global configuration mode.
router ospf Enter OSPF configuration mode.
nsf [ietf ] helper strict-lsa- Require that an OSPF helpful neighbor exit helper mode
checking whenever a topology change occurs. Use the ietf keyword
to distinguish the IETF standard implementation of
graceful restart from other implementations.
nsf [ietf ] restart-interval Configure the length of the grace period on the restarting
seconds router.
The seconds keyword is the number of seconds that the
restarting router asks its neighbors to wait before exiting
helper mode. The restarting router includes the restart
interval in its grace LSAs (range 1–1800 seconds)
nsf helper [planned-only] Allow OSPF to act as a helpful neighbor for a restarting
router. Include the planned-only keyword to indicate
that OSPF should only help a restarting router
performing a planned restart.
nsf [ietf] [planned-only] Enable a graceful restart of OSPF.
• ietf — This keyword is used to distinguish the IETF
standard implementation of graceful restart from other
implementations. Since the IETF implementation is
the only one supported, this keyword is optional.
• planned-only — This keyword indicates that OSPF
should only perform a graceful restart when the restart is
planned (i.e., when the restart is a result of the initiate
failover command).
Command Purpose
configure Enter global configuration mode.
ipv6 router ospf Enter OSPFv3 configuration mode.
router-id ip-address Set the 4-digit dotted-decimal number that uniquely
identifies the router.
auto-cost reference- Set the reference bandwidth used in the formula to
bandwidth ref_bw compute link cost for an interface:
link cost = ref_bw÷interface bandwidth
The ref_bw variable is the reference bandwidth in Mbps
(Range: 1–4294967).
default-information Control the advertisement of default routes.
originate [always] • always — Normally, OSPFv3 originates a default route
[metric metric-value] only if a default route is redistributed into OSPFv3 (and
[metric-type type-value] default-information originate is configured). When the
always option is configured, OSPFv3 originates a default
route, even if no default route is redistributed.
• metric-value — The metric (or preference) value of the
default route. (Range: 1–16777214)
• type-value — The value is either 1 or 2: External type-1
route or External type-2 route.
default-metric metric- Set a default for the metric of distributed routes. (Range:
value 1–16777214).
Command Purpose
configure Enter global configuration mode.
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN.
ipv6 ospf areaid area-id Enables OSPFv3 on the interface and sets the area ID of
an interface. This command supersedes the effects of
network area command.
The area-id variable is the ID of the area (Range: IP
address or decimal from 0 –4294967295)
ipv6 ospf priority Set the OSPFv3 priority for the interface. The number-
number-value value variable specifies the priority of an interface (Range:
0 to 255).
The default priority is 1, which is the highest router
priority. A value of 0 indicates that the router is not
eligible to become the designated router on this network.
ipv6 ospf retransmit- Set the OSPFv3 retransmit interval for the interface.
interval seconds The seconds variable is the number of seconds between
link-state advertisements for adjacencies belonging to this
router interface.
This value is also used when retransmitting database
descriptions and link-state request packets. Valid values
range from 0 to 3600 seconds (1 hour).
ipv6 ospf hello-interval Set the OSPFv3 hello interval for the interface. This
seconds parameter must be the same for all routers attached to a
network.
The seconds variable indicates the number of seconds to
wait before sending Hello packets from the interface.
(Range: 1–65535).
Command Purpose
configure Enter global configuration mode.
ipv6 router ospf Enter OSPFv3 configuration mode.
area area-id stub Create a stub area for the specified area ID.
area area-id stub no- Prevent Summary LSAs from being advertised into the
summary stub area.
area area-id default-cost Configure the metric value (default cost) for the type 3
cost summary LSA sent into the stub area. Range:
1–16777215)
Command Purpose
configure Enter global configuration mode.
ipv6 router ospf Enter OSPFv3 configuration mode.
area area-id virtual-link Create the OSPFv3 virtual interface for the specified
neighbor-id area-id and neighbor router. The neighbor-id variable is
the IP address of the neighboring router.
area area-id virtual-link Set the OSPFv3 retransmit interval for the virtual link
neighbor-id retransmit- interface.
interval seconds The seconds variable is the number of seconds to wait
between retransmitting LSAs if no acknowledgement is
received. (Range: 0–3600)
area area-id virtual-link Set the OSPFv3 hello interval for the virtual link.
neighbor-id hello-interval The seconds variable indicates the number of seconds to
seconds wait before sending Hello packets from the virtual
interface. (Range: 1–65535).
area area-id virtual-link Set the OSPFv3 dead interval for the virtual link.
neighbor-id dead-interval The seconds variable indicates the number of seconds to
seconds wait before the virtual interface is assumed to be dead.
(Range: 1–65535)
area area-id virtual-link Set the OSPFv3 Transit Delay for the interface.
neighbor-id transmit- The seconds variable is the number of seconds to
delay seconds increment the age of the LSA before sending, based on
the estimated time it takes to transmit from the
interface. (Range: 0–3600)
exit Exit to Global Config mode.
exit Exit to Privileged EXEC mode.
show ipv6 ospf virtual- View summary information about all virtual links
link brief configured on the switch.
Command Purpose
configure Enter global configuration mode.
ipv6 router ospf Enter OSPFv3 configuration mode.
area area-id range ipv6- Configure a summary prefix for routes learned in a given
prefix/prefix-length area.
{summarylink | • area-id — Identifies the OSPFv3 NSSA to configure.
nssaexternallink} (Range: IP address or decimal from 0–4294967295)
[advertise |not-advertise]
• ipv6-prefix/prefix-length — IPv6 address and prefix
length.
• summarylink — Specifies a summary link LSDB type.
• nssaexternallink — Specifies an NSSA external link
LSDB type.
• advertise — Advertisement of the area range.
• not-advertise — Suppresses advertisement of the area
range.
exit Exit to Global Config mode.
exit Exit to Privileged EXEC mode.
show ipv6 ospf range area- View information about the area ranges for the specified
id area-id.
Command Purpose
configure Enter global configuration mode.
ipv6 router ospf Enter OSPFv3 configuration mode.
redistribute {static | Configure OSPFv3 to allow redistribution of routes from
connected} [metric the specified source protocol/routers.
metric] [metric-type {1 | • static — Specifies that the source is a static route.
2}] [tag tag]
• connected — Specifies that the source is a directly
connected route.
• metric — Specifies the metric to use when
redistributing the route. (Range: 0–16777214)
• metric-type 1 — Type 1 external route.
• metric-type 2 — Type 2 external route.
• tag — Value attached to each external route, which
might be used to communicate information between
ASBRs. (Range: 0–4294967295)
exit Exit to Global Config mode.
exit Exit to Privileged EXEC mode.
show ipv6 ospf View OSPFv3 configuration and status information,
including information about redistributed routes.
Command Purpose
configure Enter global configuration mode.
ipv6 router ospf Enter OSPFv3 configuration mode.
nsf [ietf ] helper strict-lsa- Require that an OSPFv3 helpful neighbor exit helper
checking mode whenever a topology change occurs. Use the ietf
keyword to distinguish the IETF standard
implementation of graceful restart from other
implementations.
nsf [ietf ] restart-interval Configure the length of the grace period on the restarting
seconds router.
The seconds keyword is the number of seconds that the
restarting router asks its neighbors to wait before exiting
helper mode. The restarting router includes the restart
interval in its grace LSAs (range 1–1800 seconds)
nsf helper [planned-only] Allow OSPFv3 to act as a helpful neighbor for a restarting
router. Include the planned-only keyword to indicate
that OSPFv3 should only help a restarting router
performing a planned restart.
nsf [ietf] [planned-only] Enable a graceful restart of OSPFv3.
• ietf — This keyword is used to distinguish the IETF
standard implementation of graceful restart from other
implementations. Since the IETF implementation is
the only one supported, this keyword is optional.
• planned-only — This keyword indicates that OSPF
should only perform a graceful restart when the restart is
planned (i.e., when the restart is a result of the initiate
failover command).
Area 0 Backbone
Area Internal
Router
VLAN 50
192.150.2.1
VLAN 80 VLAN 90
192.150.3.1 192.150.4.1
Area 2 Area 3
console(config)#interface vlan 80
console(config-if-vlan80)#ip address 192.150.3.1
255.255.255.0
console(config-if-vlan80)#exit
console(config)#interface vlan 90
console(config-if-vlan90)#ip address 192.150.4.1
255.255.255.0
console(config-if-vlan90)#exit
console(config)#interface vlan 70
console(config-if-vlan70)#ip ospf area 0.0.0.0
console(config-if-vlan70)#ip ospf priority 128
console(config-if-vlan70)#ip ospf cost 32
console(config-if-vlan70)#exit
console(config)#interface vlan 80
console(config-if-vlan80)#ip ospf area 0.0.0.2
console(config-if-vlan80)#ip ospf priority 255
console(config-if-vlan80)#ip ospf cost 64
console(config-if-vlan80)#exit
console(config)#interface vlan 90
console(config-if-vlan90)#ip ospf area 0.0.0.2
console(config-if-vlan90)#ip ospf priority 255
console(config-if-vlan90)#ip ospf cost 64
console(config-if-vlan90)#exit
NOTE: OSPFv2 and OSPFv3 can operate concurrently on a network and on the
same interfaces (although they do not interact). This example configures both
protocols simultaneously.
Switch B is an ABR that directly connects Area 0 to Area 1. Note that in the
previous example, Switch B connected to a stub area and an NSSA. Virtual
links cannot be created across stub areas or NSSAs.
To configure Switch A:
1 Create the VLANs.
console(config)#vlan 2,15
2 Enable IPv4 and IPv6 routing on the switch.
console(config)#ip routing
console(config)#ipv6 unicast-routing
3 Set the OSPF router ID.
console(config)#router ospf
console(config-router)#router-id 1.1.1.1
console(config-router)#exit
4 Set the OSPFv3 router ID.
console(config)#ipv6 router ospf
console(config-rtr)#router-id 1.1.1.1
R3
Area 0
VLAN 103
ABR
R0
VLAN 104
R1 R2
Area 1
1 Configure R0.
terminal length 0
config
hostname ABR-R0
line console
exec-timeout 0
exit
vlan 101-103
exit
ip routing
router ospf
router-id 10.10.10.10
network 172.20.0.0 0.0.255.255 area 0
network 172.21.0.0 0.0.255.255 area 1
area 1 range 172.21.0.0 255.255.0.0 summarylink
timers spf 3 5
exit
Discussion
With no area range cost specified, the range uses auto cost:
(ABR-R0) #show ip ospf range 1
R3
VLAN 103
R0
VLAN 104
R1 R2
1 Configure R0:
terminal length 0
config
hostname R0
line console
exec-timeout 0
exit
vlan 101-103
exit
ip routing
2 Configure R1:
terminal length 0
config
hostname R1
line console
exec-timeout 0
exit
3 Configure R2:
terminal length 0
config
line console
serial timeout 0
exit
ip routing
router ospf
router-id 2.2.2.2
network 172.21.0.0 0.0.255.255 area 0
timers spf 3 5
exit
4 Configure R3:
terminal length 0
config
line console
serial timeout 0
exit
ip routing
router ospf
router-id 3.3.3.3
network 172.21.0.0 0.0.255.255 area 0
timers spf 3 5
exit
vlan 103
exit
interface vlan 103
ip address 172.21.1.1 255.255.255.0
routing
ip ospf hello-interval 1
Discussion
With flood blocking disabled on all interfaces, sending a T3 summary LSA
from R3 to R0 will cause R0 to forward the LSA on its interface to R1.
Enabling flood blocking on R0's interface to R1 will inhibit this behavior.
(R0)(config-if-vlan101)ip ospf database-filter all out
A trace on the R3-R0 link shows that the LSA is actually flooded from R1 to
R0, since R1 received the LSA via R2. Even though R1 does not receive this
LSA directly from R0, it still correctly computes the route through the R0:
(R1) #show ip route
RIP Overview
RIP is an Interior Gateway Protocol (IGP) that performs dynamic routing
within a network. PowerConnect M6220, M6348, M8024, and M8024-k
switches support two dynamic routing protocols: OSPF and Routing
Information Protocol (RIP).
Unlike OSPF, RIP is a distance-vector protocol and uses UDP broadcasts to
maintain topology information and hop counts to determine the best route to
transmit IP traffic. RIP is best suited for small, homogenous networks.
RIP Configuration
Use the Configuration page to enable and configure or disable RIP in Global
mode. To display the page, click Routing → RIP → Configuration in the
navigation panel.
NOTE: Static reject routes are not redistributed by RIP. For a static reject route,
the next hop interface value is Null0. Packets to the network address specified in
static reject routes are intentionally dropped.
NOTE: RIP is enabled by default. The Global RIP Settings are optional.
Command Purpose
configure Enter global configuration mode.
router rip Enter OSPF configuration mode.
split-horizon {none | Set the RIP split horizon mode.
simple | poison} • none — RIP does not use split horizon to avoid routing
loops.
• simple — RIP uses split horizon to avoid routing loops.
• poison — RIP uses split horizon with poison reverse
(increases routing packet update size).
auto-summary Enable the RIP auto-summarization mode.
no hostroutesaccept Prevent the switch from accepting host routes.
default-information Control the advertisement of default routes.
originate
default-metric metric- Set a default for the metric of distributed routes.
value The metric-value variable is the metric (or preference) value
of the default route. (Range: 1–15)
enable Reset the default administrative mode of RIP in the router
(active)
CTRL + Z Exit to Privileged EXEC mode.
show ip rip View various RIP settings for the switch.
Command Purpose
configure Enter global configuration mode.
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN.
ip rip Enable RIP on the interface.
ip rip send version {rip1 Configure the interface to allow RIP control packets of the
rip1c | rip2 |none} specified version(s) to be sent.
ip rip receive version Configure the interface to allow RIP control packets of the
{rip1 | rip2 | both | specified version(s) to be received.
none}
ip rip authentication set the RIP Version 2 Authentication Type and Key for the
{none | {simple key} | interface.
{encrypt key key-id} • key — Authentication key for the specified interface.
(Range: 16 bytes or less)
• encrypt — Specifies the Ethernet unit/port of the
interface to view information.
• key-id — Authentication key identifier for
authentication type encrypt. (Range: 0-255)
exit Exit to Global Configuration Mode
exit Exit to Privileged Exec mode.
show ip rip interface vlan View RIP configuration information for the specified
vlan-id routing interface.
show ip rip interface View summary information about the RIP configuration
brief on all interfaces.
Command Purpose
configure Enter global configuration mode.
router rip Enter RIP configuration mode.
distribute-list Specify the access list to filter routes received from the
accesslistname out {ospf | source protocol. The ACL must already exist on the
static | connected} switch. For information about the commands you use to
configure ACLs, see "Configuring ACLs (CLI)" on
page 543.
• accesslistname — The name used to identify an existing
ACL.
• ospf — Apply the specified access list when OSPF is the
source protocol.
• static — Apply the specified access list when packets
come through the static route.
• connected — Apply the specified access list when
packets come from a directly connected route.
redistribute {static | Configure RIP to allow redistribution of routes from the
connected} [metric specified source protocol/routers.
integer] • static — Specifies that the source is a static route.
• connected — Specifies that the source is a directly
connected route.
• metric — Specifies the metric to use when
redistributing the route. Range: 1-15.
console(config)#interface vlan 30
console(config-if-vlan30)#ip address 192.168.30.1 255.255.255.0
console(config-if-vlan30)#ip rip
console(config-if-vlan30)#ip rip receive version both
console(config-if-vlan30)#ip rip send version rip2
console(config-if-vlan30)#exit
4 Enable auto summarization of subprefixes when crossing classful
boundaries.
console(config)#router rip
console(config-router)#auto-summary
console(config-router)#exit
console(config)#exit
5 Verify the configuration
console#show ip rip
VRRP Overview
The Virtual Router Redundancy (VRRP) protocol is designed to handle
default router (L3 switch) failures by providing a scheme to dynamically elect
a backup router. VRRP can help minimize black hole periods due to the
failure of the default gateway router during which all traffic directed towards
it is lost until the failure is detected.
NOTE: It is not possible to ping the VRRP IP address from the VRRP master. Use
the show vrrp command to display the status of the VRRP router
NOTE: An exception to the priority level change is that if the VRRP group is the IP
address owner, its priority is fixed at 255 and cannot be reduced through the
tracking process.
VRRP Configuration
Use the Configuration page to enable or disable the administrative status of a
virtual router.
To display the page, click Routing → VRRP → Configuration in the
navigation panel.
2 Select the virtual router ID and VLAN routing interface that will track the
route.
3 Specify the destination network address (track route prefix) for the route
to track. Use dotted decimal format, for example 192.168.10.0.
4 Specify the prefix length for the tracked route.
5 Specify a value for the Priority Decrement to define the amount that the
router priority will be decreased when a tracked route becomes
unreachable.
6. Click Apply to update the switch.
2 Select the virtual router ID and VLAN routing interface that will track the
interface.
3 Specify the interface to track.
4 Specify a value for the Priority Decrement to define the amount that the
router priority will be decreased when a tracked interface goes down.
5. Click Apply to update the switch.
Command Purpose
configure Enter global configuration mode.
ip vrrp Enable the administrative mode of VRRP for the router
(L3 switch).
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN.
vrrp vr-id Allow the interface to create in the VRRP group specified
by the vr-id parameter, which is a number from 1–255.
vrrp vr-id description (Optional) Create a text description that identifies the
VRRP group.
vrrp vr-id preempt [delay Enable the preemption mode value for the virtual router
seconds] configured on a specified interface.
You can optionally configure a preempt delay, which is the
number of seconds the VRRP router waits before the
VRRP router sends an advertisement to claim master
ownership.
vrrp vr-id accept-mode Allow the VRRP master to accept ping packets sent to one
of the virtual router’s IP addresses.
vrrp vr-id priority Set the priority value for the virtual router configured on
priority the interface.
vrrp vr-id ip ip-address Set the virtual router IP address value for an interface.
[secondary]
Table 38-2 shows the default IPv6 interface values after a VLAN routing
interface has been created.
Global Configuration
Use the Global Configuration page to enable IPv6 forwarding on the router,
enable the forwarding of IPv6 unicast datagrams, and configure global IPv6
settings.
To display the page, click Routing → IPv6 → Global Configuration in the
navigation panel.
NOTE: For a static reject route, the next hop interface value is Null0. Packets to
the network address specified in static reject routes are intentionally dropped.
To remove a configured route, select the check box in the Delete column of
the route to remove, and click Apply.
Command Purpose
configure Enter global configuration mode.
sdm prefer dual-ipv4- Select a Switch Database Management (SDM) template
and-ipv6 default to enable support for both IPv4 and IPv6. Changing the
SDM template requires a system reload.
ipv6 unicast-routing Globally enable IPv6 routing on the switch.
ipv6 hop-limit limit Set the TTL value for the router. The valid range is 0 to
255.
ipv6 icmp error-interval Limit the rate at which IPv4 ICMP error messages are sent.
burst-interval [burst- • burst-interval — How often the token bucket is
size] initialized (Range: 0–2147483647 milliseconds).
• burst-size — The maximum number of messages that
can be sent during a burst interval (Range: 1–200).
exit Exit to Privileged EXEC mode.
Command Purpose
configure Enter Global Configuration mode.
interface {vlan | Enter Interface Configuration mode for the specified VLAN,
tunnel | loopback} tunnel, or loopback interface.
interface-id
ipv6 enable Enable IPv6 on the interface. Configuring an IPv6 address
will automatically enable IPv6 on the interface.
ipv6 address Configure the IPv6 address and network prefix length.
{autoconfig | dhcp | Setting an IPv6 address enables IPv6 on the interface. You
prefix/prefix-length can also use the ipv6 enable command to enable IPv6 on the
[eui64]} interface without setting an address.
Link-local, multicast, IPv4-compatible, and IPv4-mapped
addresses are not allowed to be configured.
Include the EUI-64 keyword to have the system add the 64-
bit interface ID to the address. You must use a network prefix
length of 64 in this case.
For VLAN interfaces, use the dhcp keyword to enable the
DHCPv6 client and obtain an IP address form a network
DHCPv6 server.
ipv6 mtu size (VLAN interfaces only) Set the IPv6 Maximum
Transmission Unit (MTU) on a routing interface. The IPv6
MTU is the size of the largest IPv6 packet that can be
transmitted on the interface without fragmentation. The
range is 1280–1500 bytes.
ipv6 traffic-filter ACL Add an access-list filter to this interface.
name
ipv6 unreachables (VLAN interfaces only) Allow the interface to send ICMPv6
Destination Unreachable messages. The no ipv6
unreachables command suppresses the ICMPv6 unreachable
messages for this interface.
exit Exit the interface configuration mode.
Command Purpose
ipv6 nd prefix Configure parameters associated with network prefixes that
prefix/prefix-length the router advertises in its Neighbor Discovery
[{valid-lifetime| advertisements.
infinite} {preferred- • ipv6-prefix—IPv6 network prefix.
lifetime| infinite}]
[no-autoconfig] [off- • prefix-length—IPv6 network prefix length.
link] • valid-lifetime—Valid lifetime of the router in seconds.
(Range: 0–4294967295 seconds.)
• infinite—Indicates lifetime value is infinite.
• preferred-lifetime—Preferred-lifetime of the router in
seconds. (Range: 0–4294967295 seconds.)
• no-autoconfig—Do not use the prefix for auto
configuration.
• off-link—Do not use the prefix for onlink determination.
ipv6 nd ra-interval Set the transmission interval between router Neighbor
maximum minimum Discovery advertisements.
• maximum — The maximum interval duration (Range:
4–1800 seconds).
• minimum — The minimum interval duration (Range: 3 –
(0.75 * maximum) seconds).
ipv6 nd ra-lifetime Set the value that is placed in the Router Lifetime field of
seconds the router Neighbor Discovery advertisements sent from the
interface.
The seconds value must be zero, or it must be an integer
between the value of the router advertisement transmission
interval and 9000 seconds. A value of zero means this router
is not to be used as the default router. (Range: 0-9000).
ipv6 nd suppress-ra Suppress router advertisement transmission on an interface.
ipv6 nd dad attempts Set the number of duplicate address detection probes
value transmitted while doing Neighbor Discovery.
The range for value is 0–600.
Command Purpose
configure Enter global configuration mode.
ipv6 route ipv6- Configure a static route.Use the keyword null instead of
prefix/prefix-length {next- the next hop router IP address to configure a static reject
hop-address | interface- route.
type interface-number • prefix/prefix-length—The IPv6 network prefix and
next-hop-address } prefix length that is the destination of the static route.
[preference] Use the ::/0 form (unspecified address and zero length
prefix) to specify a default route.
• interface-type interface-number—Must be specified
when using a link-local address as the next hop. The
interface-type can be vlan or tunnel.
• next-hop-address —The IPv6 address of the next hop
that can be used to reach the specified network. A link-
local next hop address must have a prefix length of 128.
The next hop address cannot be an unspecified address
(all zeros), a multicast address, or a loopback address. If
a link local next hop address is specified, the interface
(VLAN or tunnel), must also be specified.
• preference—Also known as Administrative Distance, a
metric the router uses to compare this route with routes
from other route sources that have the same network
prefix. (Range: 1-255). Lower values have precedence
over higher values. The default preference for static
routes is 1. Routes with a preference of 255 are
considered as “disabled” and will not be used for
forwarding. Routes with a preference metric of 254 are
used by the local router but will never be advertised to
other neighboring routers.
ipv6 route ipv6- Configure a static reject route. IPv6 packets matching
prefix/prefix-length null the reject route will be silently discarded.
[preference]
Command Purpose
show sdm prefer Show the currently active SDM template.
show sdm prefer dual- Show parameters for the SDM template.
ipv4-and-ipv6 default
show ipv6 dhcp interface View information about the DHCPv6 lease acquired by
vlan vlan-id the specified interface.
show ipv6 interface {vlan View the IP interface configuration information for the
| tunnel | loopback} specified IPv6 routing interface.
interface-id
show ipv6 brief View the global IPv6 settings for the switch.
show ipv6 route [ipv6- View the routing table.
address | ipv6- • ipv6-address—Specifies an IPv6 address for which the
prefix/prefix-length | best-matching route would be displayed.
protocol | interface-type
interface-number] [best] • protocol—Specifies the protocol that installed the
routes. Is one of the following keywords: connected,
ospf, static.
• ipv6-prefix/ prefix-length—Specifies an IPv6 network
for which the matching route would be displayed.
• interface-type interface-number—Valid IPv6 interface.
Specifies that the routes with next-hops on the selected
interface be displayed.
• best—Specifies that only the best routes are displayed.
If the connected keyword is selected for protocol, the
best option is not available because there are no best or
non-best connected routes.
show ipv6 route summary View summary information about the IPv6 routing table.
show ipv6 route View detailed information about the IPv6 route
preferences preferences.
DHCPv6 Overview
DHCP is a protocol that is generally used between clients and servers for the
purpose of assigning IP addresses, gateways, and other networking definitions
such as Domain Name System (DNS) and Network Time Protocol (NTP)
parameters. However, IPv6 natively provides IP address auto configuration
through IPv6 Neighbor Discovery Protocol (NDP) and through the use of
Router Advertisement messages. Thus, the role of DHCPv6 within the
network is different than that of DHCPv4 because DHCPv6 is not the
primary source for IP address assignment.
DHCPv6 server and client interactions are described by RFC 3315 [6]. There
are many similarities between DHCPv6 and DHCPv4 interactions and
options, but there are enough differences in the messages and option
definitions that there is no DHCPv4 to DHCPv6 migration or
interoperability.
In Figure 39-1, the PowerConnect acts as the Prefix Delegation (PD) server
and defines one or more general prefixes to allocate and assign addresses to
hosts that may be utilizing IPv6 auto-address configuration or acting as
DHCPv6 clients.
DHCPv6 clients may request multiple IPv6 prefixes. Also, DHCPv6 clients
may request specific IPv6 prefixes. If the configured DHCPv6 pool contains
the specific prefix that a DHCPv6 client requests, then that prefix will be
delegated to the client. Otherwise, the first available IPv6 prefix within the
configured pool will be delegated to the client.
4 From the DNS Server Address menu, select an existing DNS Server
Address to associate with this pool, or select Add and specify a new server
to add.
5 From the Domain Name menu, select an existing domain name to
associate with this pool, or select Add and specify a new domain name.
6 Click Apply.
Figure 39-9 shows the screen when the selected interface mode is Relay.
Command Purpose
configure Enter Global Configuration mode.
service dhcpv6 Enable the DHCPv6 server.
ipv6 dhcp relay-agent- Configure a number to represent the DHCPv6 Relay
info-opt option Agent Information Option.
The option parameter is an integer from 54–65535.
ipv6 dhcp relay-agent- Configure a number to represent the DHCPv6 remote-ID
info-remote-id-subopt sub-option
suboption The suboption parameter is an integer from 1–65535.
exit Exit to Privileged EXEC mode.
show ipv6 dhcp Verify the global DHCPv6 server configuration.
Command Purpose
configure Enter Global Configuration mode.
ipv6 dhcp pool name Create a DHCPv6 pool and enter DHCPv6 pool
configuration mode.
dns-server ipv6-address Set up to 8 IPv6 DNS server addresses to provide to a
DHCPv6 client by the DHCPv6 server.
Command Purpose
configure Enter Global Configuration mode.
ipv6 dhcp pool name Create a DHCPv6 pool and enter DHCPv6 pool
configuration mode.
prefix-delegation ipv6- Define an IPv6 prefixes within a pool for distributing to
prefix/prefix-length specific DHCPv6 Prefix delegation clients.
client-DUID [name • prefix/prefix-length—Delegated IPv6 prefix.
hostname] [valid-
lifetime {valid-lifetime | • client-DUID—DHCP Unique Identifier for the client
infinite}] [preferred- (e.g. 00:01:00:09:f8:79:4e:00:04:76:73:43:76').
lifetime {preferred- • hostname—Client hostname used for logging and
lifetime | infinite}] tracing. (Range: 0-31 characters.) The command allows
spaces in the host name.
• valid-lifetime—Valid lifetime for delegated prefix.
(Range: 0-4294967295 seconds) or use the keyword
infinite.
• preferred-lifetime—Preferred lifetime for delegated
prefix. (Range: 0-4294967295 seconds) or use the
keyword infinite.
CTRL + Z Exit to Privileged EXEC mode.
show ipv6 dhcp pool View information about the DHCPv6 pools configured on
the switch.
Command Purpose
configure Enter Global Configuration mode.
interface {tunnel Enter interface configuration mode for a tunnel or VLAN
tunnel-id | vlan vlan-id} routing interface to configure as a DHCPv6 relay agent.
ipv6 dhcp relay Configure the interface for DHCPv6 relay functionality.
{destination relay- • destination — Keyword that sets the relay server IPv6
address [interface vlan address.
vlan-id] | interface vlan
vlan-id} [remote-id • relay-address — An IPv6 address of a DHCPv6 relay
{duid-ifid | user- server.
defined-string}] • interface — Sets the relay server interface.
• vlan-id — A valid VLAN ID.
• [remote-id {duid-ifid | user-defined-string}] — The
Relay Agent Information Option “remote ID” sub-option
to be added to relayed messages. This can either be the
special keyword duid-ifid, which causes the “remote ID”
to be derived from the DHCPv6 server DUID and the
relay interface number, or it can be specified as a user-
defined string.
exit Exit to Global Configuration Mode
interface {tunnel Enter interface configuration mode for a tunnel or VLAN
tunnel-id | vlan vlan-id} routing interface to configure with DHCPv6 server
functionality.
Command Purpose
show ipv6 dhcp binding View the current binding information in the DHCP server
[address] database. Specify the IP address to view a specific binding.
show ipv6 dhcp statistics View DHCPv6 server and relay agent statistics.
clear ipv6 dhcp statistics Reset all DHCPv6 server and relay agent statistics to zero.
console(config-dhcp6s-pool)#prefix-delegation
2001:DB8:1001::/32
00:01:00:09:f8:79:4e:00:04:76:73:43:76 valid-
lifetime 600 preferred-lifetime 400
console(config-dhcp6s-pool)#exit
3 Configure the DHCPv6 server functionality on VLAN 200 and specify the
pool to use for DHCPv6 clients.
console(config)#interface vlan 200
console(config-if-vlan200)#ipv6 dhcp server my-
pool2 preference 20
DiffServ Overview
Standard IP-based networks are designed to provide “best effort” data delivery
service. Best effort service implies that the network delivers the data in a
timely fashion, although there is no guarantee that it will. During times of
congestion, packets may be delayed, sent sporadically, or dropped. For typical
Internet applications, such as email and file transfer, a slight degradation in
service is acceptable and in many cases unnoticeable. Conversely, any
degradation of service has undesirable effects on applications with strict
timing requirements, such as voice or multimedia.
DiffServ Configuration
Use the DiffServ Configuration page to display the DiffServ administrative
mode setting as well as the current and maximum number of rows in each of
the main DiffServ private MIB tables.
To display the page, click Quality of Service → Differentiated Services →
DiffServ Configuration in the navigation panel.
2 Enter a name for the class and select the protocol to use for class match
criteria.
Class Criteria
Use the DiffServ Class Criteria page to define the criteria to associate with a
DiffServ class. As packets are received, these DiffServ classes are used to
identify packets.
To display the page, click Quality of Service → Differentiated Services →
Class Criteria in the navigation panel.
The DiffServ Policy - Policing page displays the Policy Name, Class
Name, and Policing Style.
Select a value for the following fields:
• Color Mode — The type of color policing used: Color Blind or Color
Aware.
• Conform Action Selector — The action taken on packets that are
considered conforming (below the police rate). Options are Send,
Drop, Mark CoS, Mark IP DSCP, Mark IP Precedence.
• Violate Action — The action taken on packets that are considered
non-conforming (above the police rate). Options are Send, Drop,
Mark CoS, Mark IP DSCP, Mark IP Precedence.
2 Click Apply.
The policy-class is defined, and the device is updated.
To view a summary of the services configured on the switch, click Show All.
Internet
Port 1/0/5
Outbound Layer 3 Switch
1/0/3
Finance 1/0/4
Development
Marketing
Source IP:
172.16.20.0 Source IP:
255.255.255.0 172.16.40.0
Test 255.255.255.0
Source IP:
172.16.30.0
255.255.255.0
console(config-policy-map)#class marketing_dept
console(config-policy-classmap)#assign-queue 2
console(config-policy-classmap)#exit
console(config-policy-map)#class test_dept
console(config-policy-classmap)#assign-queue 3
console(config-policy-classmap)#exit
5 Set the CoS queue configuration for the (presumed) egress Gigabit
Ethernet interface 1/0/1 such that each of queues 1, 2, 3 and 4 get a
minimum guaranteed bandwidth of 25%. All queues for this interface use
weighted round robin scheduling by default. The DiffServ inbound policy
designates that these queues are to be used for the departmental traffic
through the assign-queue attribute. It is presumed that the switch will
forward this traffic to Gigabit Ethernet interface 1/0/1 based on a normal
destination address lookup for internet traffic.
console(config)#interface gigabitethernet 1/0/5
console(config-if-Gi1/0/5)#cos-queue min-bandwidth 0 25 25 25 25 0 0
console(config-if-Gi1/0/5)#exit
console(config)#exit
`
Layer 3 Switch
Operating as
Router 1
Port 1/0/2
Port 1/0/3
Internet
Layer 3 Switch
Operating as
Router 2
console(config-policy-map)#class class_voip
console(config-policy-classmap)#mark ip-dscp ef
console(config-policy-classmap)#assign-queue 6
CoS Overview
The CoS feature lets you give preferential treatment to certain types of traffic
over others. To set up this preferential treatment, you can configure the
ingress ports, the egress ports, and individual queues on the egress ports to
provide customization that suits your environment.
The level of service is determined by the egress port queue to which the
traffic is assigned. When traffic is queued for transmission, the rate at which
it is serviced depends on how the queue is configured and possibly the
amount of traffic present in other queues for that port.
Some traffic is classified for service (i.e., packet marking) before it arrives at
the switch. If you decide to use these classifications, you can map this traffic
to egress queues by setting up a CoS Mapping table.
To access the Interface Queue Drop Precedence Status page, click the Show
All link at the top of the page.
NOTE: The Auto VoIP feature is available on the PowerConnect M6348 switch. It
is not available on the M6220, M8024, and M8024-k switches.
L3 Multicast Overview
IP Multicasting enables a network host (or multiple hosts) to send an IP
datagram to multiple destinations simultaneously. The initiating host sends
each multicast datagram only once to a destination multicast group address,
and multicast routers forward the datagram only to hosts who are members of
the multicast group. Multicast enables efficient use of network bandwidth
because each multicast datagram needs to be transmitted only once on each
network link, regardless of the number of destination hosts. Multicasting
contrasts with IP unicasting, which sends a separate datagram to each
recipient host. The IP routing protocols can route multicast traffic, but the IP
multicast protocols handle the multicast traffic more efficiently with better
use of network bandwidth.
Phase-1: RP Tree
• As soon as the SPT is built from the Source router to the RP, multicast
traffic begins to flow unencapsulated from source S to the RP.
• Once this is complete, the RP Router will send a “Register Stop” message
to the first-hop router to tell it to stop sending the encapsulated data to
the RP.
• PIM-SM has the capability for last-hop routers (i.e., routers with directly
connected group members) to switch to the Shortest-Path Tree and bypass
the RP. This switchover is based upon an implementation-specific function
called SwitchToSptDesired(S,G) in the standard and generally takes a
number of seconds to switch to the SPT.
• In the above example, the last-hop router (at the bottom of the drawing)
sends an (S, G) Join message toward the source to join the SPT and bypass
the RP.
• This (S, G) Join messages travels hop-by-hop to the first-hop router (i.e.,
the router connected directly to the source), thereby creating another
branch of the SPT. This also creates (S, G) state in all the routers along
this branch of the SPT.
• Finally, special (S, G) RP-bit Prune messages are sent up the Shared Tree to
prune off this (S, G) traffic from the Shared Tree.
If this were not done, (S, G) traffic would continue flowing down the
Shared Tree resulting in duplicate (S, G) packets arriving at the receiver.
• At this point, (S, G) traffic is now flowing directly from the first -hop
router to the last-hop router and from there to the receiver.
NOTE: This will occur if the RP has received an (S, G) RP-bit Prune on all
interfaces on the Shared Tree.
What Is DVMRP?
DVMRP is an interior gateway protocol that is suitable for routing multicast
traffic within an autonomous system (AS). DVMRP should not be used
between different autonomous systems due to limitations with hop count and
scalability.
Adding a Candidate RP
To add PIM Candidate rendezvous points (RPs) for each IP multicast group:
1 Open the Candidate RP Configuration page.
2 Click Add.
The Add Candidate RP page displays.
Adding a Static RP
To add a static RP for the PIM router.
1 Open the Static RP Configuration page.
2 Click Add.
The Add Static RP page displays.
3 Click the Add Default SSM Range check box to add the default SSM
Range. The default SSM Range is 232.0.0.0/8 for IPv4 multicast and
ff3x::/32 for IPv6 multicast.
4 Enter the SSM Group IP Address.
5 Enter the SSM Group Mask (IPv4) or SSM Prefix Length (IPv6).
6 Click Apply.
The new SSM Range is added, and the device is updated.
Command Purpose
configure Enter global configuration mode.
ip multicast Enable IPv4/IPv6 multicast on the switch.
ip mroute source-address Create a static multicast route for a source range.
mask rpf-address preference • source-address — The IP address of the multicast data
source.
• mask — The IP subnet mask of the multicast data
source.
• rpf-address — The IP address of the next hop towards
the source.
• preference — The cost of the route (Range: 1–255).
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN.
ip mcast boundary Add an administrative scope multicast boundary
groupipaddr mask specified by the multicast group IP address
(groupipaddr) and group IP subnet mask (mask) for
which this multicast administrative boundary is
applicable.
The group IP address valid range is 239.0.0.0 to
239.255.255.255.
ip multicast ttl-threshold Apply a Time to Live (TTL) value to the interface. The
ttlvalue ttlvalue is the TTL threshold which is applied to the
multicast data packets forwarded through the interface.
Command Purpose
configure Enter global configuration mode.
ip multicast Enable IPv4/IPv6 multicast routing.
ipv6 mroute source- Create a static multicast route for a source range.
address/prefix-length rpf- • source-address/prefix-length — The IPv6 address of the
address [interface vlan multicast data source.
vlan-id] preference
• rpf-address — The IPv6 address of the next hop towards
the source.
• vlan-id — If the rpf-address is a link-local address then
the VLAN interface must also be specified. If the rpf-
address is a global address, then specifying the VLAN
interface is not required.
• preference — The cost of the route (Range: 1–255).
exit Exit to Privileged EXEC mode.
show ipv6 mroute View a summary or all the details of the multicast table.
{detail | summary}
show ipv6 mroute group View the multicast configuration settings such as flags,
groupipaddr {detail | timer settings, incoming and outgoing interfaces, RPF
summary} neighboring routers, and expiration times of all the entries
in the multicast mroute table containing the groupipaddr
value.
show ipv6 mroute source View the multicast configuration settings such as flags,
sourceipaddr {summary timer settings, incoming and outgoing interfaces, RPF
| groupipaddr} neighboring routers, and expiration times of all the entries
in the multicast mroute table containing the sourceipaddr
or sourceipaddr | groupipaddr pair value(s).
show ipv6 mroute static View all the static routes configured in the static mcast
[sourceipaddr ] table if it is specified or display the static route associated
with the particular sourceipaddr.
Command Purpose
configure Enter global configuration mode.
ip multicast Enable IPv4/IPv6 multicast routing.
ip igmp Enable IGMP on the switch.
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN.
ip igmp Enable IGMP on the interface.
ip igmp version version Set the version of IGMP for an interface.
The version variable can be 1, 2, or 3.
ip igmp robustness Configure the robustness that allows tuning of the
robustness interface, that is, tuning for the expected packet loss on a
subnet. If a subnet is expected to have significant loss, the
robustness variable may be increased for the interface.
The range for robustness is 1–255.
ip igmp query-interval Configure the query interval for the specified interface.
seconds The query interval determines how fast IGMP Host-
Query packets are transmitted on this interface.
The range for seconds is 0–3600 seconds.
ip igmp query-max- Configure the maximum response time interval for the
response-time seconds specified interface. It is the maximum query response
time advertised in IGMPv2 queries on this interface.
The range for seconds is 0–25 seconds.
ip igmp startup-query- Set the interval between general queries sent at startup on
interval seconds the interface.
The range for seconds is 0–300 seconds.
NOTE: Configure only the upstream interface as the IGMP proxy. IGMP should
be enabled on all downstream interfaces. IP routing and IP multicast must be
enabled on the switch for the IGMP proxy feature to operate.
Command Purpose
configure Enter global configuration mode.
interface vlan vlan-id Enter Interface Configuration mode for the
specified VLAN.
ip igmp-proxy Configure the interface as an IGMP proxy
interface.
ip igmp-proxy reset-status (Optional) Reset the host interface status
parameters of the IGMP Proxy.
ip igmp-proxy unsolicit-rprt- Configure the unsolicited report interval for the
interval seconds IGMP proxy interface.
The range for seconds is 0–260 seconds.
CTRL + Z Exit to Privileged EXEC mode.
show ip igmp-proxy View a summary of the host interface status
parameters.
show ip igmp-proxy interface View a detailed list of the host interface status
parameters. This command displays information
only when IGMP Proxy is operational.
show ip igmp-proxy groups View a table of information about multicast
groups that IGMP Proxy reported. This
command displays information only when IGMP
Proxy is operational.
Command Purpose
configure Enter global configuration mode.
ip multicast Enable IPv4/IPv6 multicast routing.
ipv6 mld router Enable MLD on the switch.
interface vlan vlan-id Enter Interface Configuration mode for the
specified VLAN.
ipv6 mld router Enable MLD on the interface.
ipv6 mld version version Set the version of MLD for an interface.
The version variable can be 1 or 2.
ipv6 mld query-interval seconds Configure the query interval for the specified
interface. The query interval determines how fast
MLD Host-Query packets are transmitted on this
interface.
The range for seconds is 0–3600 seconds.
ipv6 mld query-max-response- Configure the maximum response time interval
time seconds for the specified interface. It is the maximum
query response time advertised in MLD queries
on this interface.
The range for seconds is 0–25 seconds.
ipv6 mld last-member-query- Set the last member query interval for the MLD
interval tenthsofseconds interface, which is the value of the maximum
response time parameter in the group-specific
queries sent out of this interface.
The range is 0–65535 milliseconds.
ipv6 mld last-member-query- Set the number of listener-specific queries sent
count count before the router assumes that there are no local
members on the interface.
The range for count is 1–20.
CTRL + Z Exit to Privileged EXEC mode.
NOTE: Configure only the upstream interface as the MLD proxy. MLD should be
enabled on all downstream interfaces. IPv6 routing must be enabled on the
switch for the MLD proxy feature to operate.
Command Purpose
configure Enter global configuration mode.
interface vlan vlan-id Enter Interface Configuration mode for the
specified VLAN.
ipv6 mld-proxy Configure the interface as an MLD proxy
interface.
ipv6 mld-proxy reset-status (Optional) Reset the host interface status
parameters of the MLD Proxy.
ipv6 igmp-proxy unsolicit-rprt- Configure the unsolicited report interval for the
interval seconds MLD proxy interface.
The range for seconds is 0–260 seconds.
CTRL + Z Exit to Privileged EXEC mode.
Command Purpose
configure Enter global configuration mode.
ip routing Enable ip routing. Routing is required for PIM to
calculate where to prune the multicast trees.
ip pim dense Enable PIM-DM on the switch.
ip igmp Enable IGMP. IGMP is required for PIM to operate
properly.
ip multicast Enable IPv4/IPv6 multicast routing.
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN.
ip pim Enable PIM-DM on the interface.
ip igmp Enable IGMP on the interface. IGMP is required for
proper operation of PIMDM
ip pim hello-interval seconds Specify the number of seconds (range: 0–65535) to
wait between sending PIM hello messages on the
interface.
exit Exit to Privileged EXEC mode.
show ip pim View system-wide PIM information.
Command Purpose
configure Enter global configuration mode.
ip routing Enable IP routing. Routing is required for PIM
operation.
ipv6 unicast-routing Enable IPv6 routing. IPv6 routing is required for
the operation of PIM.
ipv6 pim dense Enable PIM-DM on the switch.
ip multicast Enable IPv6/IPv6 multicast routing.
ip igmp Enable IGMP. IGMP is required for PIM to
operate properly.
interface vlan vlan-id Enter Interface Configuration mode for the
specified VLAN.
ipv6 pim Enable PIM on the interface.
ipv6 enable Enable IPv6 on the VLAN.
ipv6 mld router Enable MLD on the VLAN. MLD is required for
PIM.
ipv6 pim hello-interval seconds Specify the number of seconds (range: 0–65535)
to wait between sending PIM hello messages on
the interface.
exit Exit to Privileged EXEC mode.
show ipv6 pim View system-wide PIM information.
Command Purpose
configure Enter global configuration mode.
ip routing Enable ip routing. Routing is required for PIM
operation.
ip pim sparse Enable PIM-SM as the multicast routing protocol on
the switch.
ip igmp Enable IGMP.
ip multicast Enable IPv4/IPv6 multicast routing.
ip pim bsr-candidate vlan Configure the switch to announce its candidacy as a
vlan-id hash-mask-length bootstrap router (BSR).
[priority] [interval interval] • vlan-id — A valid VLAN ID.
• hash-mask-length — The length of a mask that is to
be ANDed with the group address before the hash
function is called. All groups with the same seed
hash correspond to the same RP. For example, if this
value is 24, only the first 24 bits of the group
addresses matter. This allows you to get one RP for
multiple groups. (Range 0–32 bits).
• priority — The priority of the candidate BSR. The
BSR with the higher priority is preferred. If the
priority values are the same, the router with the
higher IP address is the BSR. (Range 0–255).
• interval — (Optional) Indicates the BSR candidate
advertisement interval. The range is from 1 to 16383
seconds. The default value is 60 seconds.
Command Purpose
configure Enter global configuration mode.
ip routing Enable IP routing. Routing is required for PIM
operation.
ipv6 unicast-routing Enable IPv6 routing. IPv6 routing is required for IPv6
PIM.
ipv6 pim sparse Enable PIM-SM as the multicast routing protocol on
the switch.
ip mld router Enable MLD. MLD is required for the proper
operation of IPv6 PIM.
ip multicast Enable IPv4/IPv6 multicast.
Command Purpose
configure Enter global configuration mode.
ip dvmrp Enable DVMRP on the switch.
ip multicast Enable IP multicast.
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN routing interface.
ip dvmrp Enable DVMRP on the interface.
ip dvmrp metric metric Configure the metric (range: 1–31) for an interface. This
value is used in the DVMRP messages as the cost to reach
this network.
exit Exit to Privileged EXEC mode.
show ip dvmrp interface View the multicast information for the specified interface.
vlan vlan-id]
show ip dvmrp neighbor View neighbor information for DVMRP.
show ip dvmrp nexthop View the next hop information on outgoing interfaces for
routing multicast datagrams.
show ip dvmrp prune View the table that lists the router’s upstream prune
information
show ip dvmrp route View the multicast routing information for DVMRP.
NOTE: PIM does not require OSPF specifically; static routing or RIP could also
be configured for unicast routing.
Video Server
L3 Switch A
(PIM RP)
Port 23 Port 24
L3 Switch B
L3 Switch C
IGMP
Join
IGMP
Join
`
`
`
VLAN 20
VLAN 10 ` Members
Members
console(config)#interface gi1/0/24
console(config-if-Gi1/0/24)#switchport mode trunk
console(config-if-Gi1/0/24)#switchport trunk allowed vlan remove 20
console(config-if-Gi1/0/24)#exit
3 Enable routing on the switch and configure the OSPF router ID.
console(config)#ip routing
console(config)#router ospf
console(config-router)#router-id 3.3.1.1
console(config-router)#exit
4 Configure VLAN 10 as a VLAN routing interface and specify the OSPF
area. When you assign an IP address to the VLAN, routing is automatically
enabled.
console(config)#interface vlan 10
console(config-if-vlan10)#ip address 192.168.10.4 255.255.255.0
console(config-if-vlan10)#ip ospf area 0
5 Enable IGMPv2 and PIM-SM on the VLAN routing interface.
console(config-if-vlan10)#ip igmp
console(config-if-vlan10)#ip igmp version 2
console(config-if-vlan10)#ip pim
console(config-if-vlan10)#exit
6 Configure VLAN 20 as a VLAN routing interface and specify the OSPF
area.
console(config)#interface vlan 20
console(config-if-vlan20)#ip address 192.168.20.4 255.255.255.0
console(config-if-vlan20)#ip ospf area 0
7 Enable IGMPv2 and PIM-SM on the VLAN routing interface.
console(config-if-vlan20)#ip igmp
console(config-if-vlan10)#ip igmp version 2
console(config-if-vlan20)#ip pim
console(config)#interface vlan 20
console(config-if-vlan20)#ip address 192.168.20.1 255.255.255.0
console(config-if-vlan20)#ip dvmrp
console(config-if-vlan20)#ip igmp
console(config-if-vlan20)#exit
Index 1275
CLI configuration, 366 BOOTP/DHCP relay agent, 78
defaults, 364 BPDU
defined, 357 filtering, 75, 636
DHCP, 367 flooding, 636
configuration file, 360 guard, 75
image, 359
protection, 638
IP address, obtaining, 358
example, 367 bridge multicast address groups,
files, managing, 362 configuring, 718
stopping, 362 bridge multicast group
using DHCP, 357 table, 717
web-based configuration, 365 bridge table, 861
auto image download broadcast storm control. See
DHCP, 367 storm control.
auto install, 57
auto install. See auto
configuration. C
auto negotiation, 68 cable test, 207, 217
auto save feature, 362 captive portal, 63
CLI configuration, 453
auto VoIP
client management, 458
CLI configuration, 1176
defaults, 1172 configuring, 460
customizing pages, 429
understanding, 1171
defaults, 430
web-based configuration, 1173
defined, 425
auto-provisioning, iSCSI, 413 dependencies, 426
Auto-VoIP design considerations, 427
and ACLs, 1172 example, 459
localization, 429
understanding, 425, 428
B user logout mode, 429
users, RADIUS server, 441
back pressure, 67
web-based configuration, 432
banner, CLI, 290
cards
1276 Index
supported, 281 Configuring, 883
CDP, interoperability through connectivity fault management.
ISDP, 58 See IEEE 802.1ag.
certificates, 336 console port
CFM, 761 connecting to, 107
Index 1277
SDM template, 248 example, 953
data center bridging layer 2, 932
exchange, 70 layer 3, 931
understanding, 931
Data Center Bridging Exchange
VLAN, 933
protocol, 846
web-based configuration, 938
date, setting, 288
DHCP server, 56
daylight saving time, 244 address pool configuration, 902
DCBX CLI configuration, 898
and iSCSI, 414 defaults, 885
examples, 902
DCBx, 846
leases, 137
default gateway, options, 884
configuring, 125, 131 web-based configuration, 886
default VLAN, 138
DHCP snooping, 65, 885
DHCP client, 136 bindings database, 783
IP address configuration, 129
defaults, 787
denial of service, 62, 522 example, 815
device discovery protocols, 660 logging, 784
purpose, 787
device view, 106
understanding, 782
DHCP VLANs, 784
understanding, 883
DHCPv6
DHCP auto configuration client, 1090
dependencies, 363 defined, 80
enabling, 367 examples, 1121
monitoring, 362 pool, 1106
process, 357 prefix delegation, 1106
DHCP client, 885 relay agent, configuring, 1123
default VLAN, 136 relay agent, understanding, 1106
OOB port, 136 stateless server
configuring, 1121
DHCP relay, 71, 885
stateless server,
CLI configuration, 949 understanding, 1106
defaults, 937
understanding, 1105
1278 Index
dhcpv6, 1105 double-VLAN tagging, 566
DHCPv6 pool downloading files, 342
stateless server support, 1117 DSCP value and iSCSI, 411
DHCPv6 relay dual images, 56
CLI configuration, 1117
dual IPv4 and IPv6 template, 248
defaults, 1107
web-based configuration, 1108 Duplex mode, 88
DHCPv6 server DVMRP, 84
CLI configuration, 1117 defaults, 1195
prefix delegation, 1122 example, 1265
web-based configuration, 1108 understanding, 1193
web-based configuration, 1236
DHCPv6 server relay
when to use, 1194
defaults, 1107
dynamic ARP inspection, 65
DiffServ
and 802.1X, 489 dynamic LAGs, 834
and RADIUS, 489 dynamic VLAN creation, 513
and switch role, 1126
CLI configuration, 1140
defaults, 1127
E
elements, 1126
example, 1147 EAP statistics, 382
understanding, 1125 email alert
VoIP, 1150 statistics, 230
web-based configuration, 1128
email alerting, 239
diffServ, 81 log messages, 236
discovery, device, 659 enable authentication, 184
document conventions, 50 enhanced transmission
domain name server, 132 selection, 859
Index 1279
exec authorization, 185 filter, DiffServ, 489
expansion slots, 250 FIP snooping, 854
enabling and disabling, 854
firmware
F managing, 337
failover, 60 updating the stack, 152
upgrade example, 351
failover, stacking, 154
firmware synchronization,
false matches, ACL, 528
stacking, 152
FC map value, 855
flow control
FCoE configuring, 698
configuring CoS queues for, 1169 default, 690, 838
frames, forwarding, 854 understanding, 688
FCoE Initialization flow-based mirroring, 1139
Protocol, 854
forwarding database, 861
FCoE initialization protocol and port security, 785
snooping, 70
front panel features, 87
FCoE, FC map value, 855
file management
CLI, 347 G
considerations, 337
GARP, 710
copying, 346
purpose, 335 GARP and GVRP, 72
supported protocols, 337 GMRP, 710
web-based, 340
guest VLAN, 486
file system, 340 VLAN
files guest, 512
and stacking, 339 GVRP, 566
downloading to the switch, 337 statistics, 381
types, 333
uploading from the switch, 337
filter assignments,
authentication server, 514
1280 Index
H understanding, 761
head of line blocking IEEE 802.1d, 74
prevention, 66 IEEE 802.1Q, 72
health, system, 215 IEEE 802.1Qaz, 847
help, accessing web-based, 111 IEEE 802.1X, 63
host name, 243 and DiffServ, 489
authentication, 63
host name mapping, 124
configuring, 504
defined, 482
monitor mode, 64, 487, 501
I port authentication, 499
IAS port states, 483
database, 497 RADIUS-assigned VLANs, 502
understanding, 489 reauthenticating ports, 492
users, 504 VLAN assignment, 485
icons, web-based interface, 104 IEEE 802.1x
identification authentication, 184
asset tag, 243 IEEE 802.3x. See flow control.
system contact, 243
IGMP, 84
system location, 243 defaults, 1195
system name, 243
understanding, 1181
IDSP web-based configuration, 1205
defaults, 661
IGMP proxy, 84, 1181
IEEE 802.1ag IGMP snooping, 82
administrator, 765
defaults, 714
carrier network, 762
querier, 83
configuration (CLI), 775
querier, defined, 706
configuration (web), 767
understanding, 705
defaults, 766
defining domains and ports, 765 image
example, 778 activating, 347
MEPs and MIPs, 763 auto configuration, 359
troubleshooting tasks, 766 considerations, 337
defined, 333
Index 1281
downloading, 347 CLI configuration, 923
management, CLI, 347 defaults, 909
management, web-based, 340 example, 928
purpose, 335 understanding, 907
in-band management, 125 web-based configuration, 911
IP ACL IPv6
configuration, 530 compared to IPv4, 1082
defined, 525 DHCP client, 1090
example, 551 DHCPv6, 80
OSPFv3, 80
IP address
routes, 80
configuring, 125
static reject and discard
default, 127
routes, 1102
default VLAN, 129, 138
tunnel, 79
OOB port, 138
IPv6 ACL configuration, 537
IP helper, 78, 933
IPv6 interface
IP multicast traffic
configuring, 1082
layer 2, 704
layer 3, 1178 IPv6 management, 56
1282 Index
CLI configuration, 1095 J
defaults, 1083
jumbo frames, 67
features, 79
understanding, 1081
web-based configuration, 1085
L
IRDP, configuring, 925
LACP, 75
iSCSI
adding a LAG port, 828
ACL usage, 411 CLI configuration, 833
and Compellent storage
web-based configuration, 825
arrays, 414
and CoS, 410 LAG
and DCBX, 414 and port aggregator, 247
and Dell EqualLogic arrays, 413 and STP, 822
assigning flows, 410 CLI configuration, 830
CLI configuration, 421 defaults, 823
defaults, 416 examples, 834
examples, 423 guidelines, configuration, 823
flow detection, 410 interaction with other
information tracking, 411 features, 822
servers and a disk array, 423 LACP, 75
understanding, 409 purpose, 820
using, 410 static and dynamic, 820
web-based configuration, 417 statistics, 396
threshold, minimum links, 830
ISDP
understanding, 819
and CDP, 58
web-based configuration, 824
CLI configuration, 678
configuring, 679 LAG hashing, 821
enabling, 679 languages, captive portal, 429
example, 683 LED
understanding, 659 100/1000/10000Base-T port, 93
web-based configuration, 663 SFP port, 93
system, 96
link aggregation group. See LAG.
link dependencies
Index 1283
CLI configuration, 477 file, 222
creating, 473 log message format, 210
example, 480 operation logs, 209
scenarios, 465 severity levels, 209
understanding, 464 system startup logs, 209
web configuration, 473 trap log, 318
link local protocol filtering, see web-based configuration, 213
LLPF loopback, 79
LLDP loopback interface
CLI configuration, 678 configuring, 881
defaults, 661 purpose, 871
example, 684 understanding, 868
understanding, 659
LSA, OSPF, 957
web-based configuration, 663
LLDP-MED
and voice VLANs, 570 M
configuring, 682
M6348 and stacking, 149
understanding, 660
viewing information, 683 MAC ACL
example, 553
LLPF
defaults, 690, 838 understanding, 524
example, 701 MAC address table
understanding, 689 and port security, 785
contents, 862
localization, captive portal, 429
defaults, 862
log messages, 55 defined, 861
log server, remote, 223 dynamic, 865
logging managing, CLI, 866
ACL, 526 populating, 861
CLI configuration, 231 stacking, 862
considerations, 211 web-based management, 863
defaults, 211 MAC multicast support, 82
destination for log messages, 208 MAC port locking, 519
example, 238
1284 Index
MAC-based 802.1X understanding, 707
authentication VLAN configuration, 751
understanding, 484
mode
MAC-based VLAN, 564 interface configuration, 466
mail server simple, 245
adding, 226 module, CX-4, 250
configuring, 235
monitor mode, IEEE
email alert, 226 802.1X, 487
management monitoring system
access control list, 556 information, 207
access control using
MSTP
RADIUS, 196
example, 657
access control using
TACACS+, 201 operation in the network, 631
support, 74
management access list, understanding, 629
example, 558
MTU, configuring, 477
management, in-band and
out-of-band, 125 MTU, management
interface, 127
MD5, 250
Multicast
MDI/MDIX, auto, 67
VLAN registration, 83
MEP, configuring, 776
multicast
MIB, SNMP, 297 DVMRP, 84
Microsoft Network Load IGMP, 84
Balancing, 1194 IGMP proxy, 84
mirror, ACL, 525 IGMP snooping, 82
IPv4, 1197
mirroring, flow-based, 1139 layer 2, 82
MLD, 85 configuring (CLI), 748
defaults, 1195 configuring (web), 716
understanding, 1182 defaults, 714
web-based configuration, 1214 understanding, 703
when to use, 709
MLD snooping, 83 layer 3, 84
defaults, 714, 787 CLI configuration, 1243
Index 1285
defaults, 1195 nonstop forwarding, see NSF
examples, 1261 NSF
understanding, 1177
and DHCP snooping, 176
when to use, 1180
and routed access, 179
MAC layer, 82
and the storage access
MLD snooping, 83
network, 177
protocols
and VoIP, 175
roles, 1179-1180
in the data center, 174
VLAN Routing with IGMP and
network design
PIM-SM, 1261
considerations, 156
multicast bridging, 704, 748 understanding, 153
multicast protocols, numbering, ports, 114
supported, 1179
multicast routing table, 1180
multicast snooping, 756 O
multicast VLAN OAM, 761
registration, 708 OOB port, 92, 128
MVR DHCP client, 136
adding an interface, 740 OpenManage Switch
Administrator, about, 101
operational mode, 245
N
optical transceiver
navigation panel, simple diagnostics, 218
mode, 260
OSPF, 77
netinfo, 123 areas, 956
network information border router, 1021
CLI configuration, 136 CLI configuration, 999
default, 127 defaults, 964
defined, 123 difference from OSPFv3, 957
example, 140 examples, 1021
purpose, 124 flood blocking, 962, 1038
web-based configuration, 128 LSA pacing, 961
network pool, DHCP, 889 NSSA, 1024
1286 Index
static area range cost, 960, 1033 SSM range, 1232
stub area, 1024 understanding, 1183
stub routers, 958 plug-in modules
topology, 956 configuring, 250
trap flags, 316
understanding, 956 port
access control, 494
web-based configuration, 966
characteristics, 463
OSPFv3, 80 configuration examples, 479
CLI configuration, 1011 configuring multiple, 471
difference from OSPF, 957 defaults, 469
global settings, 1011 defined, 463
interface settings, 1013 device view features, 106
NSSA, 1024 example, 479
stub area, 1024 locking, 519
trap flags, 317 OOB, 92
web-based configuration, 982 protected, 66, 694, 699
out of band port, IP address, 138 statistics, 395
out-of-band management, 125 traffic control, 687, 837
port aggregator, 55, 247
default configuration, 251
P LAG dependency, 248
Index 1287
port security R
configuring, 521
RADIUS, 61
MAC-based, 64
and DiffServ, 489
understanding, 518
authentication, 190
port-based traffic control authorization, 195
CLI configuration, 698, 846 for management access
web-based configuration, 691 control, 196
port-based VLAN, 564 supported attributes, 198
understanding, 196
port-MAC locking, 64
see port security RAM log, 221
1288 Index
router, OSPF, 957 S
routes save, system settings, 339
IPv4, 921
SDM template
IPv6, 1094
configuration guidelines, 249
selecting, 957
managing, 284
Routing understanding, 248
table, 78
SDM templates, 57
routing
security
defaults (IPv4), 909
port, defined, 518
defaults (IPv6), 1083
port-based
example, 928
CLI configuration, 499
IPv4, CLI configuration, 923 defaults, 490, 518
IPv4, web-based examples, 504
configuration, 911 web-based
IPv6, CLI configuration, 1095 configuration, 491
IPv6, web-based
sFlow, 58
configuration, 1085
CLI management, 399
understanding, 907
defaults, 374
routing interfaces example, 405
CLI configuration, 879 understanding, 369
defaults, 872 web-based management, 375
understanding, 867
SFP port LEDs, 93, 95, 97
using, 870
web-based configuration, 873 SFTP, managing files, 350
routing table simple mode, 54, 245
best routes, 918 slot number, 115
configuring, 926
slots, 250
IPv6, 1099, 1101
SNMP
RSTP
CLI configuration, 319
understanding, 629
defaults, 299
running-config, saving, 339 examples, 328
MIB, 297
purpose, 299
traps, 298
Index 1289
understanding, 297 failover, 60
uploading files, 339 failover, example, 170
web-based configuration, 301 failover, initiating, 154
SNMPv1 example, 328 features, 59
file management, 339
SNMPv2 example, 328 firmware synchronization, 152
SNMPv3 firmware update, 152
engine ID, 319 MAC address table, 862
example, 329 MAC addresses, 156
snooping,FIP, 854 NSF usage scenario, 169
preconfiguration, 172
SNTP
purpose, 157
authentication, 286
removing a switch, 152
authentication key, 272
standby, 153
example, 293
switch compatibility, 149
server, 286
web-based configuration, 158
server configuration, 275
understanding, 249 static reject route, 908
1290 Index
loop guard, 637 tagging, VLAN, 565
MSTP, 74 telnet
optional features, 636 configuration options, 62
port fast, 636 connecting to the switch, 108
port settings, 74
root guard, 637 TFTP, image download, 347
RSTP, 74 time domain reflectometry, 217
understanding, 630 time management, 55
web-based configuration, 640
time range, 549
subnet mask, configuring, 125
time zone, 279
subnet-based VLAN, 564
time, setting the system, 295
summer time, 244
time-based ACLs, 526, 555
switchport modes, VLAN, 564
traffic class queue, 410
switchport statistics, web
traffic control
view, 385
port based, 687, 837
system health, monitoring, 213
traffic inspection, 781
system information
CLI configuration, 282 traffic monitoring, 369
default, 251 traffic snooping, 781
defined, 243 traps
example, 290 OSPF, 316
purpose, 244
trunk port
web-based configuration, 254
and 802.1X authentication, 512,
system time, 249 514
trunking, 600
tunnel, 79
T
tunnel interfaces, 869
TACACS+, 61
authentication, 188
authorization, 191-192
management access control, 201 U
supported attributes, 202 UDP relay, 78, 933
understanding, 201
Index 1291
unit number, 115 switchport modes, 564
upgrade, stack firmware, 59 trunk port, 600
understanding, 561
uploading files, 344
voice, 72, 569
user security model, SNMP, 298 voice traffic, 569
users voice, example, 625
authenticated, 493 voice, understanding, 568
captive portal, 438 web-based configuration, 579
IAS database, 489 VLAN membership,
USM, 298 defining, 579
VLAN priority tag and
iSCSI, 411
V VLAN routing, 867, 870
virtual link, OSPF, 1028 VLAN tagging, 565
VLAN, 822 VLANs
authenticated and dynamically created, 513
unauthenticated, 485 RADIUS-assigned, 513
CLI configuration, 599
voice traffic, identifying, 569
defaults, 577
double, 73 voice VLAN, 569
double-VLAN tagging, 566 and LLDP-MED, 570
dynamic, 486 example, 625
example, 616, 621 understanding, 568
guest, 73, 486, 513 VoIP, 81
IP subnet-based, 72 VoIP and DiffServ, 1150
MAC-based, 72, 564
VoIP, auto, 1171
port-based, 72, 564
private, 570, 626 VRRP, 79
protocol-based, 72, 564 accept mode, 1059
RADIUS-assigned, 513 CLI configuration, 1070
routing, 77 defaults, 1061
routing interfaces, 867, 879 example, 1072
static, 564 interface tracking, 1059
support, 71 load sharing example, 1072
1292 Index
preemption, 1058
route and interface tracking
example, 1076
route tracking, 1059
router priority, 1058
understanding, 1057
web-based configuration, 1062
W
web-based configuration, 102
web-based interface,
understanding, 103
writing to memory, 339
Index 1293
1294 Index