8024F InstallGuide Ucg
8024F InstallGuide Ucg
____________
Information in this publication is subject to change without notice.
© 2012 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc.
is strictly forbidden.
Trademarks used in this text: Dell™, the DELL logo, EqualLogic™, PowerConnect™, and
OpenManage™ are trademarks of Dell Inc. Microsoft®, Windows®, Windows Server®, MS-DOS®,
and Windows Vista® are either trademarks or registered trademarks of Microsoft Corporation in the
United States and/or other countries. sFlow® is a registered trademark of InMon Corporation. Cisco®
is a registered trademark of Cisco Systems. Mozilla® and Firefox® are registered trademarks of the
Mozilla Foundation.
Other trademarks and trade names may be used in this publication to refer to either the entities claiming
the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and
trade names other than its own.
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 49
About This Document . . . . . . . . . . . . . . . . . . 49
Audience . . . . . . . . . . . . . . . . . . . . . . . . . 50
Document Conventions . . . . . . . . . . . . . . . . . 50
Additional Documentation . . . . . . . . . . . . . . . . 51
2 Switch Features . . . . . . . . . . . . . . . . . . . 53
System Management Features . . . . . . . . . . . . . 54
Multiple Management Options . . . . . . . . . . . 54
System Time Management . . . . . . . . . . . . . 54
Log Messages . . . . . . . . . . . . . . . . . . . 54
Integrated DHCP Server . . . . . . . . . . . . . . 55
Management of Basic Network Information . . . . 55
IPv6 Management Features . . . . . . . . . . . . 55
Dual Software Images . . . . . . . . . . . . . . . 55
File Management . . . . . . . . . . . . . . . . . . 56
Switch Database Management Templates . . . . . 56
Automatic Installation of Firmware and
Configuration . . . . . . . . . . . . . . . . . . . . 56
sFlow . . . . . . . . . . . . . . . . . . . . . . . . 57
SNMP Alarms and Trap Logs . . . . . . . . . . . . 57
CDP Interoperability through ISDP . . . . . . . . . 57
Remote Monitoring (RMON) . . . . . . . . . . . . 57
Stacking Features . . . . . . . . . . . . . . . . . . . . 58
High Port Count . . . . . . . . . . . . . . . . . . . 58
Contents 3
Single IP Management . . . . . . . . . . . . . . . 58
Automatic Firmware Update for New Stack M
embers . . . . . . . . . . . . . . . . . . . . . . . 58
Master Failover with Transparent Transition . . . . 59
Nonstop Forwarding on the Stack . . . . . . . . . 59
Hot Add/Delete and Firmware
Synchronization . . . . . . . . . . . . . . . . . . . 59
Security Features . . . . . . . . . . . . . . . . . . . . 59
Configurable Access and Authentication
Profiles . . . . . . . . . . . . . . . . . . . . . . . 59
Password-Protected Management Access . . . . 60
Strong Password Enforcement . . . . . . . . . . . 60
TACACS+ Client . . . . . . . . . . . . . . . . . . . 60
RADIUS Support . . . . . . . . . . . . . . . . . . 60
SSH/SSL . . . . . . . . . . . . . . . . . . . . . . . 61
Inbound Telnet Control . . . . . . . . . . . . . . . 61
Denial of Service . . . . . . . . . . . . . . . . . . 61
Port Protection . . . . . . . . . . . . . . . . . . . 61
Captive Portal . . . . . . . . . . . . . . . . . . . . 62
Dot1x Authentication (IEEE 802.1X) . . . . . . . . . 62
MAC-Based 802.1X Authentication . . . . . . . . . 62
Dot1x Monitor Mode . . . . . . . . . . . . . . . . 63
MAC-Based Port Security . . . . . . . . . . . . . 63
Access Control Lists (ACL) . . . . . . . . . . . . . 63
Time-Based ACLs . . . . . . . . . . . . . . . . . . 64
IP Source Guard (IPSG) . . . . . . . . . . . . . . . 64
DHCP Snooping . . . . . . . . . . . . . . . . . . . 64
Dynamic ARP Inspection . . . . . . . . . . . . . . 64
Protected Ports (Private VLAN Edge). . . . . . . . 65
Switching Features . . . . . . . . . . . . . . . . . . . 65
Flow Control Support (IEEE 802.3x) . . . . . . . . . 65
Head of Line Blocking Prevention . . . . . . . . . 65
Alternate Store and Forward (ASF) . . . . . . . . . 65
4 Contents
Jumbo Frames Support . . . . . . . . . . . . . . . 66
Auto-MDI/MDIX Support . . . . . . . . . . . . . . 66
VLAN-Aware MAC-based Switching . . . . . . . . 66
Back Pressure Support . . . . . . . . . . . . . . . 66
Auto Negotiation . . . . . . . . . . . . . . . . . . 67
Broadcast Storm Control . . . . . . . . . . . . . . 67
Port Mirroring . . . . . . . . . . . . . . . . . . . . 67
Static and Dynamic MAC Address Tables . . . . . 68
Link Layer Discovery Protocol (LLDP) . . . . . . . 68
Link Layer Discovery Protocol (LLDP) for
Media Endpoint Devices . . . . . . . . . . . . . . 68
Priority-based Flow Control (PFC) . . . . . . . . . 68
Data Center Bridging Exchange (DBCx)
Protocol . . . . . . . . . . . . . . . . . . . . . . . 69
Enhanced Transmission Selection . . . . . . . . . 69
Fibre Channel over Ethernet (FCoE)
Initialization Protocol Snooping . . . . . . . . . . 69
Cisco Protocol Filtering . . . . . . . . . . . . . . . 70
DHCP Layer 2 Relay . . . . . . . . . . . . . . . . . 70
Contents 5
Multiple Spanning Tree . . . . . . . . . . . . . . . 73
Bridge Protocol Data Unit (BPDU) Guard . . . . . . 74
BPDU Filtering . . . . . . . . . . . . . . . . . . . 74
Routing Features . . . . . . . . . . . . . . . . . . . . . 76
Address Resolution Protocol (ARP) Table
Management . . . . . . . . . . . . . . . . . . . . 76
VLAN Routing . . . . . . . . . . . . . . . . . . . . 76
IP Configuration . . . . . . . . . . . . . . . . . . . 76
Open Shortest Path First (OSPF) . . . . . . . . . . 76
BOOTP/DHCP Relay Agent . . . . . . . . . . . . . 77
IP Helper and UDP Relay . . . . . . . . . . . . . . 77
Routing Information Protocol . . . . . . . . . . . . 77
Router Discovery . . . . . . . . . . . . . . . . . . 77
Routing Table . . . . . . . . . . . . . . . . . . . . 77
Virtual Router Redundancy Protocol (VRRP) . . . . 78
Tunnel and Loopback Interfaces . . . . . . . . . . 78
6 Contents
Layer 2 Multicast Features . . . . . . . . . . . . . . . 81
MAC Multicast Support. . . . . . . . . . . . . . . 81
IGMP Snooping . . . . . . . . . . . . . . . . . . . 81
IGMP Snooping Querier . . . . . . . . . . . . . . 82
MLD Snooping . . . . . . . . . . . . . . . . . . . 82
Multicast VLAN Registration . . . . . . . . . . . . 82
3 Hardware Overview . . . . . . . . . . . . . . . . . 85
PowerConnect 8000-series and 8100-series
Front Panel . . . . . . . . . . . . . . . . . . . . . . . . 85
PowerConnect 8024 Front Panel . . . . . . . . . . 85
PowerConnect 8024F Front Panel . . . . . . . . . 86
PowerConnect 8132 Front Panel . . . . . . . . . . 87
PowerConnect 8132F Front Panel . . . . . . . . . 87
PowerConnect 8164 Front Panel . . . . . . . . . . 88
PowerConnect 8164F Front Panel . . . . . . . . . 89
Hot-Pluggable Interface Modules . . . . . . . . . 90
USB Port (Power Connect 8100-series
switches only) . . . . . . . . . . . . . . . . . . . 92
Port and System LEDs . . . . . . . . . . . . . . . 92
Contents 7
PowerConnect 8000-series and 8100-series
Back Panel . . . . . . . . . . . . . . . . . . . . . . . . 92
Console Port . . . . . . . . . . . . . . . . . . . . 93
Out-of-Band Management Port . . . . . . . . . . . 93
Power Supplies . . . . . . . . . . . . . . . . . . . 93
Ventilation System . . . . . . . . . . . . . . . . . 94
LED Definitions . . . . . . . . . . . . . . . . . . . . . . 95
Port LEDs . . . . . . . . . . . . . . . . . . . . . . 95
System LEDs . . . . . . . . . . . . . . . . . . . . 96
Switch Addresses . . . . . . . . . . . . . . . . . . . . 97
8 Contents
Understanding Command Modes . . . . . . . . . . . . 109
Contents 9
Dynamic Host Name Mapping . . . . . . . . . . 131
10 Contents
Default Stacking Values . . . . . . . . . . . . . . . . . 152
10 Configuring Authentication,
Authorization, and Accounting . . . . . . . 177
AAA Overview . . . . . . . . . . . . . . . . . . . . . . 177
Methods . . . . . . . . . . . . . . . . . . . . . . 178
Access Lines . . . . . . . . . . . . . . . . . . . . 179
Contents 11
Authentication . . . . . . . . . . . . . . . . . . . . . 179
Authorization . . . . . . . . . . . . . . . . . . . . . . 180
Exec Authorization Capabilities . . . . . . . . . . 181
Accounting . . . . . . . . . . . . . . . . . . . . . . . 182
12 Contents
Using TACACS+ Servers to Control Management
Access . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Which TACACS+ Attributes Does the Switch
Support? . . . . . . . . . . . . . . . . . . . . . . 198
Contents 13
RAM Log . . . . . . . . . . . . . . . . . . . . . 215
Log File . . . . . . . . . . . . . . . . . . . . . . 216
Remote Log Server . . . . . . . . . . . . . . . . 216
Email Alert Global Configuration . . . . . . . . . 219
Email Alert Mail Server Configuration . . . . . . 220
Email Alert Subject Configuration . . . . . . . . 222
Email Alert To Address Configuration. . . . . . . 223
Email Alert Statistics . . . . . . . . . . . . . . . 224
14 Contents
CLI Banner . . . . . . . . . . . . . . . . . . . . . 244
SDM Template Preference . . . . . . . . . . . . . 245
Clock . . . . . . . . . . . . . . . . . . . . . . . . 246
SNTP Global Settings . . . . . . . . . . . . . . . . 247
SNTP Authentication . . . . . . . . . . . . . . . . 248
SNTP Server . . . . . . . . . . . . . . . . . . . . 250
Summer Time Configuration . . . . . . . . . . . . 254
Time Zone Configuration . . . . . . . . . . . . . . 255
Slot Summary . . . . . . . . . . . . . . . . . . . . 256
Supported Cards . . . . . . . . . . . . . . . . . . 257
Contents 15
Default SNMP Values . . . . . . . . . . . . . . . . . 273
16 Contents
What Factors Should Be Considered When
Managing Files? . . . . . . . . . . . . . . . . . . 311
How Is the Running Configuration Saved? . . . . . 313
Contents 17
What Is the DHCP Auto Configuration
Process? . . . . . . . . . . . . . . . . . . . . . 335
Monitoring and Completing the DHCP
Auto Configuration Process . . . . . . . . . . . 339
What Are the Dependencies for DHCP
Auto Configuration? . . . . . . . . . . . . . . . . 340
18 Contents
GVRP Statistics . . . . . . . . . . . . . . . . . . . 359
EAP Statistics . . . . . . . . . . . . . . . . . . . . 360
Utilization Summary . . . . . . . . . . . . . . . . 361
Counter Summary. . . . . . . . . . . . . . . . . . 362
Switchport Statistics . . . . . . . . . . . . . . . . 363
RMON Statistics . . . . . . . . . . . . . . . . . . 364
RMON History Control Statistics . . . . . . . . . . 365
RMON History Table . . . . . . . . . . . . . . . . 367
RMON Event Control . . . . . . . . . . . . . . . . 368
RMON Event Log . . . . . . . . . . . . . . . . . . 370
RMON Alarms . . . . . . . . . . . . . . . . . . . 371
Port Statistics . . . . . . . . . . . . . . . . . . . . 373
LAG Statistics . . . . . . . . . . . . . . . . . . . . 374
Port Mirroring . . . . . . . . . . . . . . . . . . . . 375
Contents 19
What Information Does the Switch Track in
iSCSI Traffic Flows? . . . . . . . . . . . . . . . . 389
How Does iSCSI Optimization Interact With
Dell EqualLogic Arrays?. . . . . . . . . . . . . . 390
What Occurs When iSCSI Optimization Is
Enabled or Disabled? . . . . . . . . . . . . . . . 390
How Does iSCSI Optimization Interact with
DCBx? . . . . . . . . . . . . . . . . . . . . . . . 391
How Does iSCSI Optimization Interact with
Dell Compellent Arrays? . . . . . . . . . . . . . 391
20 Contents
Default Captive Portal Behavior and Settings . . . . . 406
Contents 21
Default Port Values . . . . . . . . . . . . . . . . . . . 444
22 Contents
Port Security (Port-MAC Locking) . . . . . . . . . . . . 495
Default 802.1X Values . . . . . . . . . . . . . . . . 495
Configuring Port Security (CLI) . . . . . . . . . . . 498
Contents 23
ACL Configuration Examples. . . . . . . . . . . . . . 529
Configuring an IP ACL . . . . . . . . . . . . . . . 529
Configuring a MAC ACL . . . . . . . . . . . . . . 531
Configuring a Time-Based ACL . . . . . . . . . . 533
Configuring a Management Access List . . . . . 534
24 Contents
Configuring a Port in Access Mode . . . . . . . . 577
Configuring a Port in General Mode . . . . . . . . 578
Configuring a Port in Trunk Mode . . . . . . . . . 579
Configuring VLAN Settings for a LAG . . . . . . . 581
Configuring Double VLAN Tagging . . . . . . . . . 582
Configuring MAC-Based VLANs . . . . . . . . . . 583
Configuring IP-Based VLANs . . . . . . . . . . . . 584
Configuring a Protocol-Based VLAN . . . . . . . . 584
Configuring GVRP . . . . . . . . . . . . . . . . . . 586
Configuring Voice VLANs . . . . . . . . . . . . . . 588
Contents 25
Rapid Spanning Tree . . . . . . . . . . . . . . . 621
MSTP Settings . . . . . . . . . . . . . . . . . . 624
MSTP Interface Settings . . . . . . . . . . . . . 626
26 Contents
LLDP-MED Interface Configuration . . . . . . . . 652
LLDP-MED Local Device Information . . . . . . . 654
LLDP-MED Remote Device Information . . . . . . 655
Contents 27
Configuring Port-Based Traffic Control (CLI) . . . . . 676
Configuring Flow Control and Storm Control . . . 676
Configuring Protected Ports . . . . . . . . . . . 677
Configuring LLPF . . . . . . . . . . . . . . . . . 678
28 Contents
Bridge Multicast Forwarding . . . . . . . . . . . . 695
MRouter Status . . . . . . . . . . . . . . . . . . . 696
General IGMP Snooping . . . . . . . . . . . . . . 697
Global Querier Configuration . . . . . . . . . . . . 700
VLAN Querier . . . . . . . . . . . . . . . . . . . . 701
VLAN Querier Status . . . . . . . . . . . . . . . . 704
MFDB IGMP Snooping Table . . . . . . . . . . . . 705
MLD Snooping General . . . . . . . . . . . . . . . 706
MLD Snooping Global Querier Configuration . . . 708
MLD Snooping VLAN Querier . . . . . . . . . . . 709
MLD Snooping VLAN Querier Status . . . . . . . . 712
MFDB MLD Snooping Table . . . . . . . . . . . . 713
MVR Global Configuration . . . . . . . . . . . . . 714
MVR Members . . . . . . . . . . . . . . . . . . . 715
MVR Interface Configuration . . . . . . . . . . . . 716
MVR Statistics . . . . . . . . . . . . . . . . . . . 719
GARP Timers . . . . . . . . . . . . . . . . . . . . 720
GMRP Parameters . . . . . . . . . . . . . . . . . 722
MFDB GMRP Table . . . . . . . . . . . . . . . . . 724
Contents 29
27 Snooping and Inspecting Traffic . . . . . . 743
Traffic Snooping and Inspection Overview . . . . . . 743
What Is DHCP Snooping? . . . . . . . . . . . . . 744
How Is the DHCP Snooping Bindings Database
Populated? . . . . . . . . . . . . . . . . . . . . 745
What Is IP Source Guard? . . . . . . . . . . . . 747
What is Dynamic ARP Inspection? . . . . . . . . 748
Why Is Traffic Snooping and Inspection
Necessary? . . . . . . . . . . . . . . . . . . . . 749
30 Contents
Configuring IP Source Guard . . . . . . . . . . . . 774
Configuring Dynamic ARP Inspection . . . . . . . 775
Contents 31
29 Configuring Data Center Bridging
Features . . . . . . . . . . . . . . . . . . . . . . . . 799
Data Center Bridging Technology Overview . . . . . 799
Default DCB Values . . . . . . . . . . . . . . . . 800
32 Contents
30 Managing the MAC Address Table . . . . 837
MAC Address Table Overview . . . . . . . . . . . . . . 837
How Is the Address Table Populated? . . . . . . . 837
What Information Is in the MAC Address
Table? . . . . . . . . . . . . . . . . . . . . . . . . 838
How Is the MAC Address Table Maintained
Across a Stack? . . . . . . . . . . . . . . . . . . 838
Contents 33
Loopbacks Summary . . . . . . . . . . . . . . . 854
34 Contents
33 Configuring IP Routing . . . . . . . . . . . . . 883
IP Routing Overview . . . . . . . . . . . . . . . . . . . 883
Contents 35
What Is L2 DHCP Relay? . . . . . . . . . . . . . 908
What Is the IP Helper Feature? . . . . . . . . . . 909
36 Contents
Default OSPF Values . . . . . . . . . . . . . . . . . . . 940
Contents 37
Configuring OSPF Interface Settings . . . . . . . 979
Configuring Stub Areas and NSSAs . . . . . . . 981
Configuring Virtual Links . . . . . . . . . . . . . 983
Configuring OSPF Area Range Settings . . . . . 985
38 Contents
Default RIP Values . . . . . . . . . . . . . . . . . . . 1021
Contents 39
Configuring VRRP Features (CLI). . . . . . . . . . . . 1048
Configuring VRRP Settings . . . . . . . . . . . . 1048
40 Contents
IPv6 Static Reject and Discard Routes . . . . . . . . 1080
Contents 41
Configuring the DHCPv6 Server for Prefix
Delegation . . . . . . . . . . . . . . . . . . . . . 1100
Configuring an Interface as a DHCPv6
Relay Agent . . . . . . . . . . . . . . . . . . . . 1101
42 Contents
DiffServ for VoIP . . . . . . . . . . . . . . . . . 1130
Contents 43
CoS Configuration Example . . . . . . . . . . . . . . 1147
44 Contents
Default L3 Multicast Values . . . . . . . . . . . . . . 1167
Contents 45
MLD Proxy Configuration Summary . . . . . . . 1193
MLD Proxy Interface Membership
Information . . . . . . . . . . . . . . . . . . . . 1194
Detailed MLD Proxy Interface Membership
Information . . . . . . . . . . . . . . . . . . . . 1195
46 Contents
Configuring and Viewing PIM-DM for IPv6
Multicast Routing . . . . . . . . . . . . . . . . . 1224
Configuring and Viewing PIM-SM for IPv4
Multicast Routing . . . . . . . . . . . . . . . . . 1225
Configuring and Viewing PIM-SM for IPv6
Multicast Routing . . . . . . . . . . . . . . . . . 1227
Configuring and Viewing DVMRP
Information . . . . . . . . . . . . . . . . . . . . 1230
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1247
Contents 47
48 Contents
1
Introduction
The Dell PowerConnect 8024, 8024F, 8132, 8132F, 8164, and 8164F switches
are stackable Layer 2 and Layer 3 switches that extend the Dell
PowerConnect LAN switching product range.
NOTE: Throughout this document, the PowerConnect 8024 and 8024F switches
are referred to as the PowerConnect 8000-series switches, and the
PowerConnect 8132, 8132F, 8164, 8164F switches are referred to as the
PowerConnect 8100-series switches.
Introduction 49
Audience
This guide is for network administrators in charge of managing one or more
PowerConnect 8024, 8024F, 8132, 8132F, 8164, and 8164F switches. To
obtain the greatest benefit from this guide, you should have a basic
understanding of Ethernet networks and local area network (LAN) concepts.
Document Conventions
Table 1-1 describes the typographical conventions this document uses.
Convention Description
Bold Page names, field names, menu options, button names, and
CLI commands and keywords.
courier font Command-line text (CLI output) and file names
[] In a command line, square brackets indicate an optional
entry.
{} In a command line, inclusive brackets indicate a selection of
compulsory parameters separated by the | character. One
option must be selected. For example: spanning-tree mode
{stp|rstp|mstp} means that for the spanning-tree mode
command you must enter either stp, rstp, or mstp
Italic In a command line, indicates a variable.
<Enter> Any individual key on the keyboard.
CTRL + Z A keyboard combination that involves pressing the Z key
while holding the CTRL key.
50 Introduction
Additional Documentation
The following documents for the PowerConnect 8024, 8024F, 8132, 8132F,
8164, and 8164F switches are available at support.dell.com/manuals:
• Getting Started Guide—provides information about the switch models in
the series, including front and back panel features. It also describes the
installation and initial configuration procedures.
• CLI Reference Guide—provides information about the command-line
interface (CLI) commands used to configure and manage the switch. The
document provides in-depth CLI descriptions, syntax, default values, and
usage guidelines.
Introduction 51
52 Introduction
2
Switch Features
This section describes the switch user-configurable software features.
NOTE: Before proceeding, read the release notes for this product. The release
notes are part of the firmware download.
Switch Features 53
System Management Features
Multiple Management Options
You can use any of the following methods to manage the switch:
• Use a web browser to access the Dell OpenManage Switch Administrator
interface. The switch contains an embedded Web server that serves
HTML pages.
• Use a telnet client, SSH client, or a direct console connection to access the
CLI. The CLI syntax and semantics conform as much as possible to
common industry practice.
• Use a network management system (NMS) to manage and monitor the
system through SNMP. The switch supports SNMP v1/v2c/v3 over the
UDP/IP transport protocol.
Log Messages
The switch maintains in-memory log messages as well as persistent logs. You
can also configure remote logging so that the switch sends log messages to a
remote log server. You can also configure the switch to send log messages to a
configured SMTP server. This allows you to receive the log message in an e-
mail account of your choice. Switch auditing messages, CLI command
logging, Web logging, and SNMP logging can be enabled or disabled.
For information about configuring system logging, see "Monitoring and
Logging System Information" on page 203.
54 Switch Features
Integrated DHCP Server
PowerConnect 8000-series and 8100-series switches include an integrated
DHCP server that can deliver host-specific configuration information to
hosts on the network. The switch DHCP server allows you to configure IP
address pools (scopes), and when a host’s DHCP client requests an address,
the switch DHCP server automatically assigns the host an address from the
pool.
For information about configuring the DHCP server settings, see
"Configuring DHCP Server Settings" on page 859.
Switch Features 55
File Management
You can upload and download files such as configuration files and system
images by using HTTP (web only), TFTP, Secure FTP (SFTP), or Secure
Copy (SCP). Configuration file uploads from the switch to a server are a good
way to back up the switch configuration. You can also download a
configuration file from a server to the switch to restore the switch to the
configuration in the downloaded file.
For information about uploading, downloading, and copying files, see
"Managing Images and Files" on page 307.
56 Switch Features
sFlow
sFlow is the standard for monitoring high-speed switched and routed
networks. sFlow technology is built into network equipment and gives
complete visibility into network activity, enabling effective management and
control of network resources. The PowerConnect 8000-series and 8100-series
switches support sFlow version 5.
For information about configuring managing sFlow settings, see "Monitoring
Switch Traffic" on page 347.
Switch Features 57
Stacking Features
For information about creating and maintaining a stack of switches, see
"Managing a Switch Stack" on page 141.
Single IP Management
When multiple switches are connected together through the stack ports, they
operate as a single unit with a larger port count. The stack operates and is
managed as a single entity. One switch acts as the master, and the entire stack
is managed through the management interface (Web, CLI, or SNMP) of the
stack master.
58 Switch Features
Master Failover with Transparent Transition
The stacking feature supports a standby or backup unit that assumes the
stack master role if the stack master fails. As soon as a stack master failure is
detected, the standby unit initializes the control plane and enables all other
stack units with the current configuration. The standby unit maintains a
synchronized copy of the running configuration for the stack.
Security Features
Configurable Access and Authentication Profiles
You can configure rules to limit access to the switch management interface
based on criteria such as access type and source IP address of the
management host. You can also require the user to be authenticated locally or
by an external server, such as a RADIUS server.
For information about configuring access and authentication profiles, see
"Configuring Authentication, Authorization, and Accounting" on page 177.
Switch Features 59
Password-Protected Management Access
Access to the Web, CLI, and SNMP management interfaces is password
protected, and there are no default users on the system.
For information about configuring local user accounts, see "Configuring
Authentication, Authorization, and Accounting" on page 177.
TACACS+ Client
The switch has a TACACS+ client. TACACS+ provides centralized security
for validation of users accessing the switch. TACACS+ provides a centralized
user management system while still retaining consistency with RADIUS and
other authentication processes.
For information about configuring TACACS+ client settings, see
"Configuring Authentication, Authorization, and Accounting" on page 177.
RADIUS Support
The switch has a Remote Authentication Dial In User Service (RADIUS)
client and can support up to 32 named authentication and accounting
RADIUS servers. The switch also supports RADIUS Attribute 4, which is the
configuration of a NAS-IP address. You can also configure the switch to
accept RADIUS-assigned VLANs.
For information about configuring RADIUS client settings, see "Configuring
Authentication, Authorization, and Accounting" on page 177.
60 Switch Features
SSH/SSL
The switch supports Secure Shell (SSH) for secure, remote connections to
the CLI and Secure Sockets Layer (SSL) to increase security when accessing
the web-based management interface.
For information about configuring SSH and SSL settings, see "Configuring
Authentication, Authorization, and Accounting" on page 177.
Denial of Service
The switch supports configurable Denial of Service (DoS) attack protection
for eight different types of attacks.
For information about configuring DoS settings, see "Configuring Port and
System Security" on page 457.
Port Protection
A port may be put into the disabled state for any of the following reasons:
• BPDU Storm Protection: By default, if Spanning Tree Protocol (STP)
bridge protocol data units (BPDUs) are received at a rate of 15pps or
greater for three consecutive seconds on a port, the port will be
diagnostically disabled. The threshold is not configurable.
• DHCP Snooping: If DHCP packets are received on a port at a rate that
exceeds 15 pps, the port will be diagnostically disabled. The threshold is
configurable up to 300 pps for up to 15s long using the ip dhcp
snooping limit command. DHCP snooping is disabled by default.
The default protection limit is 15 pps.
Switch Features 61
• Dynamic ARP Inspection: By default, if Dynamic ARP Inspection packets
are received on a port at a rate that exceeds 15 pps for 1 second, the port
will be diagnostically disabled. The threshold is configurable up to 300 pps
and the burst is configurable up to 15s long using the ip arp
inspection limit command.
A port that is diagnostically disabled due to exceeding one of the above limits
may be returned to service using the no shut command.
Captive Portal
The Captive Portal feature blocks clients from accessing the network until
user verification has been established. When a user attempts to connect to
the network through the switch, the user is presented with a customized Web
page that might contain username and password fields or the acceptable use
policy. You can require users to be authenticated by a local or remote RADIUS
database before access is granted.
For information about configuring the Captive Portal features, see
"Configuring a Captive Portal" on page 401.
62 Switch Features
Dot1x Monitor Mode
Monitor mode can be enabled in conjunction with Dot1x authentication to
allow network access even when the user fails to authenticate. The switch logs
the results of the authentication process for diagnostic purposes. The main
purpose of this mode is to help troubleshoot the configuration of a Dot1x
authentication on the switch without affecting the network access to the
users of the switch.
For information about enabling the Dot1X Monitor mode, see "Configuring
Port and System Security" on page 457.
Switch Features 63
Time-Based ACLs
With the Time-based ACL feature, you can define when an ACL is in effect
and the amount of time it is in effect.
For information about configuring time-based ACLs, see "Configuring Access
Control Lists" on page 501.
DHCP Snooping
DHCP Snooping is a security feature that monitors DHCP messages between
a DHCP client and DHCP server. It filters harmful DHCP messages and
builds a bindings database of (MAC address, IP address, VLAN ID, port)
tuples that are specified as authorized. DHCP snooping can be enabled
globally and on specific VLANs. Ports within the VLAN can be configured to
be trusted or untrusted. DHCP servers must be reached through trusted ports.
For information about configuring DHCP Snooping, see "Snooping and
Inspecting Traffic" on page 743.
64 Switch Features
Protected Ports (Private VLAN Edge)
Private VLAN Edge (PVE) ports are a Layer 2 security feature that provides
port-based security between ports that are members of the same VLAN. It is
an extension of the common VLAN. Traffic from protected ports is sent only
to the uplink ports and cannot be sent to other ports within the VLAN.
For information about configuring IPSG, see "Configuring Port-Based Traffic
Control" on page 665.
Switching Features
Flow Control Support (IEEE 802.3x)
Flow control enables lower speed switches to communicate with higher speed
switches by requesting that the higher speed switch refrains from sending
packets. Transmissions are temporarily halted to prevent buffer overflows.
For information about configuring flow control, see "Configuring Port-Based
Traffic Control" on page 665.
Switch Features 65
Jumbo Frames Support
Jumbo frames enable transporting data in fewer frames to ensure less
overhead, lower processing time, and fewer interrupts.
For information about configuring the port MTU, see "Configuring Port
Characteristics" on page 439.
Auto-MDI/MDIX Support
Your switch supports auto-detection between crossed and straight-through
cables. Media-Dependent Interface (MDI) is the standard wiring for end
stations, and the standard wiring for hubs and switches is known as Media-
Dependent Interface with Crossover (MDIX).
66 Switch Features
Auto Negotiation
Auto negotiation allows the switch to advertise modes of operation. The auto
negotiation function provides the means to exchange information between
two switches that share a point-to-point link segment, and to automatically
configure both switches to take maximum advantage of their transmission
capabilities.
PowerConnect 8000-series and 8100-series switches enhance auto negotiation
by providing configuration of port advertisement. Port advertisement allows
the system administrator to configure the port speeds that are advertised.
For information about configuring auto negotiation, see "Configuring Port
Characteristics" on page 439.
Port Mirroring
Port mirroring monitors and mirrors network traffic by forwarding copies of
incoming and outgoing packets from up to four source ports to a monitoring
port. The switch also supports flow-based mirroring, which allows you to copy
certain types of traffic to a single destination port. This provides flexibility—
instead of mirroring all ingress or egress traffic on a port the switch can mirror
a subset of that traffic. You can configure the switch to mirror flows based on
certain kinds of Layer 2, Layer 3, and Layer 4 information.
For information about configuring port mirroring, see "Monitoring Switch
Traffic" on page 347.
Switch Features 67
Static and Dynamic MAC Address Tables
You can add static entries to the switch’s MAC address table and configure
the aging time for entries in the dynamic MAC address table. You can also
search for entries in the dynamic table based on several different criteria.
For information about viewing and managing the MAC address table, see
"Managing the MAC Address Table" on page 837.
NOTE: An interface that is configured for PFC is automatically disabled for 802.3x
flow control.
68 Switch Features
For information about configuring the PFC feature, see "Configuring Data
Center Bridging Features" on page 799.
Switch Features 69
Cisco Protocol Filtering
The Cisco Protocol Filtering feature (also known as Link Local Protocol
Filtering) filters Cisco protocols that should not normally be relayed by a
bridge. The group addresses of these Cisco protocols do not fall within the
IEEE defined range of the 802.1D MAC Bridge Filtered MAC Group
Addresses (01-80-C2-00-00-00 to 01-80-C2-00-00-0F).
For information about configuring LLPF, settings see "Configuring Port-
Based Traffic Control" on page 665.
VLAN Support
VLANs are collections of switching ports that comprise a single broadcast
domain. Packets are classified as belonging to a VLAN based on either the
VLAN tag or a combination of the ingress port and packet contents. Packets
sharing common attributes can be groups in the same VLAN. The
PowerConnect 8000-series and 8100-series switches are in full compliance
with IEEE 802.1Q VLAN tagging.
Port-Based VLANs
Port-based VLANs classify incoming packets to VLANs based on their ingress
port. When a port uses 802.1X port authentication, packets can be assigned
to a VLAN based on the result of the 802.1X authentication a client uses
when it accesses the switch. This feature is useful for assigning traffic to
Guest VLANs or Voice VLANs.
70 Switch Features
IP Subnet-based VLAN
This feature allows incoming untagged packets to be assigned to a VLAN and
traffic class based on the source IP address of the packet.
MAC-based VLAN
This feature allows incoming untagged packets to be assigned to a VLAN and
traffic class based on the source MAC address of the packet.
Voice VLAN
The Voice VLAN feature enables switch ports to carry voice traffic with
defined priority. The priority level enables the separation of voice and data
traffic coming onto the port. Voice VLAN is the preferred solution for
enterprises wishing to deploy voice services in their network.
Switch Features 71
Guest VLAN
The Guest VLAN feature allows a switch to provide a distinguished service to
unauthenticated users. This feature provides a mechanism to allow visitors
and contractors to have network access to reach external network with no
ability to browse information on the internal LAN.
For information about configuring the Guest VLAN see "Configuring Port
and System Security" on page 457.
Double VLANs
The Double VLAN feature (IEEE 802.1QinQ) allows the use of a second tag
on network traffic. The additional tag helps differentiate between customers
in the Metropolitan Area Networks (MAN) while preserving individual
customer’s VLAN identification when they enter their own 802.1Q domain.
72 Switch Features
Spanning Tree Protocol Features
For information about configuring Spanning Tree Protocol features, see
"Configuring the Spanning Tree Protocol" on page 605.
Switch Features 73
Bridge Protocol Data Unit (BPDU) Guard
Spanning Tree BPDU Guard is used to disable the port in case a new device
tries to enter the already existing topology of STP. Thus devices, which were
originally not a part of STP, are not allowed to influence the STP topology.
BPDU Filtering
When spanning tree is disabled on a port, the BPDU Filtering feature allows
BPDU packets received on that port to be dropped. Additionally, the BPDU
Filtering feature prevents a port in Port Fast mode from sending and receiving
BPDUs. A port in Port Fast mode is automatically placed in the forwarding
state when the link is up to increase convergence time.
Link Aggregation
Up to eight ports can combine to form a single Link Aggregated Group
(LAG). This enables fault tolerance protection from physical link disruption,
higher bandwidth connections and improved bandwidth granularity.
Per IEEE 802.1AX, only links with the same operational characteristics, such
as speed and duplex setting, may be aggregated. PowerConnect switches
aggregate links only if they have the same operational speed and duplex
setting, as opposed to the configured speed and duplex setting. This allows
operators to aggregate links that use auto negotiation to set values for speed
and duplex. Dissimilar ports will not become active in the LAG if their
operational settings do not match those of the first member of the LAG.
PowerConnect switches also support setting the MTU on a LAG. When a link
becomes active in a LAG, its MTU is dynamically changed to the LAG MTU.
When the link leaves the LAG, its MTU reverts to the link setting.
74 Switch Features
achievable between a given pair of systems. LACP automatically determines,
configures, binds, and monitors the binding of ports to aggregators within the
system.
Switch Features 75
Routing Features
Address Resolution Protocol (ARP) Table Management
You can create static ARP entries and manage many settings for the dynamic
ARP table, such as age time for entries, retries, and cache size.
For information about managing the ARP table, see "Configuring IP Routing"
on page 883.
VLAN Routing
PowerConnect 8000-series and 8100-series switches support VLAN routing.
You can also configure the software to allow traffic on a VLAN to be treated as
if the VLAN were a router port.
For information about configuring VLAN routing interfaces, see "Configuring
Routing Interfaces" on page 843.
IP Configuration
The switch IP configuration settings to allow you to configure network
information for VLAN routing interfaces such as IP address and subnet mask,
MTU size, and ICMP redirects. Global IP configuration settings for the
switch allow you to enable or disable the generation of several types of ICMP
messages and enable or disable the routing mode.
For information about managing global IP settings, see "Configuring IP
Routing" on page 883.
76 Switch Features
BOOTP/DHCP Relay Agent
The switch BootP/DHCP Relay Agent feature relays BootP and DHCP
messages between DHCP clients and DHCP servers that are located in
different IP subnets.
For information about configuring the BootP/DHCP Relay agent, see
"Configuring L2 and L3 Relay Features" on page 907.
Router Discovery
For each interface, you can configure the Router Discovery Protocol (RDP) to
transmit router advertisements. These advertisements inform hosts on the
local network about the presence of the router.
For information about configuring router discovery, see "Configuring IP
Routing" on page 883.
Routing Table
The routing table displays information about the routes that have been
dynamically learned. You can configure static and default routes and route
preferences. A separate table shows the routes that have been manually
configured.
For information about viewing the routing table, see "Configuring IP
Routing" on page 883.
Switch Features 77
Virtual Router Redundancy Protocol (VRRP)
VRRP provides hosts with redundant routers in the network topology without
any need for the hosts to reconfigure or know that there are multiple routers.
If the primary (master) router fails, a secondary router assumes control and
continues to use the virtual router IP (VRIP) address.
VRRP Route Interface Tracking extends the capability of VRRP to allow
tracking of specific route/interface IP states within the router that can alter
the priority level of a virtual router for a VRRP group.
For information about configuring VRRP settings, see "Configuring VRRP"
on page 1035.
78 Switch Features
IPv6 Routes
Because IPv4 and IPv6 can coexist on a network, the router on such a network
needs to forward both traffic types. Given this coexistence, each switch
maintains a separate routing table for IPv6 routes. The switch can forward
IPv4 and IPv6 traffic over the same set of interfaces.
For information about configuring IPv6 routes, see "Configuring IPv6
Routing" on page 1059.
OSPFv3
OSPFv3 provides a routing protocol for IPv6 networking. OSPFv3 is a new
routing component based on the OSPF version 2 component. In dual stack
IPv6, you can configure and use both OSPF and OSPFv3 components.
For information about configuring OSPFv3, see "Configuring OSPF and
OSPFv3" on page 931.
DHCPv6
DHCPv6 incorporates the notion of the “stateless” server, where DHCPv6 is
not used for IP address assignment to a client, rather it only provides other
networking information such as DNS, Network Time Protocol (NTP), and/or
Session Initiation Protocol (SIP) information.
For information about configuring DHCPv6 settings, see "Configuring
DHCPv6 Server and Relay Settings" on page 1083.
Switch Features 79
Quality of Service (QoS) Features
NOTE: Some features that can affect QoS, such as ACLs and Voice VLAN, are
described in other sections within this chapter.
80 Switch Features
Internet Small Computer System Interface (iSCSI) Optimization
The iSCSI Optimization feature helps network administrators track iSCSI
traffic between iSCSI initiator and target systems. This is accomplished by
monitoring, or snooping traffic to detect packets used by iSCSI stations in
establishing iSCSI sessions and connections. Data from these exchanges may
optionally be used to create classification rules to assign the traffic between
the stations to a configured traffic class. This affects how the packets in the
flow are queued and scheduled for egress on the destination port.
For information about configuring iSCSI settings, see "Configuring iSCSI
Optimization" on page 387.
IGMP Snooping
Internet Group Management Protocol (IGMP) Snooping is a feature that
allows a switch to forward multicast traffic intelligently on the switch.
Multicast IP traffic is traffic that is destined to a host group. Host groups are
identified by class D IP addresses, which range from 224.0.0.0 to
239.255.255.255. Based on the IGMP query and report messages, the switch
forwards traffic only to the ports that request the multicast traffic. This
prevents the switch from broadcasting the traffic to all ports and possibly
affecting network performance.
Switch Features 81
IGMP Snooping Querier
When Protocol Independent Multicast (PIM) and IGMP are enabled in a
network with IP multicast routing, the IP multicast router acts as the IGMP
querier. However, if it is desirable to keep the multicast network Layer 2
switched only, the IGMP Snooping Querier can perform the query functions
of a Layer 3 multicast router.
MLD Snooping
In IPv4, Layer 2 switches can use IGMP Snooping to limit the flooding of
multicast traffic by dynamically configuring Layer 2 interfaces so that
multicast traffic is forwarded to only those interfaces associated with IP
multicast address.
In IPv6, MLD snooping performs a similar function. With MLD snooping,
IPv6 multicast data is selectively forwarded to a list of ports intended to
receive the data (instead of being flooded to all of the ports in a VLAN). This
list is constructed by snooping IPv6 multicast control packets.
82 Switch Features
Layer 3 Multicast Features
For information about configuring L3 multicast features, see "Managing IPv4
and IPv6 Multicast" on page 1157.
IGMP Proxy
The IGMP Proxy feature allows the switch to act as a proxy for hosts by
sending IGMP host messages on behalf of the hosts that the switch
discovered through standard IGMP router interfaces.
Switch Features 83
Protocol Independent Multicast—Sparse Mode
Protocol Independent Multicast-Sparse Mode (PIM-SM) is used to efficiently
route multicast traffic to multicast groups that may span wide area networks,
and where bandwidth is a constraint. PIM-SM uses shared trees by default
and implements source-based trees for efficiency. This data threshold rate is
used to toggle between trees.
MLD/MLDv2 (RFC2710/RFC3810)
MLD is used by IPv6 systems (listeners and routers) to report their IP
multicast addresses memberships to any neighboring multicast routers. The
implementation of MLD v2 is backward compatible with MLD v1.
MLD protocol enables the IPv6 router to discover the presence of multicast
listeners, the nodes that want to receive the multicast data packets, on its
directly attached interfaces. The protocol specifically discovers which
multicast addresses are of interest to its neighboring nodes and provides this
information to the multicast routing protocol that make the decision on the
flow of the multicast data packets.
84 Switch Features
3
Hardware Overview
This section provides an overview of the switch hardware. The topics covered
in this section include:
• PowerConnect 8000-series and 8100-series Front Panel
• PowerConnect 8000-series and 8100-series Back Panel
• LED Definitions
• Switch Addresses
Hardware Overview 85
• The switch automatically detects crossed and straight-through cables on
RJ-45 ports.
• RJ-45 ports support full-duplex mode 100/1000/10000 Mbps.
• PowerConnect 8024 switches can be stacked using the 10G SFP+ fiber
ports. The 10G ports default to Ethernet mode and must be configured to
be used as stacking ports.
NOTE: A combo port may have both the RJ-45 and SFP+ ports cabled to a remote
device and, if so, the SFP+ port will be the active port while the RJ-45 port will be
disabled. The SFP+ ports comply with IEC60950-1, IEC60825-1, and IEC60825-2
and are contained within a fire enclosure.
86 Hardware Overview
PowerConnect 8132 Front Panel
The PowerConnect 8132 front panel provides the following ports:
• 24 x 10GbE copper ports
• A USB port. See "USB Port (Power Connect 8100-series switches only)" on
page 92.
• A module bay that supports the following modules:
– 2 x 40 Gig QSFP (each QSFP may be configured as 4 x 10 Gig ports)
– 4 x SFP+ module
– 4 x 10GBaseT module
See "Hot-Pluggable Interface Modules" on page 90 for more information.
Hardware Overview 87
– 4 x SFP+ module
– 4 x 10GBaseT module.
See "Hot-Pluggable Interface Modules" on page 90 for details about these
modules.
88 Hardware Overview
Figure 3-5. PowerConnect 8164 Front Panel
Fixed QSFP
Hardware Overview 89
Figure 3-6. PowerConnect 8164F Front Panel
Fixed
90 Hardware Overview
If a no slot command is not issued prior to inserting a module, a message
such as the following will appear:
Card Mismatch: Unit:1 Slot:1 Inserted-Card: Dell 2
Port QSFP Expansion Card Config-Card: Dell 4 Port
10GBase-T Expansion Card
The following sections provides details on each module.
Hardware Overview 91
USB Port (Power Connect 8100-series switches only)
The Type-A, female USB port supports a USB 2.0-compliant flash memory
drive. The PowerConnect switch can read or write to a flash drive formatted
as FAT-32. You can use a USB flash drive to copy switch configuration files
and images between the USB flash drive and the switch. You can also use the
USB flash drive to move and copy configuration files and images from one
switch to other switches in the network.
The USB port does not support any other type of USB device.
92 Hardware Overview
The following image show the back panel of the PowerConnect 8000-series
and 8100-series switches.
Console Port
The console port is for management through a serial interface. This port
provides a direct connection to the switch and allows you to access the CLI
from a console terminal connected to the port through the provided serial
cable (RJ-45 to female DB-9 connectors).
The console port supports asynchronous data of eight data bits, one stop bit, no
parity bit, and no flow control. The default baud rate is 9600 bps.
Power Supplies
Each PowerConnect 8000-series and 8100-series switch has two power
supplies for redundant or loadsharing operation. Each power supply can
support 300W.
CAUTION: Remove the power cable from the modules prior to removing the
module itself. Power must not be connected prior to insertion in the chassis.
Hardware Overview 93
Ventilation System
The PowerConnect 8000-series and 8100-series switches have three
removable FANs (see "PowerConnect 8000-series and 8100-series Rear Panel"
on page 93), four Thermal sensors, and a FAN Speed Controller which can be
used to control FAN speeds. You can verify operation by observing the LEDs.
94 Hardware Overview
LED Definitions
This section describes the LEDs on the front and back panels of the switch.
Port LEDs
Each port on a PowerConnect 8000-series and 8100-series switches includes
two LEDs. One LED is on the left side of the port, and the second LED is on
the right side of the port. This section describes the LEDs on the switch
ports.
Speed Link
Hardware Overview 95
System LEDs
The system LEDs, located on the back panel, provide information about the
power supplies, thermal conditions, and diagnostics.
Table 3-2 shows the System LED definitions for the 8000-series switches.
Table 3-3 shows the System LED definitions for the 8100-series switches.
96 Hardware Overview
Table 3-3. System LED Definitions—PowerConnect 8100-Series Switches
Switch Addresses
The switch allocates MAC addresses from the Vital Product Data information
stored locally in flash. MAC addresses are used as follows:
Hardware Overview 97
Shown below are three commands that display the MAC addresses used by
the switch:
console#show system
Fans:
Power Supplies:
98 Hardware Overview
console#show ip interface out-of-band
IP Address..................................... 10.27.21.29
Subnet Mask.................................... 255.255.252.0
Default Gateway................................ 10.27.20.1
Configured IPv4 Protocol....................... DHCP
Burned In MAC Address.......................... 001E.C9F0.004E
Hardware Overview 99
100 Hardware Overview
4
Using Dell OpenManage Switch
Administrator
This section describes how to use the Dell OpenManage Switch
Administrator application. The topics covered in this section include:
• About Dell OpenManage Switch Administrator
• Starting the Application
• Understanding the Interface
• Using the Switch Administrator Buttons and Links
• Defining Fields
Browser Version
Internet Explorer v7–v8
Mozilla Firefox v3.0 and higher
Safari v4.0 and higher
NOTE: Additional operating systems and browsers might be compatible but have
not been explicitly tested with Dell OpenManage Switch Administrator.
NOTE: The switch is not configured with a default user name or password.
You must connect to the CLI by using the console port to configure the initial
user name and password. For information about connecting to the console,
see "Console Connection" on page 107. For information about creating a user
and password, see "Configuring Authentication, Authorization, and
Accounting" on page 177.
NOTE: A few pages contain a button that occurs only on that page. Page-specific
buttons are described in the sections that pertain to those pages.
Defining Fields
User-defined fields can contain 1–159 characters, unless otherwise noted on
the Dell OpenManage Switch Administrator web page.
All characters may be used except for the following:
• \
• /
• :
• *
• ?
• <
• >
• |
Console Connection
Use the following procedures to connect to the CLI by connecting to the
console port. For more information about creating a serial connection, see the
Getting Started Guide available at support.dell.com/manuals.
1 Connect the DB-9 connector of the supplied serial cable to a management
station, and connect the RJ-45 connector to the switch console port.
The console port is located on the back panel above the OOB Ethernet
port.
Telnet Connection
Telnet is a terminal emulation TCP/IP protocol. ASCII terminals can be
virtually connected to the local device through a TCP/IP protocol network.
Telnet connections are enabled by default, and the Telnet port number is 23.
The switch supports up to four simultaneous Telnet sessions. All CLI
commands can be used over a Telnet session.
To connect to the switch by using Telnet, the switch must have an IP address,
and the switch and management station must have network connectivity. You
can use any Telnet client on the management station to connect to the
switch.
You can also initiate a Telnet session from the OpenManage Switch
Administrator. For more information, see "Initiating a Telnet Session from the
Web Interface" on page 242.
Enter a question mark (?) after each word you enter to display available
command keywords or parameters.
console(config)#vlan ?
If the help output shows a parameter in angle brackets, you must replace the
parameter with a value.
console#telnet ?
If the characters you entered are not enough for the switch to identify a single
matching command, continue entering characters until the switch can
uniquely identify the command. Use the question mark (?) to display the
available commands matching the characters already entered.
console(config)#
Negating Commands
For many commands, the prefix keyword no is entered to cancel the effect of
a command or reset the configuration to the default value. All configuration
commands have this capability.
If you attempt to execute a command and receive an error message, use the
question mark (?) to help you determine the possible keywords or parameters
that are available.
Feature Default
IP address None
Subnet mask None
Default gateway None
DHCP client Enabled on out-of-band (OOB) interface.
VLAN 1 Members All switch ports
SDM template Dual IPv4 and IPv6 routing
Users None
Minimum password length 8 characters
IPv6 management mode Enabled
SNTP client Disabled
Global logging Enabled
Switch auditing Disabled
CLI command logging Disabled
Web logging Disabled
SNMP logging Disabled
Console logging Enabled (Severity level: debug and above)
RAM logging Enabled (Severity level: debug and above)
Persistent (FLASH) logging Disabled
DNS Enabled (No servers configured)
SNMP Enabled (SNMPv1)
Feature Default
SNMP Traps Enabled
Auto Configuration Enabled
Auto Save Disabled
Stacking Enabled
Nonstop Forwarding on the Stack Enabled
sFlow Enabled
ISDP Enabled (Versions 1 and 2)
RMON Enabled
TACACS+ Not configured
RADIUS Not configured
SSH/SSL Disabled
Telnet Enabled
Denial of Service Protection Disabled
Captive Portal Disabled
Dot1x Authentication (IEEE 802.1X) Disabled
MAC-Based Port Security All ports are unlocked
Access Control Lists (ACL) None configured
IP Source Guard (IPSG) Disabled
DHCP Snooping Disabled
Dynamic ARP Inspection Disabled
Protected Ports (Private VLAN Edge) None
Flow Control Support (IEEE 802.3x) Enabled
Head of Line Blocking Prevention Disabled
Maximum Frame Size 1500 bytes
Auto-MDI/MDIX Support Enabled
Auto Negotiation Enabled
Advertised Port Speed Maximum Capacity
Feature Default
Broadcast Storm Control Disabled
Port Mirroring Disabled
LLDP Enabled
LLDP-MED Disabled
MAC Table Address Aging 300 seconds (Dynamic Addresses)
Cisco Protocol Filtering (LLPF) No protocols are blocked
DHCP Layer 2 Relay Disabled
Default VLAN ID 1
Default VLAN Name Default
GVRP Disabled
GARP Timers Leave: 60 centiseconds
Leave All: 1000 centiseconds
Join: 20 centiseconds
Voice VLAN Disabled
Guest VLAN Disabled
RADIUS-assigned VLANs Disabled
Double VLANs Disabled
Spanning Tree Protocol (STP) Enabled
STP Operation Mode IEEE 802.1w Rapid Spanning Tree
Optional STP Features Disabled
STP Bridge Priority 32768
Multiple Spanning Tree Disabled
Link Aggregation No LAGs configured
LACP System Priority 1
Routing Mode Disabled
OSPF Admin Mode Enabled
OSPF Router ID 0.0.0.0
Feature Default
IP Helper and UDP Relay Enabled
RIP Enabled
VRRP Disabled
Tunnel and Loopback Interfaces None
IPv6 Routing Disabled
DHCPv6 Disabled
OSPFv3 Enabled
DiffServ Enabled
Auto VoIP Disabled
Auto VoIP Traffic Class 6
PFC Disabled; no classifications configured.
DCBx version Auto detect
FIP snooping Disabled globally and on all VLANs
iSCSI Enabled
Bridge Multicast Filtering Disabled
MLD Snooping Disabled
IGMP Snooping Disabled
IGMP Snooping Querier Disabled
GMRP Disabled
IPv4 Multicast Disabled
IPv6 Multicast Disabled
Feature Description
IP Address On an IPv4 network, the a 32-bit number that uniquely
identifies a host on the network. The address is
expressed in dotted-decimal format, for example
192.168.10.1.
Subnet Mask Determines which bits in the IP address identify the
network, and which bits identify the host. Subnet
masks are also expressed in dotted-decimal format, for
example 255.255.255.0.
Feature Description
Default Gateway Typically a router interface that is directly connected to
the switch and is in the same subnet. The switch sends
IP packets to the default gateway when it does not
recognize the destination IP address in a packet.
DHCP Client Requests network information from a DHCP server on
the network.
Domain Name System Translates hostnames into IP addresses. The server
(DNS) Server maintains a domain name databases and their
corresponding IP addresses.
Default Domain Name Identifies your network, such as dell.com. If you enter a
hostname and do not include the domain name
information, the default domain name is automatically
appended to the hostname.
Host Name Mapping Allows you to statically map an IP address to a
hostname.
Configuring the DNS information, default domain name, and host name
mapping help the switch identify and locate other devices on the network and
on the Internet. For example, to upgrade the switch software by using a TFTP
Out-of-Band Interface
Use the Out of Band Interface page to assign the Out of Band Interface IP
address and subnet mask or to enable/disable the DHCP client for address
information assignment. DHCP is enabled by default on the OOB interface.
To display the Out of Band Interface page, click System → IP Addressing →
Out of Band Interface in the navigation panel.
To enable the DHCP client and allow a DHCP server on your network to
automatically assign the network information to the OOB interface, select
DHCP from the Protocol menu. If you statically assign the network
information, make sure the Protocol menu is set to None.
NOTE: You do not need to configure any additional fields on the page. For
information about VLAN routing interfaces, see "Configuring Routing Interfaces"
on page 843.
3 In the Next Hop IP Address field, enter the IP address of the default
gateway.
4 Click Apply.
For more information about configuring routes, see "Configuring IP Routing"
on page 883.
To configure DNS server information, click the Add link and enter the IP
address of the DNS server in the available field.
To map a host name to an IP address, click the Add link, type the name of the
host and its IP address in the appropriate fields, and then click Apply.
Use the Show All link to view all configured host name-to-IP address
mappings.
Command Purpose
configure Enter Global Configuration mode.
interface out-of-band Enter Interface Configuration mode for the OOB port.
ip address dhcp Enable the DHCP client.
CTRL + Z Exit to Privileged EXEC mode.
show ip interface out-of- Display network information for the OOB port.
band
Command Purpose
configure Enter Global Configuration mode.
interface vlan 1 Enter Interface Configuration mode for VLAN 1.
ip address dhcp Enable the DHCP client.
ipv6 address dhcp Enable the DHCPv6 client.
CTRL + Z Exit to Privileged EXEC mode.
show ip interface vlan 1 Display network information for VLAN 1.
Command Purpose
release dhcp interface Force the DHCPv4 client to release a leased address on the
specified interface.
renew dhcp interface Force the DHCP client to immediately renew an IPv4
address lease.
show dhcp lease Display IPv4 addresses leased from a DHCP server.
interface [interface]
show ipv6 dhcp interface Display information about the IPv6 DHCP information
[interface] for all interfaces or for the specified interface.
debug dhcp packet Display debug information about DHCPv4 client activities
and to trace DHCPv4 packets to and from the local
DHCPv4 client.
debug ipv6 dhcp Display debug information about DHCPv6 client activities
and to trace DHCPv6 packets to and from the local
DHCPv6 client.
Command Purpose
configure Enter Global Configuration mode.
interface out-of-band Enter Interface Configuration mode for the OOB
port.
ip address ip_address Configure a static IP address and subnet mask.
subnet_mask [gateway_ip] Optionally, you can also configure a default gateway.
CTRL + Z Exit to Privileged EXEC mode.
show ip interface out-of-band Verify the network information for the OOB port.
Command Purpose
configure Enter Global Configuration mode.
interface vlan 1 Enter Interface Configuration mode for VLAN 1.
ip address ip_address Enter the IP address and subnet mask.
subnet_mask
ipv6 address prefix/prefix-length Enter the IPv6 address and prefix.
[eui64]
ipv6 enable Enable IPv6 on the interface.
exit Exit to Global Configuration mode
ip default-gateway ip_address Configure the default gateway.
exit Exit to Privileged Exec mode.
show ip interface vlan 1 Verify the network information for VLAN 1.
show ipv6 interface vlan 1 Verify IPv6 network information for VLAN 1.
Command Purpose
configure Enter Global Configuration mode.
ip domain-lookup Enable IP DNS-based host name-to-address translation.
ip name-server Enter the IP address of an available name server to use to
ip_address resolve host names and IP addresses.
You can specify up to six DNS servers. The first server you
configure is the primary DNS server.
ip domain-name name Define a default domain name to complete unqualified
host names.
ip host name ip_address Use to configure static host name-to-address mapping in
the host cache.
ip address-conflict- Trigger the switch to run active address conflict detection
detect run by sending gratuitous ARP packets for IPv4 addresses on
the switch.
CTRL + Z Exit to Privileged EXEC mode.
show ip interface vlan 1 Verify the network information for VLAN 1.
show hosts Verify the configured network information and view the
dynamic host mappings.
show ip address-conflict View the status information corresponding to the last
detected address conflict.
clear ip address-conflict- Clear the address conflict detection status in the switch.
detect
IP Address........................ 10.27.22.153
Subnet Mask...................... 255.255.255.0
Default Gateway.................. 10.27.22.1
Protocol Current................. DHCP
Burned In MAC Address............ 001E.C9AA.AA08
5 View additional network information.
console#show hosts
Host name:
Default domain: sunny.dell.com dell.com
Name/address lookup is enabled
Name servers (Preference order): 10.27.138.20,
10.27.138.21
Configured host name-to-address mapping:
Host Addresses
----------- ------------------------------------
admin-laptop 10.27.65.103
This command will not take effect until the switch is rebooted.
console(config-if-Fo1/1/2)#do reload
This command will not take effect until the switch is rebooted.
console(config-if-Fo1/1/2)#do reload
Stacking Overview
PowerConnect 8000-series and 8100-series switches support high
performance stacking, allowing increased capacity to be added as needed,
without affecting network performance and providing a single point of
management.
Up to six PowerConnect 8024/8024F units can be stacked together using the
10G SFP+ fiber ports only. In other words, the copper 10 GbaseT ports on
the PC8024/PC8024F units cannot be used for stacking. When a combo port
is configured in stacking mode, the corresponding copper port is disabled.
The 10G ports default to Ethernet mode, so the ports must be reconfigured
as stacking ports.
Also, up to six PowerConnect 8132/8132F/8164/8164F switches can be
stacked using the 10G SFP+ fiber ports or the fixed 10G/40G QSFP ports. In
other words, all the ports on the 8100 series switches can be used for stacking.
Stacking is supported at distances of up to 100M if the switch is configured to
use Priority Flow Control on any port. Stacking using LR/LRM transceivers is
supported up to the maximum distance supported by the transceiver/fiber
combination (10 km for 10GBase-LR).
A single switch in the stack manages all the units in the stack (the stack
master), and you manage the stack by using a single IP address. The IP
address of the stack does not change, even if the stack master changes.
SFP+ Ports
Configured as
Stack Ports
Initiating a Failover
The NSF feature allows you to initiate a failover, which causes the former
stack master to reboot (cold start), and the new master to perform a warm
restart.
Initiating a failover reloads the stack master, triggering the backup unit to
take over. Before the failover, the stack master pushes application data and
other important information to the backup unit. Although the handoff is
controlled and causes minimal network disruption, some application state is
lost, such as pending timers and other pending internal events.
NOTE: The switch cannot guarantee that a backup unit has exactly the same data
that the stack master has when it fails. For example, the stack master might fail
before the checkpoint service gets data to the backup if an event occurs shortly
before a failover.
Table 9-1 lists the applications on the switch that checkpoint data and
describes the type of data that is checkpointed.
NOTE: Each switch is assigned three consecutive MAC addresses. The switch
uses the MAC addresses for the service port, network port, and routing
interfaces. A stack of switches uses the MAC addresses assigned to the stack
master.
If the backup unit assumes control due to a stack master failure or warm
restart, the backup unit continues to use the original stack master’s MAC
addresses. This reduces the amount of disruption to the network because
ARP and other L2 entries in neighbor tables remain valid after the failover to
the backup unit.
Stack units should always be connected with a ring topology (or other
biconnected topology), so that the loss of a single stack link does not divide
the stack into multiple stacks. If a stack is partitioned such that some units
lose all connectivity to other units, then both parts of the stack start using the
same MAC addresses. This can cause severe problems in the network.
NOTE: The changes you make to the Stacking configuration pages take effect only
after the device is reset.
Unit Configuration
Use the Unit Configuration page to change the unit number and unit type
(Management, Member, or Standby).
To display the Unit Configuration page, click System → Stack Management
→ Unit Configuration in the navigation panel.
3 Specify the switch ID, and select the model number of the switch.
4 Click Apply.
To display the Stack Port Summary page, click System → Stack Management
→ Stack Port Summary in the navigation panel.
NOTE: The OSPF feature uses NSF to enable the hardware to continue forwarding
IPv4 packets using OSPF routes while a backup unit takes over stack master
responsibility. To configure NSF on a stack that uses OSPF or OSPFv3, see "NSF
OSPF Configuration" on page 958 and "NSF OSPFv3 Configuration" on page 975.
To cause the maser unit to failover to the standby unit, click Initiate Failover.
The failover results in a warm restart of the stack master. Initiating a failover
reloads the stack master, triggering the backup unit to take over.
Command Purpose
configure Enter Global Configuration mode.
switch current_ID Change the switch ID number. The valid range is 1-10.
renumber new_ID NOTE: Changing the ID number causes all switches in the
stack to be reset to perform stack master renumbering. The
running configuration is cleared when the units reset.
stack Enter Global Stack Configuration mode.
movemanagement Move the management switch functionality from one
from_unit to_unit switch to another.
standby unit Specify the stack member that will come up as the master
if a stack failover occurs.
set description unit Configure a description for the specified stack member.
NOTE: The OSPF feature uses NSF to enable the hardware to continue forwarding
IPv4 packets using OSPF routes while a backup unit takes over stack master
responsibility. Additional NSF commands are available in OSPF and OSPFv3
command modes. For more information, see "NSF OSPF Configuration" on page 958
and "NSF OSPFv3 Configuration" on page 975
Command Purpose
show switch [stack- View information about all stack members or the specified
member-number ] member.
show stack-standby View the ID of the switch that will assume the role of the
stack master if it goes down.
show stack-port View information about the stacking ports.
show stack-port counters View the statistics about the data the stacking ports have
transmitted and received.
show supported View the PowerConnect models that are supported in the
switchtype stack and the switch index (SID) associated with each
model.
show nsf View summary information about the NSF feature.
show checkpoint View information about checkpoint messages generated by
statistics the stack master.
clear checkpoint Reset the checkpoint statistics counters to zero.
statistics
When all four units are up and running, the show switch CLI command gives
the following output:
console#show switch
SW Management Standby Preconfig Plugged- Switch Code
Status Status Model ID in Model Status Version
ID
--- --------- ------- -------- --------- ------- --------
---
1 Stack Member PC8024 PC8024 OK 9.19.0.2
2 Stack Member PC8024 PC8024 OK 9.19.0.2
3 Mgmt Switch PC8024 PC8024 OK 9.19.0.2
4 Stack Member PC8024F PC8024F OK 9.19.0.2
When the failed unit resumes normal operation, the previous configuration
that exists for that unit is reapplied by the stack master.
To permanently remove the unit from the stack, enter into Stack Config
Mode and use the member command, as the following example shows.
console#configure
console(config)#stack
console(config-stack)#no member 2
console(config-stack)#exit
console(config)#exit
console#show switch
SW Management Standby Preconfig Plugged- Switch Code
Status Status Model ID in Model Status Version
ID
--- --------- ------- -------- ------------------- --------
1 Stack Member PC8024 PC8024 OK 9.19.0.2
3 Mgmt Switch PC8024 PC8024 OK 9.19.0.2
4 Stack Member PC8024F PC8024F OK 9.19.0.2
AS1 AS2
Unit 1
LAG1 LAG2
Unit 2
Hosts
` ` `
LAG
Hosts
` ` `
DHCP Server
If the stack master fails, all hosts connected to that unit lose network access
until that unit reboots. The hardware on surviving units continues to enforce
source filters IPSG installed prior to the failover. Valid hosts continue to
communicate normally. During the failover, the hardware continues to drop
data packets from unauthorized hosts so that security is not compromised.
10.1.1.1
10.1.1.10
10.1.1.11
When the stack master fails, session A drops. The initiator at 10.1.1.10
detects a link down on its primary NIC and attempts to reestablish the
session on its backup NIC to a different IP address on the disk array. The
hardware forwards the packets to establish this new session, but assuming the
session is established before the control plane is restarted on the backup unit,
the new session receives no priority treatment in the hardware.
Session B remains established and fully functional throughout the restart and
continues to receive priority treatment in the hardware.
If the stack master fails, its link to the aggregation router is removed from the
LAG. When the control plane restarts, both routing interfaces come back up
by virtue of the LAGs coming up. OSPF sends grace LSAs to inform its OSPF
neighbors (the aggregation routers) that it is going through a graceful restart.
NOTE: The graceful restart feature for OSPF is disabled by default. For information
about the web pages and commands to configure NSF for OSPF or OSPFv3, see
"Configuring OSPF and OSPFv3" on page 931.
The grace LSAs reach the neighbors before they drop their adjacencies with
the access router. PIM starts sending hello messages to its neighbors on the
aggregation routers using a new generation ID to prompt the neighbors to
quickly resend multicast routing information. PIM neighbors recognize the
new generation ID and immediately relay the group state back to the
restarting router. IGMP sends queries to relearn the hosts' interest in
multicast groups. IGMP tells PIM the group membership, and PIM sends
AAA Overview
AAA is a framework for configuring management security in a consistent way.
Three services make up AAA:
• Authentication—Validates the user identity. Authentication takes place
before the user is allowed access to switch services.
• Authorization—Determines which services the user is allowed to access.
• Accounting—Collects and sends security information about users and
commands.
Methods
A method performs the configured service. Not every method is available for
every service. Some methods require a username and password and other
methods only require a password. Table 10-1 summarizes the various
methods:
Methods that never return an error cannot be followed by any other methods
in a method list.
• The enable method uses the enable password. If there is no enable
password defined, then the enable method will return an error.
Access Lines
There are five access lines: console, telnet, SSH, HTTP, and HTTPS. HTTP
and HTTPS are not configured using AAA method lists. Instead, the
authentication list for HTTP and HTTPS is configured directly
(authorization and accounting are not supported). The default method lists
for both the HTTP and HTTPS access lines consist of only the local method.
Each of the other access lines may be assigned method lists independently for
the AAA services.
Authentication
Authentication is the process of validating a user's identity. During the
authentication process, only identity validation is done. There is no
determination made of which switch services the user is allowed to access.
This is true even when RADIUS is used for authentication; RADIUS cannot
perform separate transactions for authentication and authorization. However,
the RADIUS server can provide attributes during the authentication process
that are used in the authorization process.
There are three types of authentication:
Authorization
Authorization is used to determine which services the user is allowed to
access. For example, the authorization process may assign a user’s privilege
level, which determines the set of commands the user can execute. There are
three kinds of authorization: commands, exec, and network.
• Commands: Command authorization determines which CLI commands
the user is authorized to execute.
• Exec: Exec authorization determines what the user is authorized to do on
the switch; that is, the user’s privilege level and an administrative profile.
Privilege Level
By setting the privilege level during exec authorization, a user can be placed
directly into Privileged EXEC mode when they log into the command line
interface.
Administrative Profiles
The Administrative Profiles feature allows the network administrator to
define a list of rules that control the CLI commands available to a user. These
rules are collected in a “profile.” The rules in a profile can define the set of
commands, or a command mode, to which a user is permitted or denied
access.
Within a profile, rule numbers determine the order in which the rules are
applied. When a user enters a CLI command, rules within the first profile
assigned to the user are applied in descending order until there is a rule that
matches the input. If no rule permitting the command is found, then the
other profiles assigned to the user (if any) are searched for rules permitting
the command. Rules may use regular expressions for command matching. All
Accounting
Accounting is used to record security events, such as a user logging in or
executing a command. Accounting records may be sent upon completion of
an event (stop-only) or at both the beginning and end of an event (start-
stop). There are three types of accounting: commands, dot1x, and exec.
• Commands—Sends accounting records for command execution.
• Dot1x—Sends accounting records for network access.
• Exec—Sends accounting records for management access (logins).
For more information about the data sent in accounting records, see "Which
RADIUS Attributes Does the Switch Support?" on page 194 and "Using
TACACS+ Servers to Control Management Access" on page 197.
Table 10-4 shows the valid methods for each type of accounting:
Authentication Examples
It is important to understand that during authentication, all that happens is
that the user is validated. If any attributes are returned from the server, they
are not processed during authentication. In the examples below, it is assumed
that the default configuration of authorization—that is, no authorization—is
used.
NOTE: A user logging in with this configuration would be placed in User EXEC
mode with privilege level 1. To access Privileged EXEC mode with privilege level 15,
use the enable command.
Notes:
• If the privilege level is zero (that is, blocked), then authorization will fail
and the user will be denied access to the switch.
• If the privilege level is higher than one, the user will be placed directly in
Privileged EXEC mode. Note that all commands in Privileged EXEC mode
require privilege level 15, so assigning a user a lower privilege level will be
of no value.
• A privilege level greater than 15 is invalid and treated as if privilege level
zero had been supplied.
• The shell service must be enabled on the TACACS+ server. If this service
is not enabled, authorization will fail and the user will be denied access to
the switch.
NOTE: If the priv-lvl attribute is also supplied, the user can also be placed directly
into privileged EXEC mode.
Notes:
• If the privilege level is zero (that is, blocked), then authorization will fail
and the user will be denied access to the switch.
• If the privilege level is higher than one, the user will be placed directly in
Privileged EXEC mode. Note that all commands in Privileged EXEC mode
require privilege level 15, so assigning a user a lower privilege level will be
of no value.
• A privilege level greater than 15 is invalid and treated as if privilege level
zero had been supplied.
PowerConnect Switch
Management
Network `
Management Host
The server can authenticate the user itself or make use of a back-end device to
ascertain authenticity. In either case a response may or may not be
forthcoming to the client. If the server accepts the user, it returns a positive
result with attributes containing configuration information. If the server
rejects the user, it returns a negative result. If the server rejects the client or
the shared secrets differ, the server returns no result. If the server requires
additional verification from the user, it returns a challenge, and the request
process begins again.
PowerConnect Switch
Management
Network `
Management Host
You can configure the TACACS+ server list with one or more hosts defined
via their network IP address. You can also assign each a priority to determine
the order in which the TACACS+ client will contact them. TACACS+
contacts the server when a connection attempt fails or times out for a higher
priority server.
Administrative Profiles
The administrative profiles shown in Table 10-10 are system-defined and may
not be deleted or altered. To see the rules in a profile, use the show admin-
profiles name profile name command.
Name Description
network-admin Allows access to all commands.
network-security Allows access to network security features such as 802.1X,
Voice VLAN, Dynamic ARP Inspection and IP Source
Guard.
router-admin Allows access to Layer 3 features such as IPv4 Routing, IPv6
Routing, OSPF, RIP, etc.
multicast-admin Allows access to multicast features at all layers, this includes
L2, IPv4 and IPv6 multicast, IGMP, IGMP Snooping, etc.
dhcp-admin Allows access to DHCP related features such as DHCP
Server and DHCP Snooping.
Name Description
CP-admin Allows access to the Captive Portal feature.
network-operator Allows access to all User EXEC mode commands and show
commands.
When you specify the severity level, messages with that severity level and
higher are sent to the log file. For example, if you specify the severity level as
critical, messages with a severity level of alert and emergency are also logged.
When you specify the severity level in a CLI command, you can use the
keyword or the numerical level.
• PRI—This consists of the facility code (see RFC 3164) multiplied by 8 and
added to the severity. The log messages use the local7 facility code (23).
This implies that a message of severity 0 will have a priority of 184 and a
message of severity 7 will have a priority of 191.
• Timestamp—This is the system up time. For systems that use SNTP, this
is UTC. When time zones are enabled, local time will be used.
• Host IP address—This is the IP address of the local system.
• Stack ID —This is the assigned stack ID. For the PowerConnect 8000-
series and 8100-series switches, the Stack ID number is always 1.
• Component name—The component name for the logging component.
Component “UNKN” is substituted for components that do not identify
themselves to the logging component.
• Thread ID—The thread ID of the logging component.
• File name —The name of the file containing the invoking macro.
Device Information
The Device Information page displays after you successfully log on to the
switch by using the Dell OpenManage Switch Administrator. This page is a
virtual representation of the switch front panel. Use the Device Information
page to view information about the port status or system status. Click on a
port to access the Port Configuration page for the selected port.
To display the Device Information page, click Home in the navigation panel.
For more information about the device view features, see "Understanding the
Device View" on page 106.
NOTE: Optical transceiver diagnostics can be performed only when the link is
present.
NOTE: When you select a severity level, all higher severity levels are
automatically selected.
6 Click Apply.
Click the Show All link to view or remove remote log servers configured on
the system.
4 Click Apply.
5 If desired, click Configuration to return to the Email Alert Mail Server
Configuration page to specify port and security settings for the mail server.
Click the Show All link to view or remove mail servers configured on the
switch.
To view all configured email alert subjects, click the Show All link.
Command Purpose
show system Display various system information.
show system power Displays the power supply status.
show system Displays the system temperature and fan status.
temperature
show memory cpu Displays the total and available RAM space on the switch.
show process cpu Displays the CPU utilization for each process currently
running on the switch.
NOTE: Cable diagnostics may give misleading results if green mode is enabled
on the port. Disable green mode prior to running any cable diagnostics.
Command Purpose
configure Enter Global Configuration mode.
logging on Globally enables logging.
logging audit Enable switch auditing.
logging cli-command Enable CLI command logging
logging web-sessions Enable logging of the switch management Web page visits.
logging snmp Enable logging of SNMP set commands.
Command Purpose
configure Enter Global Configuration mode.
logging {ip-address| Define a remote log server and enter the configuration
hostname} mode for the specified log server.
description description Describe the log server. Use up to 64 characters. If the
description includes spaces, surround it with quotation
marks.
level severity Specify the severity level of the logs that should be sent to
the remote log server. For information about severity
levels, see Table 11-1.
port udp-port Specify the UDP port to use for sending log messages. The
range is 1 to 65535, and the default is 514.
CTRL + Z Exit to Privileged EXEC mode.
show syslog-servers Verify the remote log server configuration.
Command Purpose
configure Enter Global Configuration mode.
mail-server ip-address Specify the IP address of the SMTP server on the network
and enter the configuration mode for the mail server.
security {tlsvl|none} (Optional) Specify the security protocol to use with the
mail server.
port {25|465} Configure the TCP port to use for SMTP, which can be 25
(SMTP) or 465 (SMTP over SSL).
username username If the SMTP server requires authentication, specify the
username to use for the switch.
The same username and password settings must be
configured on the SMTP host.
password password If the SMTP server requires authentication from clients,
specify the password to associate with the switch
username.
CTRL + Z Exit to Privileged EXEC mode.
show mail-server all View mail server configuration information for all
config configured mail servers.
Command Purpose
configure Enter Global Configuration mode.
logging email [severity] Enable email alerting and determine which non-critical log
messages should be emailed. Including the severity value
sets the lowest severity for which log messages are emailed.
These messages are collected and sent in a single email at
the configured log duration.
severity — (Optional) Enter the number or name of the
severity level for non-critical messages. Log messages at or
above this severity level are emailed. For information about
severity levels, see Table 11-1. Log messages below the
specified level are not emailed.
logging email urgent Determine which log messages are critical and should be
{severity | none} sent in a single email as soon as they are generated.
severity — (Optional) Enter the number or name of the
severity level for critical messages. For information about
severity levels, see Table 11-1.
logging email logtime Specify how often to send the non-critical email alerts that
minutes have been collected. . The valid range is 30 - 1440 minutes.
logging email message- Specify the email address of the recipient for log messages.
type {urgent | non-
urgent | both} to-addr
email-address
logging email from-addr Specify the email address of the sender, which is the
email-address switch.
logging email message- Specify the text that will appear in the subject line of email
type {urgent | non- alerts sent by the switch.
urgent | both} subject
subject
5 Verify the local logging configuration and view the log messages stored in
the buffer (RAM log).
console#show logging
Logging is enabled
Console Logging: level debugging. Console
Messages: 748 Dropped.
Buffer Logging: level notifications. Buffer
Messages: 79 Logged,
File Logging: level critical. File Messages: 973
Dropped.
CLI Command Logging : enabled
Switch Auditing : enabled
Web Session Logging : disabled
SNMP Set Command Logging : disabled
Syslog server 192.168.2.10 logging: debug.
Messages: 0 dropped
412 Messages dropped due to lack of resources.
Buffer Log:
<186> FEB 02 05:53:03 0.0.0.0-1 UNKN[1073741088]:
bootos.c(232) 1 %% Event(0xaaaaaaaa)
<189> FEB 02 05:53:03 0.0.0.0-1 UNKN[1073741088]:
bootos.c(248) 2 %% Starting code... BSP
initialization complete, starting application.
--More-- or (q)uit
Feature Description
System Name The switch name (host name). If you change the system name,
the CLI prompt changes from console to the system name.
System contact Identifies the person to contact for information regarding the
switch.
System location Identifies the physical location of the switch.
Asset tag Uniquely identifies the switch. Some organizations use asset tags
to identify, control, and track each piece of equipment.
CLI Banner Displays a message upon connecting to the switch or logging on
to the switch by using the CLI.
SDM Template Determines the maximum resources a switch or router can use
for various features. For more information, see "What Are SDM
Templates?" on page 239
Feature Description
SNTP Controls whether the switch obtains its system time
from an SNTP server and whether communication
with the SNTP server requires authentication and
encryption. You can configure information for up to
eight SNTP servers. The SNTP client on the switch can
accept updates from both IPv4 and IPv6 SNTP servers.
Real time clock (RTC) If SNTP is disabled, you can manually enter the system
time and date.
Time Zone Allows you to specify the offset from Coordinated
Universal Time (UTC), which is also known as
Greenwich Mean Time (GMT).
Summer Time In some regions, the time shifts by one hour in the fall
and spring. In the United States, this is called daylight
saving time.
System Information
Use the System Information page to configure the system name, contact
name, location, and asset tag.
NOTE: From the System Information page, you can also initiate a Telnet session
to the switch.
NOTE: The Telnet client feature does not work with Microsoft Windows Internet
Explorer 7 and later versions. Initiating this feature from any browser running on
a Linux operating system is not supported.
The selected Telnet client launches and connects to the switch CLI.
NOTE: The system time cannot be set manually if the SNTP client is enabled. Use
the SNTP Global Settings page to enable or disable the SNTP client.
NOTE: The SNTP server must be configured with the same authentication
information to allow time synchronization to take place between the two devices.
SNTP Server
Use the SNTP Server page to view and modify information about SNTP
servers, and to add new SNTP servers that the switch can use for time
synchronization. The switch can accept time information from both IPv4 and
IPv6 SNTP servers.
To display the SNTP Server page, click System → Time Synchronization →
SNTP Server in the navigation panel. If no servers have been configured, the
fields in the following image are not displayed.
3 In the SNTP Server field, enter the IP address or host name for the new
SNTP server.
4 Specify whether the information entered in the SNTP Server field is an
IPv4 address, IPv6 address, or a hostname (DNS).
5 If you require authentication between the SNTP client on the switch and
the SNTP server, select the Encryption Key ID check box, and then select
the key ID to use.
To define a new encryption key, see "Adding an SNTP Authentication Key"
on page 248.
NOTE: The SNTP server must be configured with the same authentication
information to allow time synchronization to take place between the two
devices.
NOTE: The fields on the Summer Time Configuration page change when you
select or clear the Recurring check box.
To use the preconfigured summer time settings for the United States or
European Union, select the Recurring check box and specify USA or EU from
the Location menu.
Command Purpose
configure Enter Global Configuration mode.
hostname name Configure the system name. The CLI prompt changes to
the host name after you execute the command.
snmp-server contact Configure the name of the switch administrator. If the
name name contains a space, use quotation marks around the
name.
snmp-server location Configure the switch location.
location
asset-tag tag Configure the asset tag for the switch.
CTRL + Z Exit to Privileged EXEC mode.
show system [id] Display system information. Include the id keyword to
display additional system information.
Command Purpose
configure Enter Global Configuration mode.
banner Configure the banner message that displays when you
{motd|login|exec} text connect to the switch (motd and login) or enter User
EXEC mode (exec).
Use quotation marks around a message if it includes
spaces.
line Enter the terminal line configuration mode for Telnet,
{telnet|ssh|console} SSH, or the console.
motd-banner Specify that the configured MOTD banner displays. To
prevent the banner from displaying, enter no motd-
banner.
exec-banner Specify that the configured exec banner displays. To
prevent the banner from displaying, enter no exec-banner.
login-banner Specify that the configured login banner displays. To
prevent the banner from displaying, enter no login-banner.
CTRL + Z Exit to Privileged EXEC mode.
show banner Display the banner status on all line terminals.
Command Purpose
configure Enter Global Configuration mode.
sdm prefer {dual-ipv4- Select the SDM template to apply to the switch after the
and-ipv6 default| ipv4- next boot.
routing {data-center |
default}}
CTRL + Z Exit to Privileged EXEC mode.
show sdm prefer View information about the SDM template the switch is
[template] currently using. Use the template variable to view the
parameters for the specified template.
Command Purpose
configure Enter Global Configuration mode.
sntp authentication-key Define an authentication key for SNTP. The variables are:
key_id md5 key_word • key_id— The encryption key ID, which is a number from
1–4294967295.
• key_word—The authentication key, which is a string of
up to eight characters.
Command Purpose
clock set {mm/dd/yyyy Configure the time and date. You can enter the time first
hh:mm:ss} | and then the date, or the date and then the time.
{hh:mm:ss • hh:mm:ss —Time in hours (24-hour format, from 01-24),
mm/dd/yyyy minutes (00-59), and seconds (00-59).
• mm/dd/yyyy — Two digit month (1-12), two-digit date of
the month (01-31), and four-digit year.
clock timezone hours- Configure the time zone settings.
offset hours-offset • hours-offset — Hours difference from UTC. (Range: –12 to
[minutes minutes- +13)
offset] [zone acronym]
• minutes-offset — Minutes difference from UTC. (Range:
0–59)
• acronym — The acronym for the time zone. (Range: Up to
four characters)
clock summer-time Use this command if the summer time starts and ends every
recurring {usa | eu | year based on a set pattern.
{week day month For switches located in the United States or European
hh:mm week day Union, use the usa or eu keywords to use the preconfigured
month hh:mm}} values. Otherwise, configure the start and end times by using
[offset offset] [zone the following values:
acronym]
• week — Week of the month. (Range: 1–5, first, last)
• day — Day of the week. (The first three letters by name)
• month — Month. (The first three letters by name; jan, for
example.)
• hh:mm — Time in 24-hour format in hours and minutes.
(Range: hh: 0–23, mm: 0–59)
• offset — Number of minutes to add during the
summertime. (Range:1–1440)
• acronym — The acronym for the time zone to be displayed
when summertime is in effect. (Up to four characters)
Command Purpose
show slot Display status information about the expansion slots.
show supported cardtype Display information about the modules the switch
supports.
Temperature Sensors:
Fans:
Unicast servers:
Server Key Polling Priority
------------ ----------- --------- --------
192.168.10.30 23456465 Enabled 1
Unicast servers:
Server Status Last response
--------------- ------------ ---------------------
192.168.10.30 Other 09:12:43 Mar 1 2011
Time zone:
Acronym is EST
Offset is UTC-5:00
Summertime:
Acronym not configured
Recurring every year (USA)
Begins on second Sunday of Mar at 02:00
Ends on first Sunday of Nov at 02:00
Offset is +60 minutes
SNMP Overview
Simple Network Management Protocol (SNMP) provides a method for
managing network devices. The PowerConnect 8000-series and 8100-series
switches support SNMP version 1, SNMP version 2, and SNMP version 3.
What Is SNMP?
SNMP is a standard protocol that enables remote monitoring and
management of a device through communication between an SNMP
manager and an SNMP agent on the remote device. The SNMP manager is
typically part of a Network Management System (NMS) that runs on an
administrative host. The switch software includes Management Information
Base (MIB) objects that the SNMP agent queries and modifies. The switch
uses standard public MIBs and private MIBs.
A MIB acts as a structured road map for managed objects. A managed object
is any feature or setting that can be configured or monitored on the switch.
An Object Identifier (OID) is the unique number assigned to an object
defined in a MIB. An OID is written as a sequence of subidentifiers in
decimal notation.
Table 13-2 describes the two views that are defined by default.
By default, three groups are defined. Table 13-3 describes the groups. The
Read, Write, and Notify values define the preconfigured views that are
associated with the groups.
NOTE: For some features, the control to enable or disable traps is available from
a configuration page for that feature and not from the Trap Manager pages that
this chapter describes.
3 Specify a name for the view and a valid SNMP OID string.
4 Select the view type.
5 Click Apply.
The SNMP view is added, and the device is updated.
Click Show All to view information about configured SNMP Views.
NOTE: You can also use the Local User Database page under Management
Security to configure SNMPv3 settings for users. For more information, see
"Configuring Authentication, Authorization, and Accounting" on page 177.
To display the User Security Model page, click System → SNMP → User
Security Model in the navigation panel.
3 Specify the name of the filter, the OID for the filter.
4 Choose whether to send (include) traps or informs to the trap recipient or
prevent the switch from sending (exclude) the traps or informs.
5 Click Apply to update the switch.
Click Show All to view information about the filters that have already been
configured.
Notification Recipients
Use the Notification Recipients page to view information for defining filters
that determine whether traps are sent to specific users, and the trap type sent.
SNMP notification filters provide the following services:
• Identifying Management Trap Targets
• Trap Filtering
• Selecting Trap Generation Parameters
• Providing Access Control Checks
To display the Notification Recipients page, click System → SNMP →
Notification Recipient in the navigation panel.
Command Purpose
configure Enter Global Configuration mode
snmp-server engineID Configure the SNMPv3 Engine ID.
local {engineid-string | • engineid-string — The character string that identifies the
default} engine ID. The engine ID is a concatenated hexadecimal
string. Each byte in hexadecimal character strings is two
hexadecimal digits. Each byte can be separated by a
period or colon. (Range: 6-32 characters)
• default — The engineID is created automatically, based
on the device MAC address.
exit Exit to Privileged EXEC mode.
show snmp engineid View the local SNMP engine ID.
Command Purpose
configure Enter Global Configuration mode
snmp-server view view- Configure the SNMP view. When you configure groups,
name oid-tree {included users, and communities, you can specify a view to associate
| excluded} with the group, user, or community
• view-name — Specifies the name of the view. (Range: 1-
30 characters.)
• oid-tree — Specifies the object identifier of the ASN.1
subtree to be included or excluded from the view. To
identify the subtree, specify a text string consisting of
numbers, such as 1.3.6.2.4, or a word, such as
system. Replace a single subidentifier with the asterisk
(*) wildcard to specify a subtree family; for example
1.3.*.4.
• included — Indicates that the view type is included.
• excluded — Indicates that the view type is excluded.
Configuring Communities
Beginning in Privileged EXEC mode, use the following commands to
configure access rights for SNMPv1 and SNMPv2.
Command Purpose
configure Enter Global Configuration mode
snmp-server community Configure the community string and specify access criteria
string [ro | rw | su] for the community.
[view view-name] • community-string — Acts as a password and is used to
[ipaddress ip_address] authenticate the SNMP management station to the
switch. The string must also be defined on the NMS in
order for the NMS to access the SNMP agent on the
switch (Range: 1-20 characters)
• ro — Indicates read-only access
• rw — Indicates read-write access.
• view-name — Specifies the name of a previously defined
MIB view.
• ip_address — Specifies the IP address of the management
station. If no IP address is specified, all management
stations are permitted
Command Purpose
configure Enter Global Configuration mode
snmp-server enable traps Specify the traps to enable. The captive portal, OSPF and
[acl | all | auto-copy-sw OSPFv3 traps include several different traps that can be
| captive-portal cp-type enabled. For more information, use the CLI command
| dot1q | dvrmp | link | help or see the CLI Command Reference.
maclock | multiple-
users | ospf ospftype |
ospfv3 ospfv3type | pim
| poe | snmp
authentication |
spanning-tree | vrrp]
snmp-server filter filter- Configure a filter for SNMP traps and informs based on
name oid-tree {included OIDs. Each OID is linked to a device feature or a feature
| excluded} aspect.
• filter-name — Specifies the label for the filter record that
is being updated or created. The name is used to
reference the record. (Range: 1-30 characters.)
• oid-tree — Specifies the object identifier of the ASN.1
subtree to be included or excluded from the view. To
identify the subtree, specify a text string consisting of
numbers, such as 1.3.6.2.4, or a word, such as
system. Replace a single subidentifier with the asterisk
(*) wildcard to specify a subtree family; for example,
1.3.*.4.
• included — Indicates that the filter type is included.
• excluded — Indicates that the filter type is excluded.
Version 3 notifications
Target Addr. Type Username Security UDP Filter TO Retries
Level Port Name Sec
------------ ---- --------- ------- ----- ----- --- -------
System Contact:
System Location:
Configuring SNMPv3
This example shows how to complete a basic SNMPv3 configuration. The
commands create a view that includes objects from the internet MIB subtree
(OID 1.3.6.1), which includes all objects on the switch.
The user named admin has read-write privileges to all objects within the view
(in other words, all objects on the switch) after supplying the appropriate
authentication credentials (secretkey).
To configure the switch:
1 Configure the view. view_snmpv3 and specify the objects to include.
console#configure
console(config)#snmp-server view view_snmpv3
internet included
2 Create the group group_snmpv3 and allow read-write access to the view
configured in the previous step.
console(config)#snmp-server group group_snmpv3 v3
auth read view_snmpv3 write view_snmpv3
Version 3 notifications
Target Addr. Type Username Security UDP Filter TO Retries
Level Port Name Sec
------------ ---- --------- ------- ----- ----- --- -------
192.168.3.35 Trap admin Auth-NoP 162 15 3
System Contact:
System Location:
NOTE: For information about the Auto Configuration feature that enables the
switch to automatically upgrade the image or load a new configuration file during
the boot process, see Automatically Updating the Image and Configuration.
Image Files
The switch can store two firmware images, but only one is active. The other
image file is a backup image. By default, the switch has only one image. You
might copy an image or download an image to the switch for the following
reasons:
• To create a backup image
• To upgrade the firmware as new images become available
Configuration Files
Configuration files contain the CLI commands that change the switch from
its default configuration. The switch can maintain three separate
configuration files: startup-config, running-config, and backup-config. The
switch loads the startup-config file when the switch boots. Any configuration
NOTE: You must use the CLI to manage configuration scripts. The configuration
scripting feature is not available from the web interface.
When you apply (run) a configuration script on the switch, the commands in
the script are executed in the order in which they are written as if you were
typing them into the CLI. The commands that are executed in the
configuration script are added to the running-config file.
You might upload a configuration file from the switch to a remote server for
the following reasons:
• To create a backup copy
• To use the configuration file on another switch
• To manually edit the file
You might download a configuration file from a remote server to the switch
for the following reasons:
• To restore a previous configuration
• To load the configuration copied from another switch
• To load the same configuration file on multiple switches
Use a text editor to open a configuration file and view or change its contents.
SSH/SSL Files
If you use OpenManage Switch Administrator to manage the switch over an
HTTPS connection, you must copy the appropriate certificate files to the
switch. If you use the CLI to manage the switch over an SSH connection, you
must copy the appropriate key files to the switch.
Managing Images
When you download a new image to the switch, it overwrites the backup
image, if it exists. To use the new image, you must activate it and reload the
switch. The image that was previously the active image becomes the backup
image after the switch reloads. If you upgrade to a newer image and find that
it is not compatible with your network, you can revert to the original image.
If you activate a new image and reload the switch, and the switch is unable to
complete the boot process due to a corrupt image or other problem, you can
use the boot menu to activate the backup image. You must be connected to
File System
Use the File System page to view a list of the files on the device and to modify
the image file descriptions.
To display the File System page, click System → File Management → File
System in the navigation panel.
NOTE: On the 8000-series switches, the images are named image1 and image2.
On the 8100-series switches, the images are named active and backup.
Downloading Files
To download a file to the switch:
1 Open the File Download page.
2 Select the type of file to download to the switch.
3 Select the transfer mode.
NOTE: If you are using HTTPS to manage the switch, the download method
will be HTTPS.
4 To download using HTTP, click Browse and select the file to download,
then click Apply.
5 To download using any method other than HTTP, enter the IP address of
the server that contains the file to download, the name of the file and the
path on the server where it is located. For SFTP and SCP, provide the user
name and password.
6 Click Apply to begin the download.
NOTE: After you start a file download, the page refreshes and a transfer
status field appears to indicate the number of bytes transferred. The web
interface is blocked until the file download is complete.
Uploading Files
To upload a file from the switch to a remote system:
1 Open the File Upload page.
2 Select the type of file to download to the remote server.
3 Select the transfer mode.
If you select a transfer mode that requires authentication, additional fields
appear in the Upload section. If you select HTTP as the upload method,
some of the fields are hidden.
4 To upload by using HTTP, click Apply. A dialog box opens to allow you to
open or save the file.
5 To upload by using any method other than HTTP, enter the IP address of
the server and specify a name for the file. For SFTP and SCP, provide the
user name and password.
6 Click Apply to begin the upload.
NOTE: For some file uploads and methods, the page refreshes and a
transfer status field appears to indicate the number of bytes transferred. The
web interface is blocked until the file upload is complete.
NOTE: Upload, download, and copy functions use the copy command. The basic
syntax for the command is copy source destination. This section shows several
different ways to use the copy command.
Command Purpose
copy tftp://{ip-address| Use TFTP to download the firmware image at the
hostname}/path/file- specified source to the non-active image.
name image If the image file is in the TFTP file system root (download
path), you do not need to specify the path in the
command.
show bootvar View the name of the image that is currently active
(image1 or image2).
filedescr {image1 | Add a description to the image files.
image2} description
boot system {image1 | Set the image to use as the boot (active) image after the
image2} switch resets. Images on the PC8132/PC8164 are named
active and backup.
reload Reboot the switch to make the new image the active
image.
You are prompted to verify that you want to continue.
Command Purpose
dir List the files in the flash file system.
rename current_name Rename a file in flash.
new_name
delete filename Remove the specified file.
erase {startup-config | Erase the startup configuration, the backup configuration
backup-image | backup- or the backup image.
config}
copy startup-config Save the startup configuration to the backup configuration
backup-config file.
copy running-config Copy the current configuration to the startup
startup-config configuration. This saves the current configuration to
NVRAM.
show startup-config View the contents of the startup-config file
show running-config View the contents of the running-config file
Command Purpose
show usb device Display USB flash device details
dir usb Display USB device contents and memory statistics
copy usb://filename Copy the specified file from the USB flash device to the
{backup-config | image specified file in internal flash.
| running-config | script
filename| startup-config
| filename
unmount usb Make the USB flash device inactive.
Command Purpose
copy file scp://user@{ip- Adds a description to an image file.
address|hostname}/path The file can be one of the following files:
/file-name
• backup-config
• image
• operational-log
• running-config
• script file-name
• startup-config
• startup-log
Password entry After you enter the copy command, the CLI prompts you
for the password associated with the username.
Command Purpose
copy sftp://user@{ip- Downloads the specified script from the remote server to
address|hostname}/path the switch.
/file-name script dest-
name
Password entry After you enter the copy command, the CLI prompts you
for the password associated with the username.
script validate script- Checks the specified script for syntax errors.
name The script is automatically validated when you download it
to the switch. You can validate again with this command.
script list View the list of available scripts.
script activate script- Executes the commands within the script in order. The
name configuration changes in the script are applied to the
running configuration.
script show script-name View the contents of the specified script.
image1 :
image2 :
4 Download the image to the switch. After you execute the copy command,
you must verify that you want to start the download.
console#copy
tftp://10.27.65.103/images/dell_0308.stk image
Mode........................................... TFTP
Set TFTP Server IP............................. 10.27.65.103
TFTP Path...................................... images/
TFTP Filename.................................. dell_0308.stk
Data Type...................................... Code
Destination Filename........................... image
image1 :
image2 :
Configuration Saved!
8 Reset the switch to boot the system with the new image.
console#reload
2 Save the file with an *.scr extension and copy it to the appropriate
directory on your TFTP server.
3 Download the file from the TFTP server to the switch.
console#copy tftp://10.27.65.103/labhost.scr
script labhost.scr
Mode........................................... TFTP
Set TFTP Server IP............................. 10.27.65.103
TFTP Path...................................... ./
TFTP Filename.................................. labhost.scr
Data Type...................................... Config Script
Destination Filename........................... labhost.scr
configure
exit
configure
ip host labpc1 192.168.3.56
Mode................................... unknown
Data Type.............................. Code
Mode............................. unknown
Data Type........................ Config Script
Source Filename.................. temp-config.scr
Mode................................... unknown
Data Type.............................. Code
The TFTP client makes three unicast requests. If the unicast attempts fail, or
if the DHCP OFFER did not specify a TFTP server address, the TFTP client
makes three broadcast requests.
If the DHCP server does not specify a configuration file or download of the
configuration file fails, the Auto Configuration process attempts to download
a configuration file with the name dell-net.cfg. The switch unicasts or
broadcasts TFTP requests for a network configuration file in the same
manner as it attempts to download a host-specific configuration file.
The default network configuration file consists of a set of IP address-to-
hostname mappings, using the command ip host hostname address. The
switch finds its own IP address, as learned from the DHCP server, in the
configuration file and extracts its hostname from the matching command. If
the default network configuration file does not contain the switch's IP
address, the switch attempts a reverse DNS lookup to resolve its hostname.
A sample dell-net.cfg file follows:
config
...
ip host switch1 192.168.1.10
ip host switch2 192.168.1.11
... <other hostname definitions>
exit
Once a hostname has been determined, the switch issues a TFTP request for
a file named hostname.cfg , where hostname is the first thirty-two
characters of the switch's hostname.
If the switch is unable to map its IP address to a hostname, Auto
Configuration sends TFTP requests for the default configuration file
host.cfg.
Table 15-2 displays the determining factors for issuing unicast or broadcast
TFTP requests.
Saving a Configuration
The Auto Configuration feature includes an AutoSave capability that allows
the downloaded configuration to be automatically saved; however, AutoSave
is disabled by default. If AutoSave has not been enabled, you must explicitly
save the downloaded configuration in nonvolatile memory on the stack
master. This makes the configuration available for the next reboot. In the
CLI, this is performed by issuing a write command or copy running-config
startup-config command and should be done after validating the contents of
saved configuration.
Auto-Install Configuration
Use the Auto-Install Configuration page to allow the switch to obtain
network information (such as the IP address and subnet mask) and
automatically download a host-specific or network configuration file during
the boot process if no startup-config file is found.
To display the Auto Configuration page, click System → General → Auto-
Install Configuration in the navigation panel.
NOTE: The Auto Configuration feature begins automatically when the switch is
booted and no startup-config file is found or if the system boots and finds the
boot host dhcp command in the startup-config file.
Command Purpose
configure Enter Global Configuration mode.
boot autoinstall start Enable the Auto Configuration feature on the switch.
boot host dhcp Enable Auto Configuration for the next reboot cycle. The
command does not change the current behavior of Auto
Configuration, but it does save the command to NVRAM.
boot host autosave Allow the switch to automatically save the configuration file
downloaded to the switch by the Auto Configuration feature.
boot host retrycount Specify the number of attempts to download the file (by
retries sending unicast TFTP requests, and if unsuccessful,
broadcast TFTP requests) specified in the response from the
DHCP server.
The range for retries is 1–3.
boot host autoreboot Allow the switch to automatically reboot when the image is
successfully downloaded through the Auto Configuration
feature.
exit Exit to Privileged Exec mode.
show boot Displays the current status of the Auto Configuration process.
What is RMON?
Like sFlow, RMON is a technology that enables the collection and analysis of
a variety of data about network traffic. PowerConnect 8000-series and 8100-
series switches software includes an RMON probe (also known as an RMON
agent) that collect information and analyze packets. The data that is
collected is defined in the RMON MIB, RFC 2819.
RMON is defined in an Internet Engineering Task Force (IETF) specification
and is an extension of the SNMP MIB. You can view the RMON information
locally on the switch or by using a generic RMON console on a network
management station (NMS). SNMP does not need to be configured on the
switch to view the RMON data locally. However, if you use a management
station to view the RMON data that the switch collects and analyzes, you
must configure the following SNMP settings:
• Set up the SNMP community string to be used by the SNMP manager at a
given IP address.
• Specify the network management system IP address or permit
management access from all IP addresses.
For more information about configuring SNMP, see "Configuring SNMP" on
page 271.
NOTE: You can create a DiffServ policy class definition that mirrors specific types
of traffic to a destination port. For more information, see "Configuring Differentiated
Services" on page 1103.
Click Show All to view information about configured sampler data sources.
Click Show All to view information about the ports configured to collect
counter samples.
3 If the event sends an SNMP trap, specify the SNMP community to receive
the trap.
4 Optionally, provide a description of the event and the name of the event
owner.
5 Select an event type.
6 Click Apply.
The event is added to the RMON Event Table, and the device is updated.
3. Complete the fields on this page as needed. Use the help menu to learn
more information about the data required for each field.
4. Click Apply.
The RMON alarm is added, and the device is updated.
To view configured alarm entries, click the Show All tab. The Alarms Table
displays. From this page, you can remove configured alarms.
To chart port statistics, select the type of statistics to chart and (if desired)
the refresh rate, then click Draw.
To chart LAG statistics, select the type of statistics to chart and (if desired)
the refresh rate, then click Draw.
5 Click Apply.
6 Repeat the previous steps to add additional source ports.
7 Click Port Mirroring to return to the Port Mirroring page.
8 Enable the administrative mode and specify the destination port.
9 Click Apply.
Configuring sFlow
Beginning in Privileged EXEC mode, use the following commands to
configure the sFlow receiver and to configure the sampling and polling on
switch interfaces.
Command Purpose
configure Enter Global Configuration mode
sflow rcvr_index Configure the address of the sFlow receiver and
destination ip-address (optionally) the destination UDP port for sFlow
[port] datagrams.
• rcvr_index—The index of this sFlow receiver (Range:
1–8).
• ip-address—The sFlow receiver IP address.
• port —The destination Layer 4 UDP port for sFlow
datagrams. (Range: 1–65535).
sflow rcvr_index Specify the identity string of the receiver and set the
destination owner receiver timeout value.
owner_string timeout timeout—The number of seconds the configuration will
timeout be valid before it is automatically cleared. A value of 0
essentiality means the receiver is not configured.
sflow rcvr_index Specify the maximum number of data bytes that can be
maxdatagram size sent in a single sample datagram.
The receiver should also be set this value to avoid
fragmentation of the sFlow datagrams. (Range: 200–9116
bytes).
Configuring RMON
Beginning in Privileged EXEC mode, use the following commands to
configure RMON alarms, collection history, and events. The table also lists
the commands you use to view information collected by the RMON probe.
Command Purpose
configure Enter Global Configuration mode
rmon event number Configure an RMON event.
[log] [trap community] • number — The event index. (Range: 1–65535)
[description string]
[owner string] • log — Specify that an entry is made in the log table for
each event.
• trap community — If the event is an SNMP trap to be
sent, it is sent to the SNMP community specified by this
octet string. (Range: 0-127 characters)
• description string — A comment describing this event.
(Range 0-127 characters)
• owner string — Enter a name that specifies who
configured this event. If unspecified, the name is an
empty string.
Viewing Statistics
Use the following commands in Privileged EXEC mode to view statistics
about the traffic handled by the switch.
Command Purpose
show interfaces counters Display the number of octets and packets handled by all
[if_type if_number | interfaces or the specified interface.
port-channel interface]
show statistics Display detailed statistics for a specific port or LAG, or for
{switchport | interface} the entire switch. The interface variable includes the
interface type and number.
show gvrp statistics Displays GVRP statistics for the specified port or LAG.
interface
Command Purpose
configure Enter Global Configuration mode
monitor session Configure a source (monitored) port or CPU interface for
session_number source a monitor session.
interface {cpu | • session_number —The monitoring session ID, which is
interface} [rx | tx] always 1.
• interface—The Ethernet interface to be monitored.
• rx | tx — Monitor ingress (rx) or egress (tx) traffic. If you
not specify, both ingress and egress traffic is monitored.
monitor session Configure a destination (probe) port for a monitor session.
session_number • session_number —The monitoring session ID, which is
destination interface always 1.
interface
• interface—The Ethernet interface to which the
monitored source traffic is copied.
monitor session Enable the administrative mode for the configured port
session_number mode mirroring session to start sending the traffic from the
source port to the destination (probe) port.
exit Exit to Privileged EXEC mode.
show monitor session 1 View information about the configured port mirroring
session.
Configuring sFlow
This example shows how to configure the switch so that ports 10-15 and port
23 send sFlow datagrams to an sFlow receiver at the IP address 192.168.20.34.
The receiver owner is receiver1, and the timeout is 100000 seconds. A counter
sample is generated on the ports every 60 seconds (polling interval), and 1 out
of every 8192 packets is sampled. Note that sFlow monitoring is not enabled
until a receiver owner string is configured.
To configure the switch:
1 Configure information about the sFlow receiver.
console#configure
console(config)#sflow 1 destination 192.168.30.34
console(config)#sflow 1 destination owner
receiver1 timeout 100000
2 Configure the polling and sampling information for tengigabit Ethernet
ports 10-20.
console(config)#sflow 1 polling te1/0/10-15 60
console(config)#sflow 1 sampling te1/0/10-15 8192
3 Configure the polling and sampling information for tengigabit Ethernet
port 23.
console(config)#interface te1/0/23
console(config-if-Te1/0/23)#sflow 1 polling 60
console(config-if-Te1/0/23)#sflow 1 sampling 8192
4 Verify the configured information.
console#show sflow 1 destination
Receiver Index.................... 1
Owner String...................... receiver1
Time out.......................... 99994
IP Address:....................... 192.168.30.34
To add an iSCSI Target, click Add at the top of the page and configure the
relevant information about the iSCSI target.
Command Purpose
configure Enter Global Configuration mode.
iscsi enable Globally enable iSCSI optimization.
iscsi target port tcp-port-1 Configure an iSCSI target port and, optionally,
[tcp-port-2...tcp-port-16] address and name.
[address ip-address] [name • tcp-port-n—TCP port number or list of TCP port
targetname] numbers on which the iSCSI target listens to
requests. Up to 16 TCP ports can be defined in the
system in one command or by using multiple
commands.
• ip-address—IP address of the iSCSI target. When
the no form of this command is used, and the tcp
port to be deleted is one bound to a specific IP
address, the address field must be present.
• targetname—iSCSI name of the iSCSI target. The
name can be statically configured; however, it can be
obtained from iSNS or from sendTargets response.
The initiator must present both its iSCSI Initiator
Name and the iSCSI Target Name to which it wishes
to connect in the first login request of a new session
or connection.
The default target port and IP address criteria is used to determine which
packets are snooped for iSCSI session data (ports 860 and 3260; any IP
address).
3 If the array is a Compellent storage array, execute the Compellent macro
on the ports attached to the array:
console#config
console(config)#macro global apply profile-
compellent-nas $interface_name te1/0/21
console(config)#macro global apply profile-
compellent-nas $interface_name te1/0/22
console(config)#macro global apply profile-
compellent-nas $interface_name te1/0/23
Default Captive Portal Welcome Screen (Displays in Captive Portal User’s Browser)
The Captive Portal feature blocks hosts connected to the switch from
accessing the network until user verification has been established. You can
configure Captive Portal verification to allow access for both guest and
authenticated users. Authenticated users must be validated against a
database of authorized Captive Portal users before access is granted. The
database can be stored locally on the switch or on a RADIUS server.
The user types a name in the Username field, selects the Acceptance Use
Policy check box, and clicks Connect to gain network access. By default, the
user does not need to be defined in a database or enter a password to access
the network because the default verification mode is Guest. Note that
duplicate Username entries can exist in this mode because the client IP and
MAC addresses are obtained for identification.
Table 18-1 shows the default values for the Captive Portal feature.
Feature Value
Global Captive Portal Operational Disabled
Status
Additional HTTP or HTTPS Ports Disabled
Captive Portal can be configured to use an
additional HTTP and/or HTTPS port (in
support of Proxy networks).
Feature Value
Authentication Timeout 300 seconds
Configured Captive Portals 1
Captive Portal Name Default
Protocol Mode HTTP
Verification Mode Guest
URL Redirect Mode Off
User Group 1-Default
Session Timeout 86400 seconds
Local Users None configured
Interface associations None
Interface status Not blocked
If the Captive Portal is blocked, users cannot
gain access to the network through the
Captive Portal. Use this function to
temporarily protect the network during
unexpected events, such as denial of service
attacks.
Supported Captive Portal users 1024
Supported local users 128
Supported Captive Portals 10
NOTE: The image to download must be accessible from your local system.
The image should be 5 KB max, 200x200 pixels, GIF or JPG format.
3 Make sure Download is selected in the Available Images menu, and click
Browse.
NOTE: You can configure the Logout Page settings only if the User Logout
Mode is selected on the Configuration page. The User Logout Mode allows
an authenticated client to deauthenticate from the network.
10 Customize the look and feel of the Logout Page, such as the page title and
logout instructions.
11 Click Apply to save the settings to the running configuration or click
Preview to view what the user will see. To return to the default views, click
Clear.
12 Click the Logout Success Page link to configure the page that contains the
logout window. A user is required to logout only if the User Logout Mode
is selected on the Configuration page.
13 Customize the look and feel of the Logout Page, such as the background
image and successful logout message.
14 Click Apply to save the settings to the running configuration or click
Preview to view what the user will see. To return to the default views, click
Clear.
Local User
You can configure a portal to accommodate guest users and authorized users.
Guest users do not have assigned user names and passwords. Authorized users
provide a valid user name and password that must first be validated against a
local database or RADIUS server. Authorized users can gain network access
once the switch confirms the user’s credentials.
By default, each Captive Portal instance contains the default group. The
default group can be renamed, or a different group can be created and
assigned to each Captive Portal instance. A Captive Portal instance can be
associated to one user group only. A user, however, can be assigned to multiple
groups.
The Local User page allows you to add authorized users to the local database,
which can contain up to 128 user entries. You can also add and delete users
from the local database from the Local User page.
To display the Local User page, click System → Captive Portal → Local User.
NOTE: Multiple user groups can be selected by holding the CTRL key down while
clicking the desired groups.
From the Local User page, click Add to add a new user to the local database.
From the Local User page, click Show All to view summary information
about the local users configured in the local database.
To delete a configured user from the database, select the Remove check box
associated with the user and click Apply.
From the User Group page, click Show All to view summary information
about the user groups configured on the switch.
To delete a configured group, select the Remove check box associated with
the group and click Apply.
NOTE: When you associate an interface with a Captive Portal, the interface is
disabled in the Interface List. Each interface can be associated with only one
Captive Portal at a time.
NOTE: Use the Block and Unblock buttons to control the blocked status. If the
Captive Portal is blocked, users cannot gain access to the network through the
Captive Portal. Use this function to temporarily protect the network during
unexpected events, such as denial of service attacks.
Command Purpose
configure Enter global configuration mode.
captive-portal Enter Captive Portal mode.
http port port-num (Optional) Configure an additional HTTP port for
Captive Portal to monitor. Use this command on networks
that use an HTTP proxy server.
port-num — The port number to monitor (Range:
1–65535, excluding ports 80, 443, and the configured
switch management port).
https port port-num (Optional) Configure an additional HTTPS port for
Captive Portal to monitor. Use this command on networks
that use an HTTPS proxy server.
port-num — The port number to monitor Range:
1–65535, excluding ports 80, 443, and the configured
switch management port).
authentication timeout (Optional) Configure the number of seconds the user has
timeout to enter valid credentials into the verification page. If the
user exceeds the configured timeout, the verification page
needs to be served again in order for the client to gain
access to the network.
timeout — The authentication timeout (Range: 60–600
seconds).
enable Globally enable the Captive Portal feature.
Command Purpose
configure Enter global configuration mode.
captive-portal Enter Captive Portal mode.
configuration cp-id Enter the captive portal instance mode
cp-id — The Captive Portal instance (Range: 1–10). The
Captive Portal configuration identified by CP ID 1 is the
default CP configuration.
name string Add a name to the Captive Portal instance.
string — CP configuration name (Range: 1–32 characters).
protocol {http | https} Specify whether to use HTTP or HTTPs during the
Captive Portal user verification process.
verification {guest | Specify how to process user credentials the user enters on
local | radius} the verification page.
• guest — Allows access for unauthenticated users (users
that do not have assigned user names and passwords).
• local — Authenticates users against a local user database.
• radius — Authenticates users against a remote RADIUS
database.
radius-auth-server name Specify the name of the RADIUS server to use for
RADIUS verification. Use the commands described in
"Using RADIUS Servers to Control Management Access"
on page 192 to configure RADIUS server settings for the
switch.
NOTE: To return the default Captive Portal instance to its default values, use the
clear command in the Captive Portal Instance mode. You must also use the no
interface interface command to remove any associated interfaces from the
instance.
Command Purpose
configure Enter global configuration mode.
captive-portal Enter Captive Portal mode.
user group group-id Configure a group. Each Captive Portal that requires
[name name] authentication has a group associated with it. Only the
users who are members of that group can be authenticated
if they connect to the Captive Portal.
• group-id — Group ID (Range: 1–10).
• name — Group name (Range: 1–32 characters).
user user-id name name Create a new user for the local user authentication
database.
• user-id —User ID (Range: 1–128).
• name —user name (Range: 1–32 characters).
user user-id password Configure the password for the specified user.
password • user-id —User ID (Range: 1–128).
• password —User password (Range: 8–64 characters).
user user-id group group- Associate a group with a Captive Portal user. A user can be
id associated with more than one group.
• user-id — User ID (Range: 1–128).
• group-id — Group ID (Range: 1–10).
user user-id session- Enter the number of seconds to wait before terminating a
timeout timeout session for the specified user. The user is logged out once
the session timeout is reached.
• user-id — User ID (Range: 1–128).
• timeout — Session timeout. 0 indicates timeout not
enforced (Range: 0–86400 seconds)
Command Purpose
show captive-portal Display information about the clients authenticated to all
configuration [cp-id] Captive Portal configurations or a to specific
client status configuration.
cp-id — The Captive Portal instance (Range: 1–10).
show captive-portal Display information about clients authenticated on all
interface interface client interfaces or no a specific interface.
status interface — Specific Ethernet interface, such as te1/0/8.
show captive-portal Display client connection details or a connection summary
client [macaddr] status for connected Captive Portal users.
macaddr — The MAC address of the client.
captive-portal client Deauthenticate a specific captive portal client.
deauthenticate macaddr macaddr — The MAC address of the client.
7. Customize the authentication, logout, and logout success web pages that a
Captive Portal user will see.
Dell recommends that you use Use Dell OpenManage Administrator to
customize the Captive Portal authentication, logout, and logout success
pages. A Preview button is available to allow you to see the pages that a
Captive Portal user will see.
8. If you use the local database for user authentication, configure the users on
the switch.
9. If you use a RADIUS server for authentication, add the users to the
database on the RADIUS server.
10. Associate interfaces with the Captive Portal instances.
11. Globally enable Captive Portal.
NOTE: Captive Portal page customization is supported only through the Web
interface. For information about customizing the Captive Portal pages, see
"Customizing a Captive Portal" on page 411.
Port Overview
A port is a physical interface. Cables physically connect ports on devices such
as PCs or servers to ports on the switch to provide access to the network. The
type of physical ports available on your PowerConnect 8000-series and 8100-
series switches depends on the model.
Feature Description
Administrative status Controls whether the port is administratively
enabled or disabled.
Description Provides a text-based description of the port.
Auto negotiation Enables a port to advertise its transmission rate,
duplex mode and flow control abilities to its
partner.
Feature Description
Speed Specifies the transmission rate for frames.
Duplex mode Specifies whether the interface supports
transmission between the switch and the
connected client in one direction at a time (half)
or both directions simultaneously (both).
Maximum frame size Indicates the maximum frame size that can be
handled by the port.
Flow control This is a global setting that affects all ports. For
more information about this feature, see
"Configuring Port-Based Traffic Control" on
page 665.
Storm control For more information about this feature, see
"Configuring Port-Based Traffic Control" on
page 665.
Port security For more information about this feature, see
"Configuring Port and System Security" on
page 457.
Protected port For more information about this feature, see
"Configuring Port-Based Traffic Control" on
page 665.
NOTE: Whether the member ports or LAGs are brought up or down depends on
the link action.
• Port dependent on port — If a port loses the link, the switch brings
up/down the link on another port.
• Port dependent on LAG — If all ports in a channel-group lose the link, the
switch brings up/down the link on another port.
• LAG dependent on port — If a port loses the link, the switch brings
up/down all links in a channel-group.
• Multiple port command — If a group of ports lose their link, the switch
brings up/down the link on another group of ports.
• Overlapping ports — Overlapping ports on different groups will be
brought up/down only if both dependent ports lose the link.
NOTE: When you enter Interface Configuration mode, the command prompt
changes and identifies the interface. In the previous example, the command
prompt becomes console(config-if-Te1/0/10)#.
For many features, you can configure a range of interfaces. When you enter
Interface Configuration mode for multiple interfaces, the commands you
execute apply to all interfaces specified in the range.
To enter Interface Configuration mode for a range of interfaces, include the
keyword range and specify the interfaces to configure. For example, to apply
the same configuration to ports 1-10 on a standalone switch, use the
following command:
console(config)#interface range tengigabitEthernet
1/0/1-10
To enter Interface Configuration mode for ports 3, 4, 5, 12, and 14 on a
standalone switch, use the following command:
console(config)#interface range tengigabitEthernet
1/0/3-5,1/0/12,1/0/14
NOTE: You can switch to another interface or range of interfaces by entering the
interface command while in Interface Configuration mode. It is not necessary to
exit Interface Configuration mode to select a different interface.
Feature Description
Administrative status All ports are enabled
Description None defined
Auto negotiation Enabled
Speed Auto negotiate
Duplex mode Auto negotiate
Flow control Enabled
Maximum frame size 1518
Link Dependency None configured
Port Configuration
Use the Port Configuration page to define port parameters.
To display the Port Configuration page, click Switching → Ports → Port
Configuration in the navigation panel.
6 Select the Copy Parameters From check box, and select the port with the
settings to apply to other ports.
7 In the Ports list, select the check box(es) in the Copy To column that will
have the same settings as the port selected in the Copy Parameters From
field.
8 Click Apply.
6 Click Apply.
The Link Dependency settings for the group are modified, and the device
is updated.
To configure a group, click the Modify link associated with the ID of the
group to configure. Clicking the Modify link takes you to the Link
Dependency Configuration page. The Group ID is automatically selected
based on the link that was clicked.
Command Purpose
configure Enter Global Configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
description string Add a description to the port. The text string can be
from1-64 characters.
shutdown Administratively disable the interface.
speed {10 Configure the speed of a given Ethernet interface or allow
|100|1000|10000 | auto the interface to automatically detect the speed.
[100|1000|10000]} If you use the 10, 100, or 1000 keywords with the auto
keyword, the port auto negotiates only at the specified
speeds.
On combo ports, it is possible to configure auto
negotiation even if only the fiber interface is active. The
auto negotiation settings will be utilized when the copper
port is active. Auto negotiation settings are ignored for the
fiber ports.
Command Purpose
configure Enter Global Configuration mode.
link-dependency group Enter the link-dependency mode to configure a link-
group_id dependency group.
add interface Add member ports to the group.
The interface variable includes the interface type and
number, for example tengigabitethernet 1/0/3. You can
also add port channels (LAGs) as members by using the
keyword port-channel followed by an ID.
You can also specify a range of interfaces. For example,
interface tengigabitethernet 1/0/8-10,1/0/20 configures
interfaces 8, 9, 10 and 20.
--More-- or (q)uit
Supplicant
Authenticator
Authentication
Server
LAN
NOTE: By default, all ports are in VLAN Access mode. A port that uses MAC-
based authentication should be configured to be in General mode.
When multiple hosts (for example, a PC, a printer, and a phone in the same
office) are connected to the switch on the same port, each of the connected
hosts authenticates separately with the RADIUS server.
If a port uses MAC-based 802.1X authentication, the option to use MAC
Authentication Bypass (MAB) is available. MAB is a supplemental
authentication mechanism that allows 802.1X unaware clients – such as
printers, fax machines, and some IP phones — to authenticate to the network
using the client MAC address as an identifier.
The known and allowable MAC address and corresponding access rights of
the client must be pre-populated in the authentication server.
When a port configured for MAB receives traffic from an unauthenticated
client, the switch (Authenticator):
• Sends a EAP Request packet to the unauthenticated client
• Waits a pre-determined period of time for a response
• Retries – resends the EAP Request packet up to three times
• Considers the client to be 802.1X unaware client (if it does not receive an
EAP response packet from that client)
The authenticator sends a request to the authentication server with the MAC
address of the client in a hexadecimal format as the username and the MD5
hash of the MAC address as the password. The authentication server checks
its database for the authorized MAC addresses and returns an Access-Accept
or an Access-Reject response, depending on whether the MAC address is
found in the database. MAB also allows 802.1X-unaware clients to be placed
in a RADIUS-assigned VLAN or to apply a specific Filter ID to the client
traffic.
Guest VLAN
The Guest VLAN feature allows a switch to provide a distinguished service to
unauthenticated users. This feature provides a mechanism to allow users
access to hosts on the guest VLAN. For example, a company might provide a
guest VLAN to visitors and contractors to permit network access that allows
visitors to connect to external network resources, such as the Internet, with
no ability to browse information on the internal LAN.
In port-based 802.1X mode, when a client that does not support 802.1X is
connected to an unauthorized port that is 802.1X-enabled, the client does not
respond to the 802.1X requests from the switch. Therefore, the port remains
in the unauthorized state, and the client is not granted access to the network.
If a guest VLAN is configured for that port, then the port is placed in the
configured guest VLAN and the port is moved to the authorized state,
allowing access to the client. However, if the port is in MAC-based 802.1X
authentication mode, it will not move to the authorized state. MAC-based
mode makes it possible for both authenticated and guest clients to use the
same port at the same time.
NOTE: MAB and the guest VLAN feature are mutually exclusive on a port.
NOTE: The IAS database does not handle VLAN assignments or DiffServ policy
assignments.
Feature Description
Global 802.1X status Disabled
802.1X authentication method none
Per-port 802.1X status Disabled
Port state automode
Periodic reauthentication Disabled
Seconds between reauthentication 3600
attempts
Authentication server timeout 30 seconds
Resending EAP identity Request 30 seconds
Quiet period 60 seconds
Supplicant timeout 30 seconds
Max EAP request 2 times
Maximum number of supplicants per port 16
for MAC-based authentication mode
Guest VLAN Disabled
Unauthenticated VLAN Disabled
Dynamic VLAN creation Disabled
RADIUS-assigned VLANs Disabled
IAS users none configured
Port security Unlocked
Port security traps Disabled
Maximum learned MAC addresses 100 (when locked)
Monitor mode Disabled
Dot1x Authentication
Use the Dot1x Authentication page to configure the 802.1X administrative
mode on the switch and to configure general 802.1X parameters for a port.
To display the Dot1x Authentication page, click Switching → Network
Security → Dot1x Authentication → Authentication in the navigation panel.
5 Click Apply.
Authenticated Users
The Authenticated Users page is used to display lists of ports that have
authenticated users.
To display the Authenticated Users page, click Switching → Network Security
→ Authenticated Users in the navigation panel.
NOTE: The VLAN Assignment Mode field is the same as the Admin Mode field on
the System → Management Security → Authorization Network RADIUS page.
NOTE: If no users exist in the IAS database, the IAS Users Configuration Page
does not display the fields shown in the image.
4 Click Apply.
To view the Internal Authentication Server Users Table page, click Show All.
4 Click Apply.
Command Purpose
configure Enter Global Configuration mode.
aaa accounting dot1x Sets 802.1X accounting to the default operational mode
default
aaa authentication Specify the authentication method to use to authenticate
dot1x default method1 802.1X clients that connect to the switch.
method1—The method keyword can be radius, none, or
ias.
dot1x system-auth- Globally enable 802.1X authentication on the switch.
control
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
Command Purpose
configure Enter Global Configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
dot1x reauthentication Enable periodic re-authentication of the client.
dot1x timeout re- Set the number of seconds between re-authentication
authperiod seconds attempts.
dot1x timeout server- Set the time that the switch waits for a response from the
timeout seconds authentication server.
dot1x timeout tx-period Set the number of seconds that the switch waits for a
seconds response to an Extensible Authentication Protocol (EAP)-
request/identity frame from the client before resending the
request.
dot1x timeout quiet- Set the number of seconds that the switch remains in the
period seconds quiet state following a failed authentication exchange (for
example, the client provided an invalid password).
Command Purpose
configure Enter Global Configuration mode.
aaa authorization Allow the RADIUS server to assign VLAN IDs to clients.
network default radius
NOTE: When dynamically creating VLANs, the uplink port should be in trunk
mode so that it will automatically participate in all dynamically-created VLANs.
Otherwise, the supplicant may be placed in a VLAN that does not go beyond the
switch because no other ports are participating.
Command Purpose
configure Enter Global Configuration mode.
aaa ias-user username Add a user to the IAS user database. This command also
user changes the mode to the AAA User Config mode.
password password Configure the password associated with the user.
[encrypted]
CTRL + Z Exit to Privileged EXEC mode.
show aaa ias-users View all configured IAS users.
clear aaa ias-users Delete all IAS users from the database.
NOTE: The printer requires an entry in the client database that uses the printer
MAC address as the username.
PowerConnect Switch
Clients
(Port 8) LAN
LAN Uplink
(Port 24)
Printer
Server
(Port 7)
(Port 9)
Interface...................................... Te1/0/1
User Name...................................... aoversmit
Supp MAC Address............................... 0012.1753.031A
Session Time................................... 756
Interface...................................... Te1/0/3
User Name...................................... dflint
Supp MAC Address............................... 0004.5A55.EFAD
Session Time................................... 826
Filter Id......................................
VLAN Assigned.................................. 1 (Default)
Interface...................................... Te1/0/7
User Name...................................... 0006.6B33.06BA
Supp MAC Address............................... 0006.6B33.06BA
Session Time................................... 826
Filter Id......................................
VLAN Assigned.................................. 1 (Default)
9 View a summary of the port status.
console#show dot1x
Administrative Mode............... Enabled
Quiet Period................................... 60
Transmit Period................................ 30
Maximum Requests............................... 2
Max Users...................................... 2
VLAN Assigned.................................. 1 (Default)
Supplicant Timeout............................. 30
Guest-vlan Timeout............................. 90
Server Timeout (secs).......................... 30
MAB mode (configured).......................... Disabled
MAB mode (operational)......................... Disabled
The commands in this example show how to configure the switch to control
VLAN assignment for the example network. This example also contains
commands to configure the uplink, or trunk, port (a port connected to a
router or the internal network), and to configure the downlink, or access,
ports (ports connected to one or more hosts). Ports 1–23 are downstream
ports. Port 24 is an uplink port. An external RADIUS server handles the
VLAN assignment.
NOTE: The configuration to control the VLAN assignment for authorized users is
done on the external RADIUS server.
console(config)#vlan 200
console(config-vlan200)#name Unauthorized
console(config-vlan200)#exit
console(config)#vlan 300
console(config-vlan300)#name Guest
console(config-vlan300)#exit
2 Configure information about the external RADIUS server the switch uses
to authenticate clients. The RADIUS server IP address is 10.10.10.10, and
the shared secret is qwerty123.
console(config)#radius-server key qwerty123
console(config)#radius-server host 10.10.10.10
console(Config-auth-radius)#exit
3 Enable 802.1X on the switch.
console(config)#dot1x system-auth-control
4 Create a default authentication login list and use the RADIUS server for
port-based authentication for connected clients.
console(config)#aaa authentication dot1x default
radius
5 Allow the switch to accept VLAN assignments by the RADIUS server.
console(config)#aaa authorization network default
radius
6 Enter interface configuration mode for the downlink ports.
console(config)#interface range te1/0/1-23
7 Set the downlink ports to the access mode because each downlink port
connects to a single host that belongs to a single VLAN.
console(config-if)#switchport mode access
NOTE: The configuration to control the VLAN assignment for hosts is done on
the external RADIUS server.
Feature Description
Port security Unlocked
Port security traps Disabled
Maximum learned MAC addresses 100 (when locked)
Monitor mode Disabled
Port Security
Use the Port Security page to enable MAC locking on a per-port basis. When
a port is locked, you can limit the number of source MAC addresses that are
allowed to transmit traffic on the port.
To display the Port Security page, click Switching → Network Security → Port
Security in the navigation panel.
5 Click Apply.
Command Purpose
configure Enter Global Configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
port security [discard] Enable port security on the port. This prevents the switch
[trap seconds] from learning new addresses on this port after the
maximum number of addresses has been learned.
• discard — Discards frames with unlearned source
addresses. This is the default if no option is indicated.
• trap seconds — Sends SNMP traps and defines the
minimal amount of time in seconds between two
consecutive traps. (Range: 1–1000000)
port security max max- Set the maximum number of MAC addresses that can be
addr learned on the port while port security is enabled.
CTRL + Z Exit to Privileged EXEC mode.
show ports security View port security settings on all interfaces or the specified
[interface] interface.
show ports security View the current MAC addresses that have been learned
addresses [interface] on all ports or the specified port.
ACL Overview
Access Control Lists (ACLs) are a collection of permit and deny conditions,
called rules, that provide security by blocking unauthorized users and
allowing authorized users to access specific resources.
ACLs can also provide traffic flow control, restrict contents of routing
updates, and decide which types of traffic are forwarded or blocked. ACLs can
reside in a firewall router, a router connecting two internal networks, or a
Layer 3 switch, such as a PowerConnect 8000-series and 8100-series switches.
You can also create an ACL that limits access to the management interfaces
based on the connection method (for example, Telnet or HTTP) and/or the
source IP address.
The PowerConnect 8000-series and 8100-series switches support ACL
configuration in both the ingress and egress direction. Egress ACLs provide
the capability to implement security rules on the egress flows (traffic leaving a
port) rather than the ingress flows (traffic entering a port). Ingress and egress
ACLs can be applied to any physical port, port-channel (LAG), or VLAN
routing port.
NOTE: Every ACL is terminated by an implicit deny all rule, which covers any
packet not matching a preceding explicit rule.
You can set up ACLs to control traffic at Layer 2, Layer 3, or Layer 4. MAC
ACLs operate on Layer 2. IP ACLs operate on Layers 3 and 4. PowerConnect
8000-series and 8100-series switches support both IPv4 and IPv6 ACLs.
NOTE: Adding a conflicting periodic time range to an absolute time range will
cause the time range to become inactive. For example, consider an absolute time
range from 8:00 AM Tuesday March 1st 2011 to 10 PM Tuesday March 1st 2011.
Adding a periodic entry using the 'weekend' keyword will cause the time-range
to become inactive because Tuesdays are not on the weekend.
EtherType Protocol
0x0800 Internet Protocol version 4 (IPv4)
0x0806 Address Resolution Protocol (ARP)
0x0842 Wake-on LAN Packet
0x8035 Reverse Address Resolution Protocol (RARP)
0x8100 VLAN tagged frame (IEEE 802.1Q)
EtherType Protocol
0x86DD Internet Protocol version 6 (IPv6)
0x8808 MAC Control
0x8809 Slow Protocols (IEEE 802.3)
0x8870 Jumbo frames
0x888E EAP over LAN (EAPOL – 802.1x)
0x88CC Link Layer Discovery Protocol
0x8906 Fibre Channel over Ethernet
0x8914 FCoE Initialization Protocol
0x9100 Q in Q
IP ACL Configuration
Use the IP ACL Configuration page to add or remove IP-based ACLs.
To display the IP ACL Configuration page, click Switching → Network
Security → Access Control Lists → IP Access Control Lists → Configuration
in the navigation panel.
4 Click Apply.
NOTE: There is an implicit deny all rule at the end of an ACL list. This means that
if an ACL is applied to a packet and if none of the explicit rules match, then the
final implicit "deny all" rule applies and the packet is dropped.
4 Click Apply.
4 Click Apply.
3 Click Apply.
4 Click Configuration to return to the Time Range Entry Configuration
page.
5 In the Time Range Name field, select the name of the time range to
configure.
6 Specify an ID for the time range. You can configure up to 10 different time
range entries to include in the named range. However, only one absolute
time entry is allowed per time range.
7 Configure the values for the time range entry.
8 Click Apply.
9 To add additional entries to the named time range, repeat step 5 through
step 8.
Command Purpose
configure Enter global configuration mode.
access-list name {deny | Create a named ACL (if it does not already exist) and
permit} {every | {[icmp create a rule for the named ACL. If the ACL already exists,
| igmp | ip | tcp | udp | this command creates a new rule for the ACL.
number] {srcip srcmask • list-name — Access-list name up to 31 characters in
| any} [eq [portkey | length.
portvalue]] {dstip
dstmask | any} [eq • deny | permit — Specifies whether the IP ACL rule
[portkey | portvalue]] permits or denies an action.
[precedence precedence • every — Allows all protocols.
| tos tos tosmask | dscp
• eq — Equal. Refers to the Layer 4 port number being
dscp] [log] [time-range
used as match criteria. The first reference is source match
time-range-name]
criteria, the second is destination match criteria.
[assign-queue queue-id]
[redirect interface | • number — Standard protocol number. Protocol keywords
mirror interface]}} icmp, igmp, ip, tcp, udp.
• srcip — Source IP address.
• srcmask — Source IP mask.
• dstip — Destination IP address.
• dstmask — Destination IP mask.
Command Purpose
configure Enter global configuration mode.
mac access-list extended Create a named MAC ACL. This command also enters
name MAC Access List Configuration mode. If a MAC ACL
with this name already exists, this command enters the
mode to update the existing ACL.
{deny | permit} Specify the rules (match conditions) for the MAC access
{srcmac srcmacmask | list.
any} {dstmac • srcmac — Valid source MAC address in format
dstmacmask | any | xxxx.xxxx.xxxx.
bpdu } [{ethertypekey |
0x0600-0xFFFF }] [vlan • srcmacmask — Valid MAC address bitmask for the source
eq 0-4095 ] [cos 0-7] MAC address in format xxxx.xxxx.xxxx.
[secondary-vlan eq 0- • any — Packets sent to or received from any MAC address
4095 ] [secondary-cos
• dstmac — Valid destination MAC address in format
0-7] [log] [time-range
xxxx.xxxx.xxxx.
time-range-name]
[assign-queue queue-id] • destmacmask — Valid MAC address bitmask for the
[{mirror |redirect} destination MAC address in format xxxx.xxxx.xxxx.
interface ] • bpdu — Bridge protocol data unit
• ethertypekey — Either a keyword or valid four-digit
hexadecimal number. (Range: Supported values are
appletalk, arp, ibmsna, ipv4, ipv6, ipx, mplsmcast,
mplsucast, Netbios, novell, pppoe, rarp.)
• 0x0600-0xFFFF — Specify custom EtherType value
(hexadecimal range 0x0600-0xFFFF)
Command Purpose
configure Enter global configuration mode.
ipv6 access-list name Create a named IPv6 ACL. This command also enters IPv6
Access List Configuration mode. If an IPv6 ACL with this
name already exists, this command enters the mode to
update the existing ACL.
{permit | deny} {every | Specify the match conditions for the IPv6 access list.
{{icmp | igmp | ipv6 | • deny | permit — Specifies whether the IP ACL rule
tcp | udp | number} permits or denies an action.
{any | source ipv6
prefix/prefix length} [eq • every — Allows all protocols.
{portkey | portvalue}] • number — Standard protocol number or protocol
{any | destination ipv6 keywords icmp, igmp, ipv6, tcp, udp.
prefix/prefix length} [eq
• source ipv6 prefix — IPv6 prefix in IPv6 global address
{portkey | portvalue}]
format.
[flow-label value] [dscp
dscp]}} [log] [time- • prefix-length — IPv6 prefix length value.
range time-range-name] • eq — Equal. Refers to the Layer 4 port number being
[assign-queue queue-id] used as a match criteria. The first reference is source
[{mirror | redirect} match criteria, the second is destination match criteria.
interface]
• portkey — Or you can specify the portkey, which can be
one of the following keywords: domain, echo, efts,
ftpdata, http, smtp, snmp, telnet, tftp, and www.
• portvalue — The source layer 4 port match condition for
the ACL rule is specified by the port value parameter.
(Range: 0–65535).
Command Purpose
configure Enter global configuration mode.
time-range name Create a named time range and enter the Time-Range
Configuration mode for the range.
absolute {[start time Configure a nonrecurring time entry for the named time
date] [end time date ]} range.
• start time date — Time and date the ACL rule starts
going into effect. The time is expressed in a 24-hour
clock, in the form of hours:minutes. For example, 8:00 is
8:00 am and 20:00 is 8:00 pm. The date is expressed in
the format day month year. If no start time and date are
specified, the configuration statement is in effect
immediately.
• end time date — Time and date the ACL rule is no
longer in effect.
Configuring an IP ACL
The commands in this example set up an IP ACL that permits hosts in the
192.168.77.0/24 subnet to send TCP and UDP traffic only to the host with an
IP address of 192.168.77.50. The ACL is applied to port 2 on the
PowerConnect switch.
Port Te 1/0/2
Inbound Interface(s):
ch1-12,Te1/0/1-Te1/0/24
Rule Number: 1
Action.................................. deny
Ethertype................................ ipx
Rule Number: 2
Action.................................. permit
Match All............................... TRUE
Inbound VLAN(s):
100
Rule Number: 1
Action............................ deny
Match All......................... FALSE
Protocol.......................... 6(tcp)
Source IP Address................. any
Destination IP Address............ any
Destination L4 Port Keyword........ 80(www/http)ip
Time Range Name....................work-hours
Rule Status....................... inactive
NOTE: Management ACLs can be applied only to in-band ports and cannot be
applied to the OOB port.
Command Purpose
configure Enter Global Configuration mode.
mgmt_ACL
--------
permit ip-source 10.27.65.0 mask 255.255.255.0
vlan 1 priority 1
permit ip-source 10.27.65.0 mask 255.255.255.0
Te1/0/9 priority 2
! (Note: all other access implicitly denied)
6 Verify that the configured management ACL is in use.
VLAN Overview
By default, all switchports on a PowerConnect 8000-series and 8100-series
switches are in the same broadcast domain. This means when one host
connected to the switch broadcasts traffic, every device connected to the
switch receives that broadcast. All ports in a broadcast domain also forward
multicast and unknown unicast traffic to the connected host. Large broadcast
domains can result in network congestion, and end users might complain that
the network is slow. In addition to latency, large broadcast domains are a
greater security risk since all hosts receive all broadcasts.
Virtual Local Area Networks (VLANs) allow you to divide a broadcast domain
into smaller, logical networks. Like a bridge, a VLAN switch forwards traffic
based on the Layer 2 header, which is fast, and like a router, it partitions the
network into logical segments, which provides better administration, security,
and management of multicast traffic.
Network administrators have many reasons for creating logical divisions, such
as department or project membership. Because VLANs enable logical
groupings, members do not need to be physically connected to the same
switch or network segment. Some network administrators use VLANs to
segregate traffic by type so that the time-sensitive traffic, like voice traffic, has
Each VLAN has a unique number, called the VLAN ID. The PowerConnect
8000-series and 8100-series switches support a configurable VLAN ID range
of 2–4093. A VLAN with VLAN ID 1 is configured on the switch by default.
VLAN 1 is named default, which cannot be changed. However, you can
associate names with any other VLANs that you create.
In a tagged frame, the VLAN is identified by the VLAN ID in the tag. In an
untagged frame, the VLAN identifier is the Port VLAN ID (PVID) specified
for the port that received the frame. For information about tagged and
untagged frames, see "VLAN Tagging" on page 543.
The PowerConnect 8000-series and 8100-series switches support adding
individual ports and Link Aggregation Groups (LAGs) as VLAN members.
Figure 22-1 shows an example of a network with three VLANs that are
department-based. The file server and end stations for the department are all
members of the same VLAN.
Router
Engineering
VLAN 100
Switch Payroll
VLAN 300
Tech Pubs
VLAN 200
In this example, each port is manually configured so that the end station
attached to the port is a member of the VLAN configured for the port. The
VLAN membership for this network is port-based or static.
PowerConnect 8000-series and 8100-series switches also support VLAN
assignment based on any of the following criteria:
• MAC address of the end station
• IP subnet of the end station
• Protocol of the packet transmitted by the end station
Switchport Modes
You can configure each port on a PowerConnect 8000-series and 8100-series
switches to be in one of the following modes:
• Access — Access ports are intended to connect end-stations to the system,
especially when the end-stations are incapable of generating VLAN tags.
• Trunk — Trunk-mode ports are intended for switch-to-switch links. Trunk
ports can receive both tagged and untagged packets. Tagged packets
received on a trunk port are forwarded on the VLAN contained in the tag.
Untagged packets received on a trunk port are forwarded on the native
VLAN. Packets received on another interface belonging to the native
VLAN are transmitted untagged on a trunk port.
• General — General ports can be either access or trunk ports.
When a port is in General mode, all VLAN features are configurable. When
ingress filtering is on, the frame is dropped if the port is not a member of the
VLAN identified by the VLAN ID in the tag. If ingress filtering is off, all
tagged frames are forwarded. The port decides whether to forward or drop the
frame when the port receives the frame.
VLAN Tagging
PowerConnect 8000-series and 8100-series switches support IEEE 802.1Q
tagging. Ethernet frames on a tagged VLAN have a 4-byte VLAN tag in the
header. VLAN tagging is required when a VLAN spans multiple switches,
which is why trunk ports transmit and receive only tagged frames.
Tagging may be required when a single port supports multiple devices that are
members of different VLANs. For example, a single port might be connected
to an IP phone, a PC, and a printer (the PC and printer are connected via
ports on the IP phone). IP phones are typically configured to use a tagged
VLAN for voice traffic, while the PC and printers typically use the untagged
VLAN.
Trunk ports can receive tagged and untagged traffic. Untagged traffic is
tagged internally with the native VLAN. Native VLAN traffic received
untagged is transmitted untagged on a trunk port.
By default, trunk ports are members of all existing VLANs and will
automatically participate in any newly created VLANs. The administrator can
restrict the VLAN membership of a trunk port.
GVRP
The GARP VLAN Registration Protocol (GVRP) helps to dynamically
manage VLAN memberships on trunk ports. When GARP is enabled,
switches can dynamically register (and de-register) VLAN membership
information with other switches attached to the same segment.
Information about the active VLANs is propagated across all networking
switches in the bridged LAN that support GVRP. You can configure ports to
forbid dynamic VLAN assignment through GVRP.
The operation of GVRP relies upon the services provided by the Generic
Attribute Registration Protocol (GARP). GVRP can create up to 1024 VLANs.
For information about GARP timers, see "What Are GARP and GMRP?" on
page 686.
Double-VLAN Tagging
For trunk ports, which are ports that connect one switch to another switch,
the PowerConnect 8000-series and 8100-series switches support double-
VLAN tagging. This feature allows service providers to create Virtual
Metropolitan Area Networks (VMANs). With double-VLAN tagging, service
providers can pass VLAN traffic from one customer domain to another
through a metro core in a simple and cost-effective manner. By using an
additional tag on the traffic, the switch can differentiate between customers
in the MAN while preserving an individual customer’s VLAN identification
when the traffic enters the customer’s 802.1Q domain.
With the introduction of this second tag, customers are no longer required to
divide the 4-byte VLAN ID space to send traffic on a Ethernet-based MAN.
In short, every frame that is transmitted from an interface has a double-VLAN
tag attached, while every packet that is received from an interface has a tag
removed (if one or more tags are present).
In Figure 22-2, two customers share the same metro core. The service
provider assigns each customer a unique ID so that the provider can
distinguish between the two customers and apply different rules to each.
When the configurable EtherType is assigned to something different than the
802.1Q (0x8100) EtherType, it allows the traffic to have added security from
Voice VLAN
The Voice VLAN feature enables switch ports to carry voice traffic with
defined priority. When multiple devices, such as a PC and an IP phone, are
connected to the same port, you can configure the port to use one VLAN for
voice traffic and another VLAN for data traffic.
Voice over IP (VoIP) traffic is inherently time-sensitive: for a network to
provide acceptable service, the transmission rate is vital. The priority level
enables the separation of voice and data traffic coming onto the port.
A primary benefit of using Voice VLAN is to ensure that the sound quality of
an IP phone is safeguarded from deteriorating when the data traffic on the
port is high. The switch uses the source MAC address of the traffic traveling
through the port to identify the IP phone data flow.
After the VoIP phone receives its VLAN information, all traffic is tagged with
the VLAN ID of the Voice VLAN. The phone is considered to be authorized
to send traffic but not necessarily authenticated.
Private VLANs
Private VLANs partition a standard VLAN domain into two or more
subdomains. Each subdomain is defined by a primary VLAN and a secondary
VLAN. The primary VLAN ID is the same for all subdomains that belong to a
particular private VLAN instance. The secondary VLAN ID differentiates the
subdomains from each other and provides layer 2 isolation between ports on
the same private VLAN.
R1
TE1/1/1
SW1 SW2
Gi1/0/12 Gi2/0/11
Gi1/0/10 Gi1/0/11 Gi2/0/10
Promiscuous Ports
An endpoint connected to a promiscuous port is allowed to communicate
with any endpoint within the private VLAN. Multiple promiscuous ports can
be defined for a single private VLAN domain.
In the configuration shown in Figure 22-3, the port connected from SW1 to
R1 (TE1/1/1) is configured as a promiscuous port.
Community Ports
An endpoint connected to a community port is allowed to communicate with
the endpoints within a community and can also communicate with any
configured promiscuous port. The endpoints that belong to one community
cannot communicate with endpoints that belong to a different community, or
with endpoints connected to isolated ports.
To
From promiscuous community 1 community 2 isolated stack (trunk)
To
From promiscuous community 1 community 2 isolated stack (trunk)
To
From promiscuous community 1 community 2 isolated stack (trunk)
Feature Value
Default VLAN VLAN 1
VLAN Name No VLAN name is configured except for VLAN 1,
whose name “default” cannot be changed.
VLAN Range 2–4093
Switchport mode Access
Double-VLAN tagging Disabled
If double-VLAN tagging is enabled, the default
EtherType value is 802.1Q
Maximum number of 128
configurable MAC-to-VLAN
bindings
Maximum number of 64
configurable
IP Subnet-to-VLAN bindings
GVRP Disabled
If GVRP is enabled, the default port parameters are:
• GVRP State: Disabled
• Dynamic VLAN Creation: Disabled
• GVRP Registration: Disabled
Number of dynamic VLANs 1024
that can be assigned through
GVRP
Voice VLAN Disabled
Voice VLAN DSCP value 46
Voice VLAN authentication Enabled
mode
VLAN Membership
Use the VLAN Membership page to create VLANs and define VLAN groups
stored in the VLAN membership table.
To display the VLAN Membership page, click Switching → VLAN → VLAN
Membership in the navigation panel.
The VLAN Membership tables display which Ports and LAGs are members of
the VLAN, and whether they’re tagged (T), untagged (U), or forbidden (F).
The tables have two rows: Static and Current. Only the Static row is
configurable. The Current row is updated either dynamically through GVRP
or when the Static row is changed and Apply is clicked.
There are two tables on the page:
• Ports — Displays and assigns VLAN membership to ports. To assign
membership, click in Static for a specific port. Each click toggles between
U, T, and blank. See Table 22-8 for definitions.
• LAGs — Displays and assigns VLAN membership to LAGs. To assign
membership, click in Static for a specific LAG. Each click toggles between
U, T, and blank. See Table 22-8 for definitions.
Adding a VLAN
To create a VLAN:
1 Open the VLAN Membership page.
2 Click Add to display the Add VLAN page.
4 Click Apply.
4 Click Apply.
5 Verify that the ports have been added to the VLAN.
NOTE: You can add ports to a VLAN through the table on the VLAN Membership
page or through the PVID field on the Port Settings page. The PVID is the VLAN
that untagged received packets are assigned to. To include a general-mode port
in multiple VLANs, use the VLAN Membership page.
To display the Port Settings page, click Switching → VLAN → Port Settings in
the navigation panel.
From the Port Settings page, click Show All to see the current VLAN settings
for all ports. You can change the settings for one or more ports by clicking the
Edit option for a port and selecting or entering new values.
From the LAG Settings page, click Show All to see the current VLAN settings
for all LAGs. You can change the settings for one or more LAGs by clicking
the Edit option for a port and selecting or entering new values.
From the Bind MAC to VLAN page, click Show All to see the MAC
addresses that are mapped to VLANs. From this page, you can change the
settings for one or more entries or remove an entry.
From the Bind IP Subnet to VLAN page, click Show All to see the IP subnets
that are mapped to VLANs. From this page, you can change the settings for
one or more entries or remove an entry.
From the GVRP Parameters page, click Show All to see the GVRP
configuration for all ports. From this page, you can change the settings for
one or more entries.
NOTE: Per-port and per-LAG GVRP Statistics are available from the
Statistics/RMON page. For more information, see "Monitoring Switch Traffic" on
page 347.
4 Click Apply.
5 Click Protocol Group to return to the main Protocol Group page.
6 From the Group ID field, select the group to configure.
7 In the Protocol Settings table, select the protocol and interfaces to
associate with the protocol-based VLAN.
In Figure 22-20, the Protocol Group 1 (named IPX) is associated with the
IPX protocol and ports 14–16. Ports 20-22 are selected in Available Ports
list. After clicking the right arrow, they will be added to the Selected Ports
list.
8 Click Apply.
9 Click Show All to see the protocol-based VLANs and their members.
To view a summary of the double VLAN configuration for all interfaces and to
edit settings for one or more interfaces, click Show All.
NOTE: IEEE 802.1X must be enabled on the switch before you disable voice
VLAN authentication. Voice VLAN authentication can be disabled in order to
allow VoIP phones that do not support authentication to send and receive
unauthenticated traffic on the Voice VLAN.
Creating a VLAN
Beginning in Privileged EXEC mode, use the following commands to
configure a VLAN and associate a name with the VLAN.
Command Purpose
configure Enter global configuration mode.
vlan {vlan-id |vlan- Create a new VLAN or a range of VLANs and enter the
range} interface configuration mode for the specified VLAN or
VLAN range.
• vlan-id—A valid VLAN IDs (Range: 2–4093).
• vlan-range — A list of valid VLAN IDs to be added. List
separate, non-consecutive VLAN IDs separated by
commas (without spaces); use a hyphen to designate a
range of IDs. (Range: 2–4093)
NOTE: You can also create with this command in VLAN
Database mode . To enter VLAN Database mode, use the vlan
database command in Global Configuration mode.
name string Add a name to the specified VLAN.
string — Comment or description to help identify a
specific VLAN (Range: 1–32 characters).
CTRL + Z Exit to Privileged EXEC mode.
show vlan [id vlan-id | Display VLAN information.
name vlan-name] • vlan-id — A valid VLAN ID. (Range: 1–4093)
• vlan-name — A valid VLAN name string. (Range: 1–32
characters)
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
switchport mode access Configure the interface as an untagged layer 2 VLAN
interface.
switchport access vlan Configure the interface as a member of the specified
vlan-id VLAN.
vlan-id — A valid VLAN ID of the VLAN to which the port
is configured. (Range: 1–4093)
CTRL + Z Exit to Privileged EXEC mode.
show interfaces Display information about the VLAN settings configured
switchport interface for the specified interface.
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
switchport mode general Configure the interface as an untagged layer 2 VLAN
interface.
switchport general Configure the VLAN membership for the port. You can
allowed vlan also use this command to change the egress tagging for
[add|remove] vlan-list packets without changing the VLAN assignment.
{tagged|untagged} • add vlan-list — List of VLAN IDs to add. Separate
nonconsecutive VLAN IDs with a comma and no spaces.
Use a hyphen to designate a range of IDs. (Range:
1–4093)
• remove vlan-list — List of VLAN IDs to remove. Separate
nonconsecutive VLAN IDs with a comma and no spaces.
Use a hyphen to designate a range of IDs.
• tagged — Sets the port to transmit tagged packets for the
VLANs. If the port is added to a VLAN without specifying
tagged or untagged, the default is untagged.
• untagged — Sets the port to transmit untagged packets
for the VLANs.
switchport general pvid (Optional) Set the port VLAN ID. Untagged traffic that
vlan-id enters the switch through this port is tagged with the
PVID.
vlan-id — PVID. The VLAN ID may mot belong to a
VLAN that does not exist on the switch. (Range: 1–4093)
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
switchport mode trunk Configure the interface as an untagged layer 2 VLAN
interface.
Command Purpose
configure Enter global configuration mode.
interface port-channel Enter interface configuration mode for the specified
channel-id interface.
channel-id — Specific port channel. (Range 1–48). You
can also specify a range of LAGs with the interface range
port-channel command, for example, interface range port-
channel 4-8.
switchport mode Configure the interface as an untagged layer 2 VLAN
[access|general|trunk] interface.
CTRL + Z Exit to Privileged EXEC mode.
show interfaces Display information about the VLAN settings configured
switchport port-channel for the specified LAG.
channel-id
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
mode dvlan-tunnel Enable Double VLAN Tunneling on the specified
interface.
exit Exit to global configuration mode
dvlan-tunnel ethertype Configure the EtherType to use for interfaces with double
{802.1Q | vman | VLAN tunneling enabled.
custom <0-65535>} • 802.1Q — Configures the EtherType as 0x8100.
[primary-tpid]
• vman — Configures the EtherType as 0x88A8.
• custom — Custom configures the EtherType for the
DVLAN tunnel. The value must be 0-65535.
• primary-tpid — Configure the primary (outer) TPID. If
this parameter is not present, the inner TPID is
configured.
CTRL + Z Exit to Privileged EXEC mode.
show dvlan-tunnel Display all interfaces enabled for Double VLAN Tunneling
show dvlan-tunnel Display detailed information about Double VLAN
interface {interface | Tunneling for the specified interface or all interfaces.
all}
Command Purpose
configure Enter global configuration mode.
vlan database Enter VLAN database mode.
vlan association mac Associate a MAC address with a VLAN.
mac-address vlan-id • mac-address — MAC address to associate. (Range: Any
MAC address in the format xxxx.xxxx.xxxx or
xx:xx:xx:xx:xx:xx)
• vlanid — VLAN to associate with subnet. (Range: 1-
4093)
CTRL + Z Exit to Privileged EXEC mode.
show vlan association Display the VLAN associated with a specific configured
mac [mac-address] MAC address. If no MAC address is specified, the VLAN
associations of all the configured MAC addresses are
displayed.
Command Purpose
configure Enter global configuration mode.
vlan database Enter VLAN database mode.
vlan association subnet Associate an IP subnet with a VLAN.
ip-address subnet-mask • ip-address — Source IP address. (Range: Any valid IP
vlanid address)
• subnet-mask — Subnet mask. (Range: Any valid subnet
mask)
• vlanid — VLAN to associated with subnet. (Range: 1-
4093)
CTRL + Z Exit to Privileged EXEC mode.
show vlan association Display the VLAN associated with a specific configured IP-
subnet [ip-address ip- Address and netmask. If no IP Address and net mask are
mask ] specified, the VLAN associations of all the configured IP-
subnets are displayed.
Configuring GVRP
Beginning in Privileged EXEC mode, use the following commands to enable
GVRP on the switch and on an interface, and to configure various GVRP
settings.
Command Purpose
configure Enter global configuration mode.
gvrp enable Enable GVRP on the switch.
interface interface Enter interface configuration mode for the specified port
or LAG. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3 or port-
channel 3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
gvrp enable Enable GVRP on the interface.
Command Purpose
configure Enter global configuration mode.
voice vlan Enable the voice vlan capability on the switch.
interface interface Enter interface configuration mode for the specified
interface.
interface — Specific interface, such as te1/0/8. You can also
specify a range of interfaces with the interface range
command, for example, interface range te1/0/8-12 enters
Interface Configuration mode for ports 8–12.
voice vlan {vlanid | Enable the voice vlan capability on the interface.
dot1p priority | none | • vlanid —The voice VLAN ID.
untagged | data priority
{trust | untrust} | auth • priority —The Dot1p priority for the voice VLAN on the
{enable | disable} | port.
dscp value} • trust—Trust the dot1p priority or DSCP values
contained in packets arriving on the voice vlan port.
• untrust—Do not trust the dot1p priority or DSCP values
contained in packets arriving on the voice vlan port.
• auth {enable | disable} — Use enable to allow voice
traffic on unauthorized voice vlan port. Use disable to
prevent voice traffic on an Unauthorized voice vlan port
• dscp value —The DSCP value (Range: 0–64).
CTRL + Z Exit to Privileged EXEC mode.
show voice vlan Display voice VLAN configuration information for the
[interface {interface switch, for the specified interface, or for all interfaces.
|all}]
NOTE: For an example that shows how to use a RADIUS server to provide VLAN
information, see "Controlling Authentication-Based VLAN Assignment" on
page 486. For an example that shows how to allow the switch to dynamically
create RADIUS-assigned VLANS, see "Allowing Dynamic VLAN Creation of
RADIUS-Assigned VLANs" on page 490.
This example assumes that network administrator wants to create the VLANs
in Table 22-9:
LAN/WAN
Switch 1 Switch 2
Port/LAG Function
Switch 1
1 Connects to Switch 2
2–15 Host ports for Payroll
16–20 Host ports for Marketing
LAG1 (ports 21–24) Connects to Payroll server
Switch 2
1 Connects to Switch 1
2–10 Host ports for Marketing
11–30 Host ports for Engineering
LAG1 (ports 35–39) Connects to file server
LAG2 (ports 40–44) Uplink to router.
e Repeat steps b–d to create VLANs 300 (Sales) and 400 (Payroll).
2 Assign ports 16–20 to the Marketing VLAN.
a From the Switching → VLAN → VLAN Membership page, select
200-Marketing from the Show VLAN field.
b In the Static row, click the space for ports 16–20 so the U (untagged)
displays for each port.
3 Click Apply.
4 Assign ports 2–15 and LAG1 to the Payroll VLAN.
a From the Switching → VLAN → VLAN Membership page, select
400-Payroll from the Show VLAN field.
b In the Static row, click the space for ports 2–15 and LAG 1 so the U
(untagged) displays for each port, and then click Apply.
5. Configure LAG 1 to be in general mode and specify that the LAG will
accept tagged or untagged frames, but that untagged frames will be
transmitted tagged with PVID 400.
a. From the Switching → VLAN → LAG Settings page, make sure Po1 is
selected.
Port: Te1/0/1
VLAN Membership mode:Trunk Mode
Operating parameters:
PVID: 1
Ingress Filtering: Enabled
Acceptable Frame Type: VLAN Only
Default Priority: 0
GVRP status:Disabled
Interface............................. Te1/0/10
Voice VLAN Interface Mode............. Enabled
Voice VLAN ID......................... 25
Voice VLAN COS Override............... False
Voice VLAN DSCP Value................. 46
Voice VLAN Port Status................ Disabled
Voice VLAN Authentication............. Disabled
VLAN Type
console(config)#show vlan
STP Overview
STP is a layer 2 protocol that provides a tree topology for switches on a
bridged LAN. STP allows a network to have redundant paths without the risk
of network loops. STP uses the spanning-tree algorithm to provide a single
path between end stations on a network.
PowerConnect 8000-series and 8100-series switches support Classic STP,
Multiple STP, and Rapid STP.
Assume that Switch A is elected to be the Root Bridge, and Port 1 on Switch
B and Switch C are calculated to be the root ports for those bridges, Port 2 on
Switch B and Switch C would be placed into the Blocking state. This creates a
loop-free topology. End stations in VLAN 10 can talk to other devices in
VLAN 10, and end stations in VLAN 20 have a single path to communicate
with other VLAN 20 devices.
For VLAN 10 this single STP topology is fine and presents no limitations or
inefficiencies. On the other hand, VLAN 20's traffic pattern is inefficient. All
frames from Switch B will have to traverse a path through Switch A before
arriving at Switch C. If the Port 2 on Switch B and Switch C could be used,
these inefficiencies could be eliminated. MSTP does just that, by allowing the
configuration of MSTIs based upon a VLAN or groups of VLANs. In this
simple case, VLAN 10 could be associated with Multiple Spanning Tree
Instance (MSTI)1 with an active topology similar to Figure 23-2 and VLAN
20 could be associated with MSTI 2 where Port 1 on both Switch A and
Switch B begin discarding and all others forwarding. This simple modification
creates an active topology with a better distribution of network traffic and an
increase in available bandwidth.
BPDU Flooding
The BPDU flooding feature determines the behavior of the switch when it
receives a BPDU on a port that is disabled for spanning tree. If BPDU
flooding is configured, the switch will flood the received BPDU to all the
ports on the switch which are similarly disabled for spanning tree.
Port Fast
The PortFast feature reduces the STP convergence time by allowing edge
ports that are connected to end devices (such as a desktop computer, printer,
or file server) to transition to the forwarding state without going through the
listening and learning states.
BPDU Filtering
Ports that have the PortFast feature enabled continue to transmit BPDUs.
The BPDU filtering feature prevents PortFast-enabled ports from sending
BPDUs.
If BPDU filtering is configured globally on the switch, the feature is
automatically enabled on all operational PortFast-enabled ports. These ports
are typically connected to hosts that drop BPDUs. However, if an operational
edge port receives a BPDU, the BPDU filtering feature disables PortFast and
allows the port to participate in the spanning-tree calculation.
Enabling BPDU filtering on a specific port prevents the port from sending
BPDUs and allows the port to drop any BPDUs it receives.
Loop Guard
Loop guard protects a network from forwarding loops induced by BPDU
packet loss. The reasons for failing to receive packets are numerous, including
heavy traffic, software problems, incorrect configuration, and unidirectional
link failure. When a non-designated port no longer receives BPDUs, the
spanning-tree algorithm considers that this link is loop free and begins
transitioning the link from blocking to forwarding. Once in forwarding state,
the link may create a loop in the network.
Enabling loop guard prevents such accidental loops. When a port is no longer
receiving BPDUs and the max age timer expires, the port is moved to a loop-
inconsistent blocking state. In the loop-inconsistent blocking state, traffic is
not forwarded so the port behaves as if it is in the blocking state. The port will
remain in this state until it receives a BPDU. It will then transition through
the normal spanning tree states based on the information in the received
BPDU.
3 For each port to configure, select the check box in the Edit column in the
row associated with the port.
4 Select the desired settings.
5 Click Apply.
3 For each LAG to configure, select the check box in the Edit column in the
row associated with the LAG.
4 Select the desired settings.
5 Click Apply.
To view RSTP Settings for all interfaces, click the Show All link. The Rapid
Spanning Tree Table displays.
3 For each Instance ID to modify, select the check box in the Edit column in
the row associated with the VLAN.
4 Update the Instance ID settings for the selected VLANs.
5 Click Apply.
3 For each interface to configure, select the check box in the Edit column in
the row associated with the interface.
4 Update the desired settings.
5 Click Apply.
Command Purpose
configure Enter global configuration mode.
spanning-tree Enable spanning tree on the switch.
spanning tree mode {stp Specify which spanning tree mode to use on the switch.
| rstp |mst}
spanning-tree priority Specify the priority of the bridge. (Range: 0–61440). The
priority switch with the lowest priority value is elected as the root
switch.
spanning-tree max-age Specify the switch maximum age time, which indicates the
seconds amount of time in seconds a bridge waits before
implementing a topological change. Valid values are from
(6 to 40) seconds.
spanning-tree forward- Specify the switch forward delay time, which indicates the
time seconds amount of time in seconds a bridge remains in a listening
and learning state before forwarding packets. Valid values
are from (4 to 30) seconds.
spanning-tree max-hops Configure the maximum number of hops for the Spanning
hops tree. Valid values are from (6 to 40).
spanning-tree transmit Set the maximum number of BPDUs that a bridge is
hold-count [value] allowed to send within a hello time window (2 seconds).
The range for value is 1–10.
CTRL + Z Exit to Privileged EXEC mode.
Command Purpose
configure Enter global configuration mode.
spanning-tree bpdu Allow the flooding of BPDUs received on non-spanning-
flooding tree ports to all other non-spanning-tree ports.
spanning-tree portfast Enable PortFast on all switch ports.
spanning-tree portfast Prevent ports configured in PortFast mode from sending
bpdufilter default BPDUs.
spanning-tree loopguard Enable loop guard on all ports.
default
spanning-tree bpdu- Enable BPDU protection on the switch.
protection
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3 or port-
channel 4.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12. The range keyword is also valid for LAGs (port
channels).
spanning-tree auto- Set the port to auto portfast mode. This enables the port
portfast to become a portfast port if it does not see any BPDUs for
3 seconds.
spanning-tree guard Enable loop guard or root guard (or disable both) on the
{root | loop | none} interface.
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3 or port-
channel 4.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12. The range keyword is also valid for LAGs (port
channels).
spanning-tree disable Disable spanning-tree on the port.
spanning-tree port- Specify the priority of the port. (Range: 0–240).
priority priority The priority value is used to determine which ports are put
in the forwarding state and which ports are put in the
blocking state. A port with a lower priority value is more
likely to be put into a forwarding state.
spanning-tree cost cost Specify the spanning-tree path cost for the port. (Range:
0–200,000,000). The default cost is 0, which signifies that
the cost is automatically calculated based on port speed.
CTRL + Z Exit to Privileged EXEC mode.
show spanning-tree View spanning tree configuration information for the
interface specified port or LAG (port channel).
Command Purpose
configure Enter global configuration mode.
spanning-tree mst Enable configuring an MST region by entering the
configuration multiple spanning-tree (MST) mode.
name string Define the MST configuration name
revision version Identify the MST configuration revision number.
instance instance-id Map VLANs to an MST instance.
{add | remove} vlan • instance-ID — ID of the MST instance. (Range: 1-4094)
vlan-range
• vlan-range — VLANs to be added to the existing MST
instance. To specify a range of VLANs, use a hyphen. To
specify a series of VLANs, use a comma. (Range: 1-4093)
exit Return to global configuration mode.
spanning-tree mst Set the switch priority for the specified spanning-tree
instance-id priority instance.
priority • instance-id — ID of the spanning-tree instance. (Range:
1-4094)
• priority — Sets the switch priority for the specified
spanning-tree instance. This setting affects the likelihood
that the switch is selected as the root switch. A lower
value increases the probability that the switch is selected
as the root switch. (Range: 0-61440)
CTRL + Z Exit to Privileged EXEC mode.
show spanning-tree mst- View multiple spanning tree configuration information.
configuration
show spanning-tree View information about the specified MSTI.
instance instance-id
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified interface.
The interface variable includes the interface type and number,
for example tengigabitethernet 1/0/3 or port-channel 4.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10, 11,
and 12. The range keyword is also valid for LAGs (port
channels).
spanning-tree mst 0 Set the external cost for the common spanning tree. (Range:
external-cost cost 0–200000000)
spanning-tree mst Configure the path cost for MST calculations. If a loop occurs,
instance-id cost cost the spanning tree considers path cost when selecting an
interface to put in the forwarding state.
• instance-ID — ID of the spanning -tree instance. (Range: 1-
4094)
• cost — The port path cost. (Range: 0–200,000,000)
spanning-tree mst Specify the priority of the port.
instance-id port- The priority value is used to determine which ports are put in
priority priority the forwarding state and which ports are put in the blocking
state. A port with a lower priority value is more likely to be put
into a forwarding state.
• instance-ID — ID of the spanning-tree instance. (Range: 1-
4094)
• priority — The port priority. (Range: 0–240 in multiples of 16)
CTRL + Z Exit to Privileged EXEC mode.
show spanning-tree View MST configuration information for the specified port or
interface instance LAG (port channel) and instance.
instance-id
Configuring STP
This example shows a LAN with four switches. On each switch, ports 1, 2, and
3 connect to other switches, and ports 4–20 connect to hosts (in Figure 23-16,
each PC represents 17 host systems).
To make multiple switches be part of the same MSTP region, make sure the
STP operational mode for all switches is MSTP. Also, make sure the MST
region name and revision level are the same for all switches in the region.
To configure the switches:
1 Create VLAN 10 (Switch A and Switch B) and VLAN 20 (all switches).
NOTE: Even Switch B does not have any ports that are members of VLAN 10,
this VLAN must be created to allow the formation of MST regions made up of
all bridges that exchange the same MST Configuration Identifier. It is only
within these MST Regions that multiple instances can exist.
console#configure
console(config)#vlan database
console(config-vlan)#vlan 10
console(config-vlan)#vlan 20
console(config-vlan)#exit
What Is ISDP?
The Industry Standard Discovery Protocol (ISDP) is a proprietary Layer 2
network protocol that inter-operates with Cisco devices running the Cisco
Discovery Protocol (CDP). ISDP is used to share information between
neighboring devices. The switch software participates in the CDP protocol
and is able to both discover and be discovered by other CDP-supporting
devices.
What is LLDP?
LLDP is a standardized discovery protocol defined by IEEE 802.1AB. It allows
stations residing on an 802 LAN to advertise major capabilities physical
descriptions, and management information to physically adjacent devices
allowing a network management system (NMS) to access and display this
information.
What is LLDP-MED?
LLDP-MED is an extension of the LLDP standard. LLDP-MED uses LLDP's
organizationally-specific Type- Length-Value (TLV) extensions and defines
new TLVs that make it easier for a VoIP deployment in a wired or wireless
LAN/MAN environment. It also makes mandatory a few optional TLVs from
LLDP and recommends not transmitting some TLVs.
The TLVs only communicate information; these TLVs do not automatically
translate into configuration. An external application may query the MED
MIB and take management actions in configuring functionality.
Command Purpose
configure Enter Global Configuration mode.
isdp enable Administratively enable ISDP on the switch.
isdp advertise-v2 Allow the switch to send ISDPv2 packets.
isdp holdtime time Specify the number of seconds the device that receives
ISDP packets from the switch should store information
sent in the ISDP packet before discarding it.
isdp timer time Specify the number of seconds to wait between sending
new ISDP packets.
exit Exit to Privileged EXEC mode.
show isdp View global ISDP settings.
Command Purpose
configure Enter Global Configuration mode.
interface interface Enter interface configuration mode for the specified
interface.
isdp enable Administratively enable ISDP on the switch.
exit Exit to Global Config mode.
exit Exit to Privileged Exec mode.
show isdp interface all View the ISDP mode on all interfaces.
Command Purpose
show isdp entry {all | View information about all entries or a specific entry in the
deviceid} ISDP table.
show isdp neighbors View the neighboring devices discovered through ISDP.
clear isdp table Clear all entries, including discovered neighbors, from the
ISDP table.
show isdp traffic View ISDP statistics.
clear isdp counters Reset all ISDP statistics to zero.
Command Purpose
configure Enter Global Configuration mode.
lldp notification- Specify how often, in seconds, the switch should send
interval interval remote data change notifications.
lldp timers [interval Configure the timing for local data transmission on ports
transmit-interval] [hold enabled for LLDP.
hold-value] [reinit reinit- • transmit-interval — The interval in seconds at which to
delay] transmit local data LLDP PDUs. (Range: 5–32768
seconds)
• hold-value — Multiplier on the transmit interval used to
set the TTL in local data LLDP PDUs. (Range: 2–10)
• reinit-delay — The delay in seconds before re-
initialization. (Range: 1–10 seconds)
exit Exit to Privileged EXEC mode.
show lldp View global LLDP settings.
Command Purpose
configure Enter Global Configuration mode.
interface interface Enter interface configuration mode for the specified
Ethernet interface.
lldp transmit Enable the LLDP advertise (transmit) capability.
lldp receive Enable the LLDP receive capability so that the switch can
receive LLDP Protocol Data Units (LLDP PDUs) from
other devices.
lldp transmit-mgmt Include the transmission of local system management
address information in the LLDP PDUs.
Command Purpose
show lldp local-device View LLDP information advertised by all ports or the
{all | interface | detail specified port. Include the keyword detail to see additional
interface} information.
show lldp remote-device View LLDP information received by all ports or by the
{all | interface | detail specified port. Include the keyword detail to see additional
interface} information.
clear lldp remote-data Delete all LLDP information from the remote data table.
show lldp statistics View LLDP traffic statistics.
clear lldp statistics Reset the LLDP statistics counters to zero.
Command Purpose
configure Enter Global Configuration mode.
lldp med Specifies the number of LLDP PDUs that will be
faststartrepeatcount transmitted when the protocol is enabled.
count
interface interface Enter interface configuration mode for the specified
Ethernet interface.
lldp med Enable LLDP-MED on the interface.
lldp med Allow the port to send topology change notifications.
confignotification
lldp med transmit-tlv Specify which optional TLVs in the LLDP MED set are
[capabilities] [network- transmitted in the LLDP PDUs.
policy] [location]
[inventory]
exit Exit to Global Config mode.
exit Exit to Privileged EXEC mode.
show lldp med View global LLDP-MED settings.
show lldp med interface View LLDP-MED settings for all ports or for the specified
{all | interface} port.
Command Purpose
show lldp med local- View LLDP information advertised by the specified port.
device detail interface
show lldp remote-device View LLDP-MED information received by all ports or by
{all | interface | detail the specified port. Include the keyword detail to see
interface} additional information.
Configuring ISDP
This example shows how to configure ISDP settings on the switch.
To configure the switch:
1 Specify the number of seconds that a remote device should keep the ISDP
information sent by the switch before discarding it.
console#configure
console(config)#isdp holdtime 60
2 Specify how often, in seconds, the ISDP-enabled ports should transmit
information.
console(config)#isdp timer 45
3 Enable ISDP on interface 1/0/3.
console(config)#interface tengigabitEthernet1/0/3
console(config-if-Te1/0/3)#isdp enable
Interface Mode
--------------- ----------
Te1/0/3 Enabled
Configuring LLDP
This example shows how to configure LLDP settings for the switch and to
allow 10-Gigabit Ethernet port 1/0/3 to transmit all LLDP information
available.
To configure the switch:
1 Configure the transmission interval, hold multiplier, and reinitialization
delay for LLDP PDUs sent from the switch.
console#configure
console(config)#lldp timers interval 60 hold 5
reinit 3
2 Enable port 1/0/3 to transmit and receive LLDP PDUs.
console(config)#interface TengigabitEthernet1/0/3
console(config-if-Te1/0/3)#lldp transmit
console(config-if-Te1/0/3)#lldp receive
Interface: Te1/0/3
Feature Description
Flow control Allows traffic transmission between a switch port and another
Ethernet device to be paused for a specified period of time when
congestion occurs.
Storm control Limits the amount of broadcast, unknown unicast, and multicast
frames accepted and forwarded by the switch.
Protected ports Prevents traffic from flowing between members of the same
protected port group.
LLPF Filters proprietary protocols that should not normally be relayed
by a bridge.
Feature Default
Flow control Enabled
Storm control Disabled
Protected ports None
LLPF No protocols are blocked
5 Click Apply.
5 Click Apply.
6 Click Protected Port Configuration to return to the main page.
7 Select the port to add to the group.
8 Select the protected port group ID.
9 Click Apply.
10 To view protected port group membership information, click Show All.
11 To remove a port from a protected port group, select the Remove check
box associated with the port and click Apply.
LLPF Configuration
Use the LLPF Interface Configuration page to filter out various proprietary
protocol data units (PDUs) and/or ISDP if problems occur with these
protocols running on standards-based switches.
To display the LLPF Interface Configuration page, click Switching →
Network Security → Proprietary Protocol Filtering → LLPF Interface
Configuration the navigation menu.
To view the protocol types that have been blocked for an interface, click Show
All.
Command Purpose
configure Enter global configuration mode.
flowcontrol Globally enable flow control.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
storm-control broadcast Enable broadcast storm recovery mode on the interface
[level rate] and (optionally) set the threshold.
rate — threshold as percentage of port speed. The
percentage is converted to a PacketsPerSecond value based
on a 512 byte average packet size.
storm-control multicast Enable multicast storm recovery mode on the interface
[level rate] and (optionally) set the threshold.
rate — threshold as percentage of port speed. The
percentage is converted to a PacketsPerSecond value based
on a 512 byte average packet size.
storm-control unicast Enable unknown unicast storm recovery mode on the
[level rate] interface and (optionally) set the threshold.
rate — threshold as percentage of port speed. The
percentage is converted to a PacketsPerSecond value based
on a 512 byte average packet size.
Command Purpose
configure Enter global configuration mode.
switchport protected Specify a name for one of the three protected port groups.
groupid name name • groupid — Identifies which group the port is to be
protected in. (Range: 0-2)
• name — Name of the group. (Range: 0-32 characters)
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3.
switchport protected Add the interface to the specified protected port group.
groupid
CTRL + Z Exit to Privileged EXEC mode.
show switchport View protected group and port information.
protected
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
service-acl input Use the appropriate keyword, or combination of keywords
{blockcdp | blockvtp | to block any (or all) of the following PDUs on the
blockdtp | blockudld | interface:
blockpagp | blocksstp | • VTP
blockall}
• DTP
• UDLD
• PAgP
• SSTP
• All
CTRL + Z Exit to Privileged EXEC mode.
show service-acl View information about the blocked PDUs on the
interface {interface | specified interface or all interfaces.
all}
Protocol Mode
--------------- ----------
CDP Disabled
VTP Enabled
DTP Disabled
UDLD Disabled
PAGP Enabled
SSTP Disabled
ALL Disabled
L2 Multicast Overview
Multicast traffic is traffic from one source that has multiple destinations. The
L2 multicast features on the switch help control network flooding of Ethernet
multicast and IP multicast traffic by keeping track of multicast group
membership.
When the IGMP snooping querier is enabled, the IGMP snooping querier
sends out periodic IGMP queries that trigger IGMP report messages from the
switch that wants to receive IP multicast traffic. The IGMP snooping feature
listens to these IGMP reports to establish appropriate forwarding.
5 Click Apply.
The IGMP Snooping settings are modified, and the device is updated.
2 Select the Edit checkbox for each Port, LAG, or VLAN to modify.
3 Edit the MLD Snooping fields as needed.
4 Click Apply.
The MLD Snooping settings are modified, and the device is updated.
Adding a New VLAN and Configuring its MLD Snooping VLAN Querier Settings
To configure an MLD snooping VLAN querier:
1 From the VLAN Querier page, click Add.
The page refreshes, and the Add VLAN page displays.
3 For each port or LAG to configure, select the check box in the Edit
column in the row associated with the port.
4 Specify the desired timer values.
5 Click Apply.
GMRP Parameters
Use the GMRP Parameters page to configure the administrative mode of
GMRP on the switch and on each port or LAG.
To display the GMRP Parameters page, click Switching → GARP → GMRP
Parameters in the navigation panel.
3 For each port or LAG to configure, select the check box in the Edit
column in the row associated with the port.
4 Specify the desired timer values.
5 Click Apply.
Command Purpose
configure Enter global configuration mode.
mac address-table Enable multicast filtering on the switch.
multicast filtering
mac address-table Register a MAC-layer Multicast address in the bridge
multicast static vlan table.
vlan-id {mac-multicast- • mac-multicast-address — MAC multicast address in the
address | ip-multicast- format xxxx.xxxx.xxxx.
address}
• ip- multicast-address — IP multicast address.
mac address-table Add ports and LAGs to the multicast group as static
multicast static vlan members.
vlan-id {mac-multicast- • add — Adds ports to the group. If no option is specified,
address | ip-multicast- this is the default option.
address} [add|remove]
interface interface-list • remove — Removes ports from the group.
• interface-list — Specifies the interface type (port-
channel, tengigabitethernet) and number. Separate
nonconsecutive interfaces with a comma and no spaces;
use a hyphen to designate a range of ports.
Command Purpose
configure Enter global configuration mode.
ip igmp snooping Globally enable IGMP snooping on the switch. (IGMP
snooping is disabled by default.)
interface interface Enter interface configuration mode for the specified port
or LAG. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3. For a
LAG, the interface type is port-channel.
You can also specify a range of ports with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
ip igmp snooping Enable IGMP snooping (auto-learn) on the interface.
ip igmp snooping host- Specify the host time-out value for the interface. If an
time-out time-out IGMP report for a multicast group is not received in the
number of seconds specified by the time-out value, this
interface is deleted from the member list of that multicast
group.
ip igmp snooping Specify the leave time-out value for an interface. If an
leavetime-out {time-out IGMP report for a multicast group is not received within the
| immediate-leave} number of seconds specified by the leave-time-out period
after an IGMP leave was received from a specific interface,
the current interface is deleted from the member list of that
multicast group.
• time-out — Specifies the leave-time-out in seconds.
(Range: 1 - 25)
• immediate-leave — Specifies that the interface should
be removed immediately from the members list after
receiving IGMP Leave.
Command Purpose
configure Enter global configuration mode.
vlan database Enter VLAN Configuration mode.
ip igmp snooping vlan-id Enable IGMP snooping on the specified VLAN.
ip igmp snooping Specify the host time-out value for the specified VLAN. If
groupmembership- an IGMP report for a multicast group is not received in
interval vlan-id seconds the number of seconds specified by the seconds value, this
VLAN is deleted from the member list of that multicast
group.
ip igmp snooping Specify the leave time-out value for the VLAN. If an
maxresponse vlan-id IGMP report for a multicast group is not received within
seconds the number of seconds configured with this command
after an IGMP leave was received from a specific interface,
the current VLAN is deleted from the member list of that
multicast group.
ip igmp snooping fast- Enables IGMP snooping fast-leave mode on the specified
leave vlan-id VLAN. Enabling fast-leave allows the switch to
immediately remove the layer 2 LAN interface from its
forwarding table entry upon receiving an IGMP leave
message for that multicast group without first sending out
MAC-based general queries to the interface.
Command Purpose
configure Enter global configuration mode.
ip igmp snooping querier Enable the IGMP snooping querier on the switch or on
[vlan vlan-id] [address the VLAN specified with the vlan-id parameter.
ip-address] Use the optional ip-address parameter to specify the IP
address that the snooping querier switch should use as the
source address when generating periodic queries.
ip igmp snooping querier Set the IGMP snooping querier query interval time, which
query-interval interval- is the amount of time in seconds that the switch waits
count before sending another periodic query. The range is
1–1800 seconds.
ip igmp snooping querier Set the IGMP snooping querier timer expiration period.
timer expiry seconds This is the time period, in seconds, that the switch
remains in non-querier mode after it has discovered that
there is a multicast querier in the network.
ip igmp snooping querier Set the IGMP version of the query that the switch sends
version version periodically. The version range is 1–2.
vlan database Enter VLAN Configuration mode.
ip igmp snooping querier Enable the IGMP snooping querier on the specified
vlan-id VLAN.
Command Purpose
configure Enter global configuration mode.
ipv6 mld snooping Enable MLD snooping on the switch.
interface interface Enter interface configuration mode for the specified port
or LAG. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3. For a
LAG, the interface type is port-channel.
You can also specify a range of ports with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
ipv6 mld snooping Enable MLD snooping (auto-learn) on the interface.
ipv6 mld snooping Specify the host time-out value for the interface. If an
groupmembership- MLD report for a multicast group is not received in the
interval seconds number of seconds specified by the seconds value, this
interface is deleted from the member list of that multicast
group.
Command Purpose
configure Enter global configuration mode.
vlan database Enter VLAN Configuration mode.
ipv6 mld snooping vlan- Enable MLD snooping on the specified VLAN.
id
ipv6 mld snooping Specify the host time-out value for the specified VLAN. If
groupmembership- an MLD report for a multicast group is not received in the
interval vlan-id seconds number of seconds specified by the seconds value, this
VLAN is deleted from the member list of that multicast
group.
Command Purpose
configure Enter global configuration mode.
ipv6 mld snooping Enable the MLD snooping querier on the switch.
querier
vlan database Enter VLAN Configuration mode
ipv6 mld snooping Enable the MLD snooping querier on VLAN specified
querier vlan-id [address with the vlan-id parameter.
ipv6-address] Use the optional ip-address parameter to specify the IP
address that the snooping querier switch should use as the
source address when generating periodic queries.
Configuring MVR
Beginning in Privileged EXEC mode, use the following commands to
configure MVR features on the switch.
Command Purpose
configure Enter global configuration mode.
mvr Enable MVR on the switch.
mvr vlan vlan-id Set the VLAN to use as the multicast VLAN for MVR.
mvr querytime time Set the MVR query response time. The value for time is in
units of tenths of a second.
Command Purpose
configure Enter global configuration mode.
garp timer {join | leave | Adjust the GARP application join, leave, and leaveall
leaveall} timer_value GARP timer values
The timer_value variable is in centiseconds. The range is
10-100 for join, 20-600 for leave, and 200-6000 for
leaveall.
gmrp enable Enable GMRP globally on the switch.
interface interface Enter interface configuration mode for the specified port
or LAG. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3. For a
LAG, the interface type is port-channel.
You can also specify a range of ports with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
gmrp enable Enable GMRP on the interface or range of interfaces.
exit Exit to Global Config mode.
exit Exit to Privileged EXEC mode.
show gmrp configuration View the administrative status of GMRP on the switch
and all interfaces.
No Binding
Discover Release
Request NACK
Decline
NACK
The binding database includes data for clients only on untrusted ports.
To remove a static binding, select the Remove checkbox associated with the
binding and click Apply.
To view a summary of the DAI status for all interfaces, click Show All.
To view a summary of the DAI status for all VLANs, click Show All.
To remove an ARP ACL, select the Remove checkbox associated with the
ACL and click Apply.
To view a summary of the ARP ACL rules that have been created, click Show
All.
To remove an ARP ACL rule, select the Remove checkbox associated with the
rule and click Apply.
Command Purpose
configure Enter global configuration mode.
ip dhcp snooping Enable DHCP snooping on the switch.
ip dhcp snooping verify Enable the verification of the source MAC address with
mac-address the client MAC address in the received DHCP message.
ip dhcp snooping log- Enable the logging of DHCP messages filtered by the
invalid DHCP Snooping application.
ip dhcp snooping Configure a static binding in the DHCP snooping static
binding mac-address bindings database.
vlan vlan-id ip-address • mac-address —The client's MAC address.
interface interface
• vlan-id —The number of the VLAN the client is
authorized to use.
• ip-address —The IP address of the client.
• interface —The interface on which the client is
authorized. The form is unit/port.
ip dhcp snooping Configure the persistent storage location of the DHCP
database {local | snooping database.
tftp://hostIP/filename } • hostIP —The IP address of the remote host.
• filename —The name of the file for the database on the
remote host.
ip dhcp snooping Configure the interval, in seconds, at which the DHCP
database write-delay Snooping database will be stored in persistent storage. The
seconds number of seconds can range from 15–86400.
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified port
or LAG. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3. For a
LAG, the interface type is port-channel.
You can also specify a range of ports with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
ip verify source [port- Enable IPSG on the port or LAG to prevent packet
security] forwarding if the source IP address in the packet is not in
the DHCP snooping binding database. Use the option
port-security keyword to also prevent packet forwarding if
the sender MAC address is not in forwarding database
table or the DHCP snooping binding database. \
NOTE: To enforce filtering based on the source MAC
address, port security must also be enabled on the interface
by using the port security command in Interface
Configuration mode.
exit Exit to Global Config mode.
ip verify binding Configure a static binding for IPSG.
mac_addr vlan vlan_id
ipaddr interface interface
exit Exit to Privileged EXEC mode.
show ip verify interface View IPSG parameters for a specific port or LAG. The
interface interface parameter includes the interface type
(tengigabitethernet or port-channel) and number.
show ip verify source View IPSG bindings configured on the switch or on a
[interface interface] specific port or LAG.
show ip source binding View IPSG bindings.
Command Purpose
configure Enter global configuration mode.
ip arp inspection vlan Enable Dynamic ARP Inspection on a single VLAN or a
vlan-range [logging] range of VLANs. Use the logging keyword to enable
logging of invalid packets.
ip arp inspection Enable additional validation checks like source MAC
validate {[src-mac] [dst- address validation, destination MAC address validation, or
mac] [ip]} IP address validation on the received ARP packets.
Each command overrides the configuration of the
previous command. For example, if a command enables
source MAC address and destination validations and a
second command enables IP address validation only, the
source MAC address and destination MAC address
validations are disabled as a result of the second
command.
• src-mac—For validating the source MAC address of an
ARP packet.
• dst-mac—For validating the destination MAC address of
an ARP packet.
• ip—For validating the IP address of an ARP packet.
arp access-list acl-name Create an ARP ACL with the specified name (1–31
characters) and enter ARP Access-list Configuration mode
for the ACL.
permit ip host sender-ip Configure a rule for a valid IP address and MAC address
mac host sender-mac combination used in ARP packet validation.
• sender-ip — Valid IP address used by a host.
• sender-mac —Valid MAC address in combination with
the above sender-ip used by a host.
exit Exit to Global Config mode.
The commands in this example also enforce rate limiting and remote storage
of the bindings database. The switch has a limited amount of storage space in
NVRAM and flash memory, so the administrator specifies that the DHCP
snooping bindings database is stored on an external TFTP server.
VLAN
When members are added to a LAG, they are removed from all existing
VLAN membership. When members are removed from a LAG they are added
back to the VLANs that they were previously members of as per the
configuration file. Note that a port’s VLAN membership can still be
configured when it's a member of a LAG. However this configuration is only
actually applied when the port leaves the LAG.
The LAG interface can be a member of a VLAN complying with IEEE
802.1Q.
STP
Spanning tree does not maintain state for members of a LAG, but the
Spanning Tree does maintain state for the LAG interface. As far as STP is
concerned, members of a LAG do not exist. (Internally, the STP state of the
LAG interface is replicated for the member links.)
When members are deleted from a LAG they become normal links, and
spanning tree maintains their state information.
Statistics
Statistics are maintained for all LAG interfaces as they are done for the
physical ports, besides statistics maintained for individual members as per the
802.3ad MIB statistics.
LAG Configuration
Use the LAG Configuration page to set the name and administrative status
(up/down) of a LAG.
To display the LAG Configuration page, click Switching → Ports → LAG
Configuration in the navigation panel.
3 Select the Edit check box associated with each port to configure.
4 Specify the LACP port priority and LACP timeout for each port.
5 Click Apply.
3 Click Apply.
The LAG port is added as a dynamic LAG member to the selected LAG.
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified LAG.
The interface variable includes the interface type, which is
port-channel, and the LAG number, for example port-
channel 3.
You can also specify a range of LAGs with the interface
range port-channel command, for example, interface
range port-channel 3-6 configures LAGs 3, 4, 5, and 6.
description description Configure a description for the LAG or range of LAGs
port-channel min-links Set the minimum number of links that must be up in
minimum order for the port channel interface to be declared up.
exit Exit to Global Config mode.
CTRL + Z Exit to Privileged EXEC mode.
show interfaces View the configured description for the specified LAG.
description port-channel
port-channel number
show interfaces port- View LAG information for the specified LAG or for all
channel [port-channel LAGs.
number]
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified port.
The interface variable includes the interface type and
number, for example tengigabitethernet 1/0/3.
You can also specify a range of ports with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
channel-group port- Add the port(s) to the LAG specified with the port-
channel-number mode channel-number value. Use the auto keyword to add the
{on | auto} port(s) as dynamic members, or use on to specify that the
LAG membership is static.
• port-channel-number — Number of a valid port-channel
for the current port to join.
• on — Forces the port to join a channel without LACP
(static LAG).
• active — Forces the port to join a channel with LACP
(dynamic LAG).
exit Exit to Global Config mode.
interface port-channel Enter interface configuration mode for the specified LAG.
number You can also specify a range of LAGs to configure with the
interface range port-channel command, for example,
interface range port-channel 1-3,10 configures LAGs 1, 2,
3, and 10.
Command Purpose
configure Enter global configuration mode.
lacp system-priority Set the Link Aggregation Control Protocol priority for the
value switch. the priority value range is 1–65535.
interface port-channel Enter interface configuration mode for the specified LAG.
number You can also specify a range of LAGs to configure with the
interface range port-channel command, for example,
interface range port-channel 1-3,10 configures LAGs 1, 2,
3, and 10.
lacp port-priority value Set the Link Aggregation Control Protocol priority for the
port or range of ports. The priority value range is 1–65535.
lacp timeout {long | Specify whether to wait a long or short time between
short} LACP PDU transmissions.
exit Exit to Privileged EXEC mode.
show lacp interface View LACP parameters for an Ethernet interface or a LAG.
The interface parameter includes the interface type
(tengigabitethernet or port-channel) and number.
NOTE: The examples in this section show the configuration of only one switch.
Because LAGs involve physical links between two switches, the LAG settings
and member ports must be configured on both switches.
Feature Description
PFC Provides a way to distinguish which traffic on a physical link is
paused when congestion occurs based on the priority of the traffic.
Feature Description
DCBx Allows DCB devices to exchange configuration information, using
type-length-value (TLV) information elements over LLDP, with
directly connected peers.
FIP Snooping Inspects and monitors FIP frames and applies policies based upon
the L2 header information in those frames
ETS Supports the ETS configuration and Application Priority TLVs,
which are accepted from auto-upstream devices and propagated to
auto-downstream devices. The 8024 switch only transports the ETS
TLVs and does not configure itself with received ETS information.
ETS configuration parameters may be entered manually on the
PC8024. The PC8132/PC8164 switches support the automatic
configuration of the switch with received ETS parameters.
Feature Default
PFC Disabled, no priority classifications are
configured.
DCBx version Auto detect
FIP snooping Disabled globally and on all VLANs
FC map value 0x0efc00
FIP snooping port mode Host facing (not FCF facing)
When PFC is disabled, the interface defaults to the IEEE 802.3 flow control
setting for the interface. PFC is disabled by default.
If you enable priority-based flow control for a particular priority value on an
interface, ensure that Voice VLAN tagging is enabled on the interface so that
the 802.1p priority values are carried through the network (see "Voice VLAN"
on page 545). Additionally, make sure that 802.1p priority values are mapped
to CoS values (see "Configuring Class-of-Service" on page 1133).
PFC can be configured using the web interface and the command line
interface.
NOTE: FIP snooping can be enabled, configured, and monitored only by using
the CLI.
NOTE: If DCBx is enabled and the switch is set to autoconfigure from a DCBX
peer, configuring PFC is not necessary because the DCBx protocol automatically
configures the PFC parameters.
Command Purpose
configure Enter global configuration mode.
CAUTION: All ports may be briefly shutdown when modifying either flow
control (FC) or PFC settings. PFC uses a control packet defined in
802.1Qbb and is not compatible with 802.3x FC.
Disabling DCBX
If it is desired to disable DCBX, the network operator can use the following
commands to eliminate the transmission of DCBX TLVs in the LLDP frames
on an interface:
no lldp tlv-select dcbxp application-priority
no lldp tlv-select dcbxp congestion-notification
no lldp tlv-select dcbxp ets-config
no lldp tlv-select dcbxp ets-recommend
no lldp tlv-select dcbxp pfc
Configuring DCBx
You can use the CLI to configure DCBx.
Beginning in Privileged EXEC mode, use the following commands to
configure DCBx.
Command Purpose
configure Enter global configuration mode.
lldp dcbx version {auto Optionally configure the administrative version for the
| cin | cee | ieee} DCBx protocol:
• auto—Automatically select the version based on the peer
response (default)
• cin—Force the mode to Cisco-Intel-Nuova. (DCBx 1.0)
• cee—Force the mode to CEE (DCBx 1.06)
• ieee—Force the mode to IEEE 802.1Qaz
lldp tlv-select dcbxp Enable LLDP to send specific DCBx TLVs if LLDP is
[pfc | application- enabled to transmit on the given interface. Entering the
priority] command with no parameters enables transmission of all
TLVs.
• pfc—Transmit the PFC configuration TLV
• application-priority—Transmit the application priority
TLV
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
FIP Snooping
The FCoE Initialization Protocol (FIP) is used to perform the functions of
FC_BB_E device discovery, initialization, and maintenance. FIP uses a
separate EtherType from FCoE to distinguish discovery, initialization, and
maintenance traffic from other FCoE traffic. FIP frames are standard
Ethernet size (1518 Byte 802.1q frame), whereas FCoE frames are a
maximum of 2240 bytes. FIP Snooping is supported on the PC80xx switches.
FIP snooping is a frame inspection method used by FIP Snooping Bridges to
monitor FIP frames and apply policies based upon the L2 header information
in those frames.
FIP snooping allows for:
• Auto configuration of Ethernet ACLs based on information in the
Ethernet headers of FIP frames.
• Emulation of FC point-to-point links within the DCB Ethernet network.
• Enhanced FCoE security/robustness by preventing FCoE MAC spoofing.
The role of FIP snooping-enabled ports on the switch falls under one of the
following types:
• Perimeter or Edge port (connected directly to a Fibre Channel end node or
ENode).
• Fibre Channel forwarder (FCF) facing port (that receives traffic from
FCFs targeted to the ENodes).
NOTE: The PowerConnect 8024/8024F FIP Snooping Bridge feature supports the
configuration of the perimeter port role and FCF-facing port roles and is intended
for use only at the edge of the switched network.
Command Purpose
configure Enter global configuration mode.
feature fip-snooping Globally enable FIP snooping on the switch.
vlan vlan_id Enter VLAN configuration mode for a VLAN or range of
VLANs.
fip-snooping enable Enable the snooping of FIP packets on the specified VLAN
or VLAN range.
fip-snooping fc-map Optionally configure the FC-MAP value on a VLAN. The
fc_map_value FC map value is used to help prevent the switch from
being incorrectly configured. The range for fc_map_value
is 0x0–0xffffff.
The FC map value configured on the switch must match
the FC map value configured on the FCF for the VLAN.
exit Exit to global configuration mode.
interface interface Enter interface configuration mode for the specified
interface. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3.
You can also specify a range of interfaces with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
fip-snooping port-mode Configure the interface to be connected to a FCF switch.
fcf
CTRL + Z Exit to Privileged EXEC mode.
show fip-snooping Display information about the active FIP snooping
sessions sessions.
FCF Switch
PowerConnect
Switch FC SAN
Workgroup
Cluster
FCF Switch
FC SAN
ETS Operation
The normal (default) operation of PowerConnect switches, when
uncongested, is that packets are scheduled for output in the order in which
they are received, that is, using FIFO scheduling. The class of service (CoS)
mechanism enables the administrator to schedule packets for output ahead of
other packets when the switch is congested, choose which type of packets to
drop when the switch is congested, and assign a minimum bandwidth
guarantee to ensure scheduling fairness. These mechanisms operate at the
CoS queue level; that is, the minimum bandwidth guarantees are made
across all configured CoS queues.
NOTE: CoS queue 7 is reserved for internal traffic. Non-strict priority CoS queues
are serviced with WDRR scheduling using the bandwidth available after strict
priority traffic is serviced.
Each CoS queue in the first level scheduler is mapped to one of the three
traffic class groups in the second level scheduler. There, frames are serviced
using the TCG configuration. The minimum bandwidth guarantee is first
calculated across the TCGs. Strict priority TCGs are scheduled first but have
their bandwidth reduced by the minimum bandwidth guarantees configured
on other TCGs. Strict priority TCGs are scheduled from highest numbered
TCG to lowest. When all TCGs have met their minimum bandwidth limits
Command Purpose
classofservice traffic- Maps the internal Traffic Class to an internal Traffic Class
class-group Group (TCG). The Traffic Class can range from 0-6,
although the actual number of available traffic classes
depends on the platform.
traffic-class-group max- Specifies the maximum transmission bandwidth limit for
bandwidth each TCG as a percentage of the interface rate. Also
known as rate shaping, this has the effect of smoothing
temporary traffic bursts over time so that the transmitted
traffic rate is bound.
traffic-class-group min- Specifies the minimum transmission bandwidth
bandwidth guaranteed for each TCG before processing frames from
lower numbered TCGs on an interface.
traffic-class-group strict Activates the strict priority scheduler mode for each
specified TCG.
traffic-class-group Specifies the scheduling weight for each TCG. The
weight scheduler attempts to balance the traffic selected for
transmission from the TCGs such that, when the switch is
congested, traffic is selected from the round robin
configured TCGs in proportion to their weights.
show classofservice Displays the Traffic Class to Traffic Class Group mapping.
traffic-class-group
show interfaces traffic- Displays the Traffic Class to Traffic Class Group mapping
class-group
Interface...................................... Te1/0/1
Interface Shaping Rate......................... 0 kbps
WRED Decay Exponent............................ 9
Interface...................................... Te1/0/1
In this example, to ensure that the server cluster traffic has low latency, it may
be assigned to a TCG—say, TCG0—and a strict mode of scheduling is
enabled on this group (weight set to 0%). SAN traffic can be assigned to
TCG1 and LAN to TCG2. The TCG1 and TCG2 can be set to a weight of
50% each. With these configurations, Figure 29-3 illustrates how the load is
managed at different times.
When the offered load is 3 Gbps for each traffic type at time t1, the allocated
bandwidth for TCG1 and TCG2 is 3.5 Gbps each. All traffic types, including
IPC, SAN, and LAN, are allowed to be transmitted, since the offered load is
under the allocated bandwidth.
PC81xx Operation
When DCBx is enabled on manually configured ports, it is not necessary for
the ETS parameters to match, regardless of the version of DCBX negotiated
or configured. Configuration mismatches are logged.
In auto configuration mode, ETS parameters from the configuration source
are checked (Max TCs 3 and bandwidth equal to 100%) and if the system is
capable of performing the configuration, it is accepted and propagated as
received to the other auto-configuration ports. The ETS Recommendation
TLVs are preferred over the ETS Configuration TLVs. Auto-configuration via
DCBX overrides manually configured ETS parameters for auto-configured
ports, however, manual configuration is restored should the port be placed
back into the manual port role.
The ETS parameters received via DCBX are modified and applied to the
system via the DCBX Mapping function as follows (references are to the
802.1Qaz parameters):
• Like traffic classes are combined up to the limits of the system; e.g., no
more than 2 lossless CoS queues may be configured.
• The Priority Assignment Table (user priority to CoS queue mapping) is
utilized by the system to map user priorities to the traffic classes (CoS
queues).
• The TSA Assignment Table is converted to use 3 TCGs internally.
Priorities with like characteristics are combined into TCGs, i.e. strict
priority traffic is combined into a TCG, lossless traffic is combined into a
TCG, etc. Generally, strict priority traffic is mapped onto TCG 2, lossless
traffic is mapped onto TCG1 and best effort traffic is mapped onto TCG0.
• The bandwidths from the TC Bandwidth Table are summed based on the
internal TCG mapping and are used to set the TCG weights. Other
switches may assign bandwidth to strict priority queues. This bandwidth is
counted in the sum to ETS 100% validation check, however, internally the
weight for strict priority queues is ignored and they are configured for
Command Purpose
configure Enter global configuration mode.
mac address-table static Add a static MAC source address to the MAC address table.
mac-address vlan vlan-id • mac-address — A valid MAC address in the format
interface interface xxxx.xxxx.xxxx.
• vlan-id —A valid VLAN.
• interface — A valid port or LAG, including the interface
type and number.
mac address-table Specify the number of seconds that must pass before an
aging-time {0 | 10- unused dynamically-learned MAC address is removed from
1000000} the MAC address table. A value of 0 disables the aging time
for the MAC address table.
exit Exit to Privileged EXEC mode.
show mac address-table View information about the entries in the MAC address
[static | dynamic] table. Use the keywords static or dynamic to specify the
address type to view.
For dynamic entries, you can use the clear mac address-
table command to remove entries from the table.
show mac address-table View information about the MAC addresses that have been
{vlan vlan | interface configured or learned on the switch, a specific VLAN, or an
interface [vlan vlan-id]} interface (Ethernet port or LAG/port-channel).
show mac address-table View information about the number of addresses that have
count [{vlan vlan-id been configured or learned on the switch, a specific VLAN,
|interface interface}] or an interface (Ethernet port or LAG/port-channel).
NOTE: In this context, loopback interfaces should not be confused with the
loopback IP address, usually 127.0.0.1, assigned to a host for handling self-routed
packets.
The loopback interface does not behave like a network switching port.
Specifically, there are no neighbors on a loopback interface; it is a pseudo-
device for assigning local addresses so that the other layer 3 devices can
communicate with the switch by using the loopback IP address. The loopback
interface is always up and can receive traffic from any of the existing active
interfaces. Thus, given reachability from a remote client, the address of the
loopback can be used to communicate with the switch through various
VLAN Routing
VLAN routing is required when the switch is used as a layer 3 device. VLAN
routing must be configured to allow the switch to forward IP traffic between
subnets and allow hosts in different networks to communicate.
In Figure 31-1 the PowerConnect switch is configured as an L3 device and
performs the routing functions for hosts connected to the L2 switches. For
Host A to communicate with Host B, no routing is necessary. These hosts are
in the same VLAN. However, for Host A in VLAN 10 to communicate with
Host C in VLAN 20, the PowerConnect switch must perform inter-VLAN
routing.
PowerConnect Switch
L2 Switch
L2 Switch
` ` `
VLAN 10 VLAN 20
Tunnel Interface
Tunnels can be used in networks that support both IPv6 and IPv4. The tunnel
allows non-contiguous IPv6 networks to be connected over an IPv4
infrastructure.
When you create a tunnel, it has the default values shown in Table 31-2
IP Interface Configuration
Use the IP Interface Configuration page to update IP interface data for this
switch. The IP interface configuration includes the ability to configure the
bandwidth, Destination Unreachable messages, and ICMP Redirect
messages.
To display the page, click Routing → IP → IP Interface Configuration in the
navigation panel.
Tunnel Configuration
Use the Tunnels Configuration page to create, configure, or delete a tunnel.
To display the page, click Routing → Tunnels → Configuration in the
navigation panel.
Command Purpose
configure Enter Global Configuration mode.
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN.
ip address {dhcp | none Configure the IP address.
|ip_address subnet_mask Use the dhcp keyword to enable the DHCP client and
[secondary]} obtain an IP address from a network DHCP server. Use
none to release the address obtained from the DHCP
server.
Use ip_address and subnet_mask to assign a static IP
address. If you configure a static address, you can use
the secondary keyword to specify that the address is a
secondary IP address.
ip netdirbcast Enable the forwarding of network-directed broadcasts.
encapsulation {ethernet | Configure the link-layer encapsulation type for the
snap} packet. Routed frames are always ethernet encapsulated
when a frame is routed to a VLAN.
ip proxy-arp Enable proxy ARP on the interface. Without proxy ARP,
the switch responds to an ARP request only if the target
IP address is an address configured on the interface
where the ARP request arrived. This command is not
available in interface range mode.
Command Purpose
configure Enter Global Configuration mode.
interface loopback Create the loopback interface and enter Interface
loopback-id Configuration mode for the specified loopback
interface.
ip address ip_address Configure a static IP address and subnet mask. Use the
subnet_mask [secondary] secondary keyword to specify that the address is a
secondary IP address.
CTRL + Z Exit to Privileged EXEC mode.
show ip interface loopback View interface configuration information for the
loopback-id specified loopback interface.
NOTE: For information about configuring the IPv6 interface characteristics for a
tunnel, see "Configuring IPv6 Routing" on page 1059.
Command Purpose
configure Enter Global Configuration mode.
interface tunnel tunnel-id Create the tunnel interface and enter Interface
Configuration mode for the specified tunnel.
tunnel mode ipv6ip [6to4] Specify the mode of the tunnel. If you use the 6to4
keyword, the tunnel is an automatic tunnel. If you omit
the keyword, the tunnel is a point-to-point (configured)
tunnel.
ipv6 enable Enable IPv6 on this interface using the Link Local
address.
tunnel source {ipv4addr | Specify the source transport address of the tunnel,
vlan vlan-id} either, which can be an IPv4 address or a VLAN routing
interface.
tunnel destination Specify the destination transport IPv4 address of the
ipv4addr tunnel.
CTRL + Z Exit to Privileged EXEC mode.
show interfaces tunnel View configuration information for all tunnels or for the
[tunnel-id] specified tunnel.
DHCP Overview
DHCP is generally used between clients and servers for the purpose of
assigning IP addresses, gateways, and other network settings such as DNS and
SNTP server information.
DH C PD ISC O V ER (broadcast)
DH C PO FFE R (unicast)
` DH C PR EQ U ES T (broadcast)
D HC PA CK (unicast)
5 Click Apply.
4 Click Apply.
Address Pool
Use the Address Pool page to create the pools of IP addresses and other
network information that can be assigned by the server.
To display the Address Pool page, click Routing → IP → DHCP Server →
Address Pool in the navigation panel.
4 Click Apply.
4 Click Apply.
5 Click Apply.
6 To verify that the option has been added to the address pool, open the
Address Pool Options page.
DHCP Bindings
Use the DHCP Bindings page to view information about the clients that
have leased IP addresses from the DHCP server.
To display the DHCP Bindings page, click Routing → IP → DHCP Server →
DHCP Bindings in the navigation panel.
Command Purpose
configure Enter Global Configuration mode.
service dhcp Enable the DHCP server.
ip dhcp ping packets Specify the number, in a range from 2-10, of packets a
DHCP server sends to a pool address as part of a ping
operation.
ip dhcp conflict logging Enable conflict logging on DHCP server
ip dhcp bootp Enable the allocation of the addresses to the BootP client.
automatic
ip dhcp excluded- Specify the IP addresses that a DHCP server should not
address lowaddress assign to DHCP clients. You can specify a single IP
[highaddress] address, or you can specify a contiguous range by using
both the low-address and high-address variables.
exit Exit to Privileged EXEC mode.
show ip dhcp global Verify the global DHCP server configuration.
configuration
Command Purpose
configure Enter Global Configuration mode.
ip dhcp pool name Create a DHCP address pool and enters DHCP pool
configuration mode.
network network-ip Configure the subnet number and mask for a DHCP
[mask | prefixlength] address pool. Clients requesting an IP address can be
assigned any non-excluded IP address within this network.
lease [duration] | Specify the duration of the lease for an IP address that is
infinite}] assigned from a DHCP server to a DHCP client.
• duration— Days the lease is valid. You can optionally
specify the hours and minutes after specifying the days.
• infinite — 60 day lease
default-router address1 Specify the list of default gateway IP addresses to be
[address2....address8] assigned to the DHCP client.
dns-server address1 Specify the list of DNS server IP addresses to be assigned
[address2....address8] to the DHCP client.
domain-name domain Specify the domain name for a DHCP client.
option code {ascii string Manually configure DHCP options.
| hex string1
[string2...string8] | ip
address1
[address2...address8]}
CTRL + Z Exit to Privileged EXEC mode.
show ip dhcp pool View the settings for the specified address pool or for all
configuration {name | configured address pools.
all}
Command Purpose
configure Enter Global Configuration mode.
ip dhcp pool name Create a DHCP address pool and enters DHCP pool
configuration mode.
client-name name Specify the DHCP client name.
hardware-address mac Specify the hardware address of the client in the static
[type] pool.
• mac—MAC address of the hardware platform of the
client consisting of 6 bytes in dotted hexadecimal format.
• type — Indicates the protocol of the hardware platform.
It is 1 for Ethernet and 6 for IEEE 802.
client-identifier Specify the unique identifier for a DHCP client. The
uniqueidentifier unique-identifier is a valid notation in hexadecimal
format.
In some systems, such as Microsoft DHCP clients, the
client identifier is required instead of hardware addresses.
The unique-identifier is a concatenation of the media type
and the MAC address. For example, the Microsoft client
identifier for Ethernet address c819.2488.f177 is
01c8.1924.88f1.77 where 01 represents the Ethernet media
type.
host address [mask | Specify the IP address and (optionally) network mask for a
prefix-length] manual binding to a DHCP client.
lease [duration] | Specify the duration of the lease for an IP address that is
infinite}] assigned from a DHCP server to a DHCP client.
• duration— Days the lease is valid. You can optionally
specify the hours and minutes after specifying the days.
• infinite — 60 day lease
Command Purpose
show ip dhcp binding View the current binding information in the DHCP server
[address] database. Specify the IP address to view a specific binding.
clear ip dhcp binding Delete an automatic address binding from the DHCP
{address | *} server database. Use * to clear all bindings.
show ip dhcp conflict View the current binding conflicts in the DHCP server
[address] database. Specify the IP address to view a specific conflict.
clear ip dhcp conflict Clear an address conflict from the DHCP Server database.
{address | *} Use * to clear all conflicts.
show ip dhcp server View DHCP server statistics.
statistics
clear ip dhcp server Reset all DHCP server statistics to zero.
statistics
Service DHCP...................Enable
Number of Ping Packets.........2
Excluded Address...............192.168.2.1 to 192.168.2.20
1.2.2.2 to 1.5.5.5
192.168.5.1 to 192.168.5.20
192.168.5.100 to 192.168.5.100
Conflict Logging...............Enable
Bootp Automatic................Disable
9 View information about all configured address pools.
console#show ip dhcp pool configuration all
Pool: Engineering
Pool Type.......................... Network
Network............................ 192.168.5.0 255.255.255.0
Lease Time......................... 1 days 0 hrs 0 mins
DNS Servers........................ 192.168.5.11
Default Routers.................... 192.168.5.1
Domain Name........................ engineering.dell.com
Pool: Tyler PC
Pool Type..........................Static
Client Name........................TylerPC
Hardware Address.................. 00:1c:23:55:e9:f3
Hardware Address Type..............ethernet
Host.............................. 192.168.2.10 255.255.255.0
Lease Time........................ 1 days 0 hrs 0 mins
DNS Servers....................... 192.168.2.101
Default Routers................... 192.168.2.1
Domain Name....................... executive.dell.com
Option............................ 69 ip 192.168.1.33
IP Routing Overview
The PowerConnect 8000-series and 8100-series switches are multilayer
switches that support static and dynamic routing. Table 33-1 describes some
of the general routing features that you can configure on the switch.
Feature Description
ICMP message control You can configure the type of ICMP messages that
the switch responds to as well as the rate limit and
burst size.
Default gateway The switch supports a single default gateway. A
manually configured default gateway is more
preferable than a default gateway learned from a
DHCP server.
ARP table The switch maintains an ARP table that maps an
IP address to a MAC address. You can create static
ARP entries in the table and manage various ARP
table settings such as the aging time of
dynamically-learned entries.
Feature Description
ICMP Router Discovery Hosts can use IRDP to identify operational routers
Protocol (IRDP) on the subnet. Routers periodically advertise their
IP addresses. Hosts listen for these advertisements
and discover the IP addresses of neighboring
routers.
Routing table entries You can configure the following route types in the
routing table:
• Default: The default route is the route the switch
will use to send a packet if the routing table does
not contain a longer matching prefix for the
packet's destination.
• Static: A static route is a route that you manually
add to the routing table.
• Static Reject: Packets that match a reject route
are discarded instead of forwarded. The router
may send an ICMP Destination Unreachable
message.
Route preferences The common routing table collects static, local,
and dynamic (routing protocol) routes. When
there is more than one route to the same
destination prefix, the routing table selects the
route with the best (lowest) route preference.
IP Configuration
Use the Configuration page to configure routing parameters for the switch as
opposed to an interface. The IP configuration settings allow you to enable or
disable the generation of various types of ICMP messages.
To display the page, click Routing → IP → Configuration in the navigation
panel.
3 Next to Route Type, use the drop-down box to add a Default, Static, or
Static Reject route.
The fields to configure are different for each route type.
• Default — Enter the default gateway address in the Next Hop IP
Address field.
• Static — Enter values for Network Address, Subnet Mask, Next Hop
IP Address, and Preference.
• Static Reject — Enter values for Network Address, Subnet Mask, and
Preference.
4 Click Apply.
The new route is added to the routing table.
NOTE: For a static reject route, the next hop interface value is Null0. Packets to
the network address specified in static reject routes are intentionally dropped.
To remove a configured route, select the check box in the Remove column of
the route to delete, and click Apply.
Command Purpose
configure Enter global configuration mode.
ip routing Globally enable IPv4 routing on the switch.
ip icmp echo-reply Allow the switch to generate ICMP Echo Reply messages.
ip icmp error-interval Limit the rate at which IPv4 ICMP error messages are sent.
burst-interval [burst- • burst-interval — How often the token bucket is
size] initialized (Range: 0–2147483647 milliseconds).
• burst-size — The maximum number of messages that
can be sent during a burst interval (Range: 1–200).
ip redirects Allow the switch to generate ICMP Redirect messages.
ip default-gateway ip- Configure the global default gateway for the switch. The
address gateway configured here takes precedence over a default
gateway assigned by a network DHCP server.
exit Exit to Privileged EXEC mode.
show ip brief View the global IP settings for the switch.
Command Purpose
configure Enter global configuration mode.
arp ip-address hardware- Create a static ARP entry in the ARP table.
address • ip-address — IP address of a device on a subnet attached
to an existing routing interface.
• hardware-address — A unicast MAC address for that
device.
arp timeout seconds Configure the ARP entry ageout time.
arp resptime seconds Configure the ARP request response timeout.
arp retries integer Configure the ARP count of maximum requests for
retries. The range is 1–10.
arp cachesize integer Configure the maximum number of entries in the ARP
cache.
arp dynamicrenew Allow the ARP component to automatically renew
dynamic ARP entries when they age out.
exit Exit to Privileged EXEC mode.
show arp [brief] View the user-configured (static) ARP entries. The static
entries display regardless of whether they are reachable
over an interface. Use the brief keyword to view only the
ARP table settings.
clear arp-cache [gateway] Remove all dynamic ARP entries from the ARP cache.
Include the keyword gateway to remove gateway entries as
well.
clear arp-cache Remove all dynamic ARP entries from the ARP cache that
management were learned on the management interface.
arp purge ip-address Remove the specified IP address from the ARP cache.
This command removes dynamic and gateway ARP entries
only.
Command Purpose
configure Enter global configuration mode.
interface interface Enter interface configuration mode for the specified
VLAN routing interface. The interface variable includes
the interface type (vlan) and number, for example vlan
100.
ip irdp Enable IRDP on the interface.
ip irdp address ip-address Configure the address that the interface uses to send the
router discovery advertisements.
The allowed addresses are 224.0.0.1 (all-hosts IP
multicast address) or 255.255.255.255 (limited broadcast
address)
ip irdp holdtime seconds Configure the value of the holdtime field of the router
advertisement sent from this interface.
ip irdp maxadvertinterval Configure the maximum time allowed between sending
seconds router advertisements from the interface.
ip irdp minadvertinterval Configure the minimum time allowed between sending
seconds router advertisements from the interface.
ip irdp preference integer Configure the preference of the address as a default
router address relative to other router addresses on the
same subnet.
exit Exit to Global Config mode.
exit Exit to Privileged EXEC mode.
show ip irdp [vlan vlan-id] View the router discovery information for all interfaces,
or for a specified interface.
Command Purpose
configure Enter global configuration mode.
ip route default Configure the default route.
nextHopRtr [preference ] • nextHopRtr — IP address of the next hop router.
• preference — Specifies the preference value
(administrative distance) of an individual static route.
(Range: 1-255)
ip route ip-addr Configure a static route. Use the keyword null instead of
{subnetmask | prefix the next hop router IP address to configure a static reject
length } {nextHopRtr | route.
null} [preference ] • ip-address — IP address of destination interface.
• subnet-mask — Subnet mask of destination interface.
• prefix-length — Length of prefix. Must be preceded
with a forward slash (/). (Range: 0-32 bits)
• nextHopRtr — IP address of the next hop router.
• null — Specifies that the route is a static reject route.
• preference — Specifies the preference value
(administrative distance) of an individual static route.
(Range: 1-255)
ip route distance integer Set the default distance (preference) for static routes.
Lower route preference values are preferred when
determining the best route.
exit Exit to Privileged EXEC mode.
The system limits the number of relay entries to four times the maximum
number of routing interfaces (512 relay entries). There is no limit to the
number of relay entries on an individual interface, and no limit to the number
of servers for a given {interface, UDP port} pair.
Certain configurable DHCP relay options do not apply to relay of other
protocols. You may optionally set a maximum hop count or minimum wait
time using the bootpdhcprelay maxhopcount and bootpdhcprelay
minwaittime commands.
The relay agent relays DHCP packets in both directions. It relays broadcast
packets from the client to one or more DHCP servers, and relays packets to
the client that the DHCP server unicasts back to the relay agent. For other
protocols, the relay agent only relays broadcast packets from the client to the
server. Packets from the server back to the client are assumed to be unicast
directly to the client. Because there is no relay in the return direction for
protocols other than DHCP, the relay agent retains the source IP address from
the original client packet. The relay agent uses a local IP address as the source
IP address of relayed DHCP client packets.
When a switch receives a broadcast UDP packet on a routing interface, the
relay agent verifies that the interface is configured to relay to the destination
UDP port. If so, the relay agent unicasts the packet to the configured server IP
addresses. Otherwise, the relay agent verifies that there is a global
NOTE: If the packet matches a discard relay entry on the ingress interface, the
packet is not forwarded, regardless of the global configuration.
The relay agent relays packets that meet only the following conditions:
• The destination MAC address must be the all-ones broadcast address
(FF:FF:FF:FF:FF:FF).
• The destination IP address must be the limited broadcast address
(255.255.255.255) or a directed broadcast address for the receive interface.
• The IP time-to-live (TTL) must be greater than 1.
• The protocol field in the IP header must be UDP (17).
• The destination UDP port must match a configured relay entry.
3. Select a UDP Destination port name from the menu or enter the UDP
Destination Port ID. Select the Default Set to configure for the relay entry
for the default set of protocols.
4. Enter the IP address of the server to which the packets with the given UDP
Destination Port will be relayed.
5. Click Apply.
The UDP/Helper Relay is added and the device is updated.
Command Purpose
configure Enter global configuration mode.
dhcp l2relay Globally enable L2 DHCP relay on the switch
interface interface Enter interface configuration mode for the specified port
or LAG. The interface variable includes the interface type
and number, for example tengigabitethernet 1/0/3. For a
LAG, the interface type is port-channel.
You can also specify a range of ports with the interface
range command, for example, interface range
tengigabitethernet 1/0/8-12 configures interfaces 8, 9, 10,
11, and 12.
dhcp l2relay Enable L2 DHCP relay on the port(s) or LAG(s).
dhcp l2relay trust Configure the interface(s) to mandate Option-82 on
receiving DHCP packets.
exit Exit to Global Configuration mode.
dhcp l2relay vlan vlan- Enable the L2 DHCP Relay agent for a set of VLANs. All
range DHCP packets which arrive on interfaces in the configured
VLAN are subject to L2 Relay processing.
dhcp l2relay circuit-id Enable setting the DHCP Option 82 Circuit ID for a
vlan vlan-range VLAN. When enabled, the interface number is added as
the Circuit ID in DHCP option 82.
Command Purpose
configure Enter global configuration mode.
ip helper enable Use this command to enable the IP helper feature. It is
enabled by default.
ip helper-address server- Configure the relay of certain UDP broadcast packets
address [dest-udp-port | received on any interface. Specify the one of the protocols
dhcp | domain | isakmp defined in the command or the UDP port number.
| mobile-ip | • server-address — The IPv4 unicast or directed broadcast
nameserver | netbios- address to which relayed UDP broadcast packets are sent.
dgm | netbios-ns | ntp | The server address cannot be an IP address configured on
pim-auto-rp | rip | any interface of the local router.
tacacs | tftp | time]
• dest-udp-port — A destination UDP port number from 0
to 65535.
interface vlan vlan-id Enter interface configuration mode for the specified
VLAN routing interface.
You can also specify a range of VLAN routing interfaces
with the interface range vlan command, for example,
interface range vlan 10,20,30 configures VLAN interfaces
10, 20, and 30.
NOTE: All VLANs must be configured as VLAN routing
interfaces.
DHCP Server
192.168.40.22
DNS Server
192.168.40.43
DHCP Server
192.168.40.35 SNMP Server
192.168.23.1
VLAN 30
L3 Switch
` ` `
`
DHCP Clients
VLAN 10 VLAN 20 (No DHCP)
This example assumes that multiple VLAN routing interfaces have been
created, and configured with IP addresses.
To configure the switch:
1 Relay DHCP packets received on VLAN 10 to 192.168.40.35
console#config
console(config)#interface vlan 10
console(config-if-vlan10)#ip helper-address
192.168.40.35 dhcp
IP helper is enabled
NOTE: In this chapter references to OSPF apply to OSPFv2 and OSPFv3 unless
otherwise noted.
Max Metric
RFC 3137 introduced stub router behavior to OSPFv2. As a stub, a router can
inform other routers that it is not available to forward data packets. This can
be useful if OSPF has run out of resources (for example, memory) to compute
a complete routing table, or to avoid routing transients as OSPF learns its
neighbors and a complete set of routes at startup. Thus, OSPF can enter stub
router mode either automatically (as a result of a resource condition) or by
configuration.
When OSPF enters stub router mode, it re-originates its router LSAs and sets
the metric on each of its non-stub links to the maximum value, 0xFFFF.
Whenever OSPF originates a router LSA while in stub router mode, it sets
the metrics in this way. Stub router mode is global and applies to router LSAs
for all areas. Other routers prefer alternate paths that avoid the stub router;
however, if no alternate path is available, another router may compute a
transit route through a stub router. Because the stub router does not adjust
the metric for stub links in its router LSA, routes to destinations on these
networks are unaffected. Thus, stub router mode does not affect
management connections to the router, even if the router and management
station depend on OSPF routes to communicate with each other.
The feature supports two modes of operation. The network administrator can
put OSPF in stub router mode. OSPF remains in stub router mode until the
network administrator takes OSPF out of stub router mode. Alternatively, the
network administrator can configure OSPF to start in stub router mode for a
configurable period of time after the router boots up. On a stack, the startup
period also applies when a unit takes over as the management unit. The
clear configuration command also restarts OSPF in stub router
OSPF Configuration
Use the Configuration page to enable OSPF on a router and to configure the
related OSPF settings.
To display the page, click Routing → OSPF → Configuration in the navigation
panel.
Use the Delete Stub Area button to remove the stub area.
After you create a virtual link, additional fields display, as the Figure 35-13
shows.
OSPFv3 Configuration
Use the Configuration page to activate and configure OSPFv3 for a switch.
To display the page, click IPv6 → OSPFv3 → Configuration in the navigation
panel.
Use the Delete Stub Area button to remove the stub area.
Command Purpose
configure Enter global configuration mode.
router ospf Enter OSPF configuration mode.
router-id ip-address Set the 4-digit dotted-decimal number that uniquely
identifies the router.
auto-cost reference- Set the reference bandwidth used in the formula to
bandwidth ref_bw compute link cost for an interface:
link cost = ref_bw÷interface bandwidth
The ref_bw variable is the reference bandwidth in Mbps
(Range: 1–4294967).
capability opaque Allow OSPF to store and flood opaque LSAs. An opaque
LSA is used for flooding user defined information within
an OSPF router domain.
compatible rfc1583 (Optional) Enable compatibility with RFC 1583.
If all OSPF routers in the routing domain are capable of
operating according to RFC 2328, OSPF 1583
compatibility mode should be disabled.
Command Purpose
configure Enter global configuration mode.
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN.
ip ospf area area-id Enables OSPFv2 on the interface and sets the area ID of
[secondaries none] an interface. This command supersedes the effects of
network area command.
The area-id variable is the ID of the area (Range: IP
address or decimal from 0 –4294967295)
Use the secondaries none keyword to prevent the interface
from advertising its secondary addresses into the OSPFv2
domain.
ip ospf priority number- Set the OSPF priority for the interface. The number-value
value variable specifies the priority of an interface (Range: 0 to
255).
The default priority is 1, which is the highest router
priority. A value of 0 indicates that the router is not
eligible to become the designated router on this network.
ip ospf retransmit- Set the OSPF retransmit interval for the interface.
interval seconds The seconds variable is the number of seconds between
link-state advertisements for adjacencies belonging to this
router interface.
This value is also used when retransmitting database
descriptions and link-state request packets. Valid values
range from 0 to 3600 seconds (1 hour).
ip ospf hello-interval Set the OSPF hello interval for the interface. This
seconds parameter must be the same for all routers attached to a
network.
The seconds variable indicates the number of seconds to
wait before sending Hello packets from the interface.
(Range: 1–65535).
Command Purpose
configure Enter global configuration mode.
router ospf Enter OSPF configuration mode.
area area-id stub Create a stub area for the specified area ID.
area area-id stub no- Prevent Summary LSAs from being advertised into the
summary stub area.
Command Purpose
configure Enter global configuration mode.
router ospf Enter OSPF configuration mode.
area area-id virtual-link Create the OSPF virtual interface for the specified area-
neighbor-id id and neighbor router. The neighbor-id variable is the IP
address of the neighboring router.
area area-id virtual-link Create the OSPF virtual interface for the specified area-
router-id [authentication id and neighbor router.
[message-digest | null]] Use the optional parameters to configure authentication
[[authentication-key key] for the virtual link. If the area has not been previously
| [message-digest-key key- created, it is created by this command. If the area already
id md5 key]] exists, the virtual-link information is added or modified.
• authentication—Specifies authentication type.
• message-digest—Specifies that message-digest
authentication is used.
• null—No authentication is used. Overrides password or
message-digest authentication if configured for the
area.
• md5—Use MD5 Encryption for an OSPF Virtual Link
• key—Authentication key for the specified interface.
(Range: 8 bytes or less if the authentication type is
simple and 16 bytes or less if the type is encrypt.)
• key-id—Authentication key identifier for the
authentication type encrypt. (Range: 0-255)
area area-id virtual-link Set the OSPF retransmit interval for the virtual link
neighbor-id retransmit- interface.
interval seconds The seconds variable is the number of seconds to wait
between retransmitting LSAs if no acknowledgement is
received. (Range: 0–3600)
Command Purpose
configure Enter global configuration mode.
router ospf Enter OSPF configuration mode.
area area-id range Configure a summary prefix for routes learned in a given area.
ip-address mask • area-id — Identifies the OSPF NSSA to configure. (Range: IP
{summarylink | address or decimal from 0–4294967295)
nssaexternallink}
[advertise • ip-address — IP address.
|not-advertise] • subnet-mask — Subnet mask associated with IP address.
• summarylink — Specifies a summary link LSDB type.
• nssaexternallink — Specifies an NSSA external link LSDB
type.
• advertise — Advertisement of the area range.
• not-advertise — Suppresses advertisement of the area range.
exit Exit to Global Config mode.
exit Exit to Privileged EXEC mode.
show ip ospf range View information about the area ranges for the specified
area-id area-id.
Command Purpose
configure Enter global configuration mode.
router ospf Enter OSPF configuration mode.
Command Purpose
configure Enter global configuration mode.
ipv6 router ospf Enter OSPFv3 configuration mode.
router-id ip-address Set the 4-digit dotted-decimal number that uniquely
identifies the router.
auto-cost reference- Set the reference bandwidth used in the formula to
bandwidth ref_bw compute link cost for an interface:
link cost = ref_bw÷interface bandwidth
The ref_bw variable is the reference bandwidth in Mbps
(Range: 1–4294967).
default-information Control the advertisement of default routes.
originate [always] • always — Normally, OSPFv3 originates a default route
[metric metric-value] only if a default route is redistributed into OSPFv3 (and
[metric-type type-value] default-information originate is configured). When the
always option is configured, OSPFv3 originates a default
route, even if no default route is redistributed.
• metric-value — The metric (or preference) value of the
default route. (Range: 1–16777214)
• type-value — The value is either 1 or 2: External type-1
route or External type-2 route.
default-metric metric- Set a default for the metric of distributed routes. (Range:
value 1–16777214).
Command Purpose
configure Enter global configuration mode.
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN.
ipv6 ospf areaid area-id Enables OSPFv3 on the interface and sets the area ID of
an interface. This command supersedes the effects of
network area command.
The area-id variable is the ID of the area (Range: IP
address or decimal from 0 –4294967295)
ipv6 ospf priority Set the OSPFv3 priority for the interface. The number-
number-value value variable specifies the priority of an interface (Range:
0 to 255).
The default priority is 1, which is the highest router
priority. A value of 0 indicates that the router is not
eligible to become the designated router on this network.
ipv6 ospf retransmit- Set the OSPFv3 retransmit interval for the interface.
interval seconds The seconds variable is the number of seconds between
link-state advertisements for adjacencies belonging to this
router interface.
This value is also used when retransmitting database
descriptions and link-state request packets. Valid values
range from 0 to 3600 seconds (1 hour).
ipv6 ospf hello-interval Set the OSPFv3 hello interval for the interface. This
seconds parameter must be the same for all routers attached to a
network.
The seconds variable indicates the number of seconds to
wait before sending Hello packets from the interface.
(Range: 1–65535).
Command Purpose
configure Enter global configuration mode.
ipv6 router ospf Enter OSPFv3 configuration mode.
area area-id stub Create a stub area for the specified area ID.
area area-id stub no- Prevent Summary LSAs from being advertised into the
summary stub area.
area area-id default-cost Configure the metric value (default cost) for the type 3
cost summary LSA sent into the stub area. Range:
1–16777215)
Command Purpose
configure Enter global configuration mode.
ipv6 router ospf Enter OSPFv3 configuration mode.
area area-id virtual-link Create the OSPFv3 virtual interface for the specified
neighbor-id area-id and neighbor router. The neighbor-id variable is
the IP address of the neighboring router.
area area-id virtual-link Set the OSPFv3 retransmit interval for the virtual link
neighbor-id retransmit- interface.
interval seconds The seconds variable is the number of seconds to wait
between retransmitting LSAs if no acknowledgement is
received. (Range: 0–3600)
area area-id virtual-link Set the OSPFv3 hello interval for the virtual link.
neighbor-id hello-interval The seconds variable indicates the number of seconds to
seconds wait before sending Hello packets from the virtual
interface. (Range: 1–65535).
area area-id virtual-link Set the OSPFv3 dead interval for the virtual link.
neighbor-id dead-interval The seconds variable indicates the number of seconds to
seconds wait before the virtual interface is assumed to be dead.
(Range: 1–65535)
area area-id virtual-link Set the OSPFv3 Transit Delay for the interface.
neighbor-id transmit- The seconds variable is the number of seconds to
delay seconds increment the age of the LSA before sending, based on
the estimated time it takes to transmit from the
interface. (Range: 0–3600)
exit Exit to Global Config mode.
exit Exit to Privileged EXEC mode.
show ipv6 ospf virtual- View summary information about all virtual links
link brief configured on the switch.
Command Purpose
configure Enter global configuration mode.
ipv6 router ospf Enter OSPFv3 configuration mode.
area area-id range ipv6- Configure a summary prefix for routes learned in a given
prefix/prefix-length area.
{summarylink | • area-id — Identifies the OSPFv3 NSSA to configure.
nssaexternallink} (Range: IP address or decimal from 0–4294967295)
[advertise |not-advertise]
• ipv6-prefix/prefix-length — IPv6 address and prefix
length.
• summarylink — Specifies a summary link LSDB type.
• nssaexternallink — Specifies an NSSA external link
LSDB type.
• advertise — Advertisement of the area range.
• not-advertise — Suppresses advertisement of the area
range.
exit Exit to Global Config mode.
exit Exit to Privileged EXEC mode.
show ipv6 ospf range area- View information about the area ranges for the specified
id area-id.
Command Purpose
configure Enter global configuration mode.
ipv6 router ospf Enter OSPFv3 configuration mode.
redistribute {static | Configure OSPFv3 to allow redistribution of routes from
connected} [metric the specified source protocol/routers.
metric] [metric-type {1 | • static — Specifies that the source is a static route.
2}] [tag tag]
• connected — Specifies that the source is a directly
connected route.
• metric — Specifies the metric to use when
redistributing the route. (Range: 0–16777214)
• metric-type 1 — Type 1 external route.
• metric-type 2 — Type 2 external route.
• tag — Value attached to each external route, which
might be used to communicate information between
ASBRs. (Range: 0–4294967295)
exit Exit to Global Config mode.
exit Exit to Privileged EXEC mode.
show ipv6 ospf View OSPFv3 configuration and status information,
including information about redistributed routes.
Area 0 Backbone
Area Internal
Router
VLAN 50
192.150.2.1
VLAN 80 VLAN 90
192.150.3.1 192.150.4.1
Area 2 Area 3
console(config)#interface vlan 80
console(config-if-vlan80)#ip address 192.150.3.1
255.255.255.0
console(config-if-vlan80)#exit
console(config)#interface vlan 90
console(config-if-vlan90)#ip address 192.150.4.1
255.255.255.0
console(config-if-vlan90)#exit
console(config)#interface vlan 70
console(config-if-vlan70)#ip ospf area 0.0.0.0
console(config-if-vlan70)#ip ospf priority 128
console(config-if-vlan70)#ip ospf cost 32
console(config-if-vlan70)#exit
console(config)#interface vlan 80
console(config-if-vlan80)#ip ospf area 0.0.0.2
console(config-if-vlan80)#ip ospf priority 255
console(config-if-vlan80)#ip ospf cost 64
console(config-if-vlan80)#exit
console(config)#interface vlan 90
console(config-if-vlan90)#ip ospf area 0.0.0.2
console(config-if-vlan90)#ip ospf priority 255
console(config-if-vlan90)#ip ospf cost 64
console(config-if-vlan90)#exit
NOTE: OSPFv2 and OSPFv3 can operate concurrently on a network and on the
same interfaces (although they do not interact). This example configures both
protocols simultaneously.
Switch B is an ABR that directly connects Area 0 to Area 1. Note that in the
previous example, Switch B connected to a stub area and an NSSA. Virtual
links cannot be created across stub areas or NSSAs.
To configure Switch A:
1 Create the VLANs.
console(config)#vlan 2,15
2 Enable IPv4 and IPv6 routing on the switch.
console(config)#ip routing
console(config)#ipv6 unicast-routing
3 Set the OSPF router ID.
console(config)#router ospf
console(config-router)#router-id 1.1.1.1
console(config-router)#exit
R3
Area 0
VLAN 103
ABR
R0
VLAN 104
R1 R2
Area 1
1 Configure R0.
terminal length 0
config
Discussion
With no area range cost specified, the range uses auto cost:
(ABR-R0) #show ip ospf range 1
R3
VLAN 103
R0
VLAN 104
R1 R2
1 Configure R0:
terminal length 0
config
hostname R0
line console
exec-timeout 0
exit
vlan 101-103
exit
ip routing
router ospf
router-id 10.10.10.10
network 172.20.0.0 0.0.255.255 area 0
network 172.21.0.0 0.0.255.255 area 0
timers spf 3 5
exit
interface vlan 101
ip address 172.21.1.10 255.255.255.0
ip ospf hello-interval 1
ip ospf dead-interval 4
ip ospf network point-to-point
exit
interface te1/0/21
switchport mode trunk
description "R1"
exit
interface vlan 102
2 Configure R1:
terminal length 0
config
hostname R1
line console
exec-timeout 0
exit
vlan 101,104
exit
ip routing
router ospf
router-id 1.1.1.1
network 172.21.0.0 0.0.255.255 area 0
timers spf 3 5
exit
interface vlan 101
ip address 172.21.1.1 255.255.255.0
routing
ip ospf hello-interval 1
ip ospf dead-interval 4
ip ospf network point-to-point
exit
interface te1/0/21
switchport mode trunk
3 Configure R2:
terminal length 0
config
line console
serial timeout 0
exit
ip routing
router ospf
router-id 2.2.2.2
network 172.21.0.0 0.0.255.255 area 0
timers spf 3 5
exit
vlan 102,104
exit
interface vlan 102
ip address 172.21.2.2 255.255.255.0
routing
ip ospf hello-interval 1
ip ospf dead-interval 4
ip ospf network point-to-point
exit
interface te1/0/21
switchport mode trunk
exit
interface vlan 104
ip address 172.21.3.2 255.255.255.0
routing
ip ospf hello-interval 1
ip ospf dead-interval 4
4 Configure R3:
terminal length 0
config
line console
serial timeout 0
exit
ip routing
router ospf
router-id 3.3.3.3
network 172.21.0.0 0.0.255.255 area 0
timers spf 3 5
exit
vlan 103
exit
interface vlan 103
ip address 172.21.1.1 255.255.255.0
routing
ip ospf hello-interval 1
ip ospf dead-interval 4
ip ospf network point-to-point
exit
interface te1/0/21
switchport mode trunk
exit
interface loopback 0
ip address 172.21.254.2 255.255.255.255
exit
exit
Discussion
With flood blocking disabled on all interfaces, sending a T3 summary LSA
from R3 to R0 will cause R0 to forward the LSA on its interface to R1.
Enabling flood blocking on R0's interface to R1 will inhibit this behavior.
(R0)(config-if-vlan101)ip ospf database-filter all out
RIP Overview
RIP is an Interior Gateway Protocol (IGP) that performs dynamic routing
within a network. PowerConnect 8000-series and 8100-series switches support
two dynamic routing protocols: OSPF and Routing Information Protocol
(RIP).
Unlike OSPF, RIP is a distance-vector protocol and uses UDP broadcasts to
maintain topology information and hop counts to determine the best route to
transmit IP traffic. RIP is best suited for small, homogenous networks.
RIP Configuration
Use the Configuration page to enable and configure or disable RIP in Global
mode. To display the page, click Routing → RIP → Configuration in the
navigation panel.
NOTE: Static reject routes are not redistributed by RIP. For a static reject route,
the next hop interface value is Null0. Packets to the network address specified in
static reject routes are intentionally dropped.
NOTE: RIP is enabled by default. The Global RIP Settings are optional.
Command Purpose
configure Enter global configuration mode.
router rip Enter OSPF configuration mode.
split-horizon {none | Set the RIP split horizon mode.
simple | poison} • none — RIP does not use split horizon to avoid routing
loops.
• simple — RIP uses split horizon to avoid routing loops.
• poison — RIP uses split horizon with poison reverse
(increases routing packet update size).
auto-summary Enable the RIP auto-summarization mode.
no hostroutesaccept Prevent the switch from accepting host routes.
default-information Control the advertisement of default routes.
originate
default-metric metric- Set a default for the metric of distributed routes.
value The metric-value variable is the metric (or preference) value
of the default route. (Range: 1–15)
enable Reset the default administrative mode of RIP in the router
(active)
CTRL + Z Exit to Privileged EXEC mode.
show ip rip View various RIP settings for the switch.
Command Purpose
configure Enter global configuration mode.
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN.
ip rip Enable RIP on the interface.
ip rip send version {rip1 Configure the interface to allow RIP control packets of the
rip1c | rip2 |none} specified version(s) to be sent.
ip rip receive version Configure the interface to allow RIP control packets of the
{rip1 | rip2 | both | specified version(s) to be received.
none}
ip rip authentication set the RIP Version 2 Authentication Type and Key for the
{none | {simple key} | interface.
{encrypt key key-id} • key — Authentication key for the specified interface.
(Range: 16 bytes or less)
• encrypt — Specifies the Ethernet unit/port of the
interface to view information.
• key-id — Authentication key identifier for
authentication type encrypt. (Range: 0-255)
exit Exit to Global Configuration Mode
exit Exit to Privileged Exec mode.
show ip rip interface vlan View RIP configuration information for the specified
vlan-id routing interface.
show ip rip interface View summary information about the RIP configuration
brief on all interfaces.
Command Purpose
configure Enter global configuration mode.
router rip Enter RIP configuration mode.
distribute-list Specify the access list to filter routes received from the
accesslistname out {ospf | source protocol. The ACL must already exist on the
static | connected} switch. For information about the commands you use to
configure ACLs, see "Configuring ACLs (CLI)" on
page 521.
• accesslistname — The name used to identify an existing
ACL.
• ospf — Apply the specified access list when OSPF is the
source protocol.
• static — Apply the specified access list when packets
come through the static route.
• connected — Apply the specified access list when
packets come from a directly connected route.
redistribute {static | Configure RIP to allow redistribution of routes from the
connected} [metric specified source protocol/routers.
integer] • static — Specifies that the source is a static route.
• connected — Specifies that the source is a directly
connected route.
• metric — Specifies the metric to use when
redistributing the route. Range: 1-15.
console(config)#interface vlan 20
console(config-if-vlan20)#ip address 192.168.20.1
255.255.255.0
console(config-if-vlan20)#ip rip
console(config-if-vlan20)#ip rip receive version
both
console(config-if-vlan20)#ip rip send version rip2
console(config-if-vlan20)#exit
console(config)#interface vlan 30
console(config-if-vlan30)#ip address 192.168.30.1
255.255.255.0
console(config-if-vlan30)#ip rip
console(config-if-vlan30)#ip rip receive version
both
console(config-if-vlan30)#ip rip send version rip2
console(config-if-vlan30)#exit
4 Enable auto summarization of subprefixes when crossing classful
boundaries.
console(config)#router rip
console(config-router)#auto-summary
console(config-router)#exit
console(config)#exit
5 Verify the configuration
console#show ip rip
VRRP Overview
The Virtual Router Redundancy (VRRP) protocol is designed to handle
default router (L3 switch) failures by providing a scheme to dynamically elect
a backup router. VRRP can help minimize black hole periods due to the
failure of the default gateway router during which all traffic directed towards
it is lost until the failure is detected.
NOTE: It is not possible to ping the VRRP IP address from the VRRP master. Use
the show vrrp command to display the status of the VRRP router
NOTE: An exception to the priority level change is that if the VRRP group is the IP
address owner, its priority is fixed at 255 and cannot be reduced through the
tracking process.
VRRP Configuration
Use the Configuration page to enable or disable the administrative status of a
virtual router.
To display the page, click Routing → VRRP → Configuration in the navigation
panel.
2 Select the virtual router ID and VLAN routing interface that will track the
route.
3 Specify the destination network address (track route prefix) for the route
to track. Use dotted decimal format, for example 192.168.10.0.
4 Specify the prefix length for the tracked route.
5 Specify a value for the Priority Decrement to define the amount that the
router priority will be decreased when a tracked route becomes
unreachable.
6. Click Apply to update the switch.
2 Select the virtual router ID and VLAN routing interface that will track the
interface.
3 Specify the interface to track.
4 Specify a value for the Priority Decrement to define the amount that the
router priority will be decreased when a tracked interface goes down.
5. Click Apply to update the switch.
Command Purpose
configure Enter global configuration mode.
ip vrrp Enable the administrative mode of VRRP for the router
(L3 switch).
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN.
vrrp vr-id Allow the interface to create in the VRRP group specified
by the vr-id parameter, which is a number from 1–255.
vrrp vr-id description (Optional) Create a text description that identifies the
VRRP group.
vrrp vr-id preempt [delay Enable the preemption mode value for the virtual router
seconds] configured on a specified interface.
You can optionally configure a preempt delay, which is the
number of seconds the VRRP router waits before the
VRRP router sends an advertisement to claim master
ownership.
vrrp vr-id accept-mode Allow the VRRP master to accept ping packets sent to one
of the virtual router’s IP addresses.
vrrp vr-id priority Set the priority value for the virtual router configured on
priority the interface.
vrrp vr-id ip ip-address Set the virtual router IP address value for an interface.
[secondary]
Global Configuration
Use the Global Configuration page to enable IPv6 forwarding on the router,
enable the forwarding of IPv6 unicast datagrams, and configure global IPv6
settings.
To display the page, click Routing → IPv6 → Global Configuration in the
navigation panel.
NOTE: For a static reject route, the next hop interface value is Null0. Packets to
the network address specified in static reject routes are intentionally dropped.
To display the page, click Routing → IPv6 → IPv6 Routes → Configured IPv6
Routes in the navigation panel.
To remove a configured route, select the check box in the Delete column of
the route to remove, and click Apply.
Command Purpose
configure Enter global configuration mode.
sdm prefer dual-ipv4- Select a Switch Database Management (SDM) template
and-ipv6 default to enable support for both IPv4 and IPv6. Changing the
SDM template requires a system reload.
ipv6 unicast-routing Globally enable IPv6 routing on the switch.
ipv6 hop-limit limit Set the TTL value for the router. The valid range is 0 to
255.
ipv6 icmp error-interval Limit the rate at which IPv4 ICMP error messages are sent.
burst-interval [burst- • burst-interval — How often the token bucket is
size] initialized (Range: 0–2147483647 milliseconds).
• burst-size — The maximum number of messages that
can be sent during a burst interval (Range: 1–200).
exit Exit to Privileged EXEC mode.
Command Purpose
configure Enter Global Configuration mode.
interface {vlan | Enter Interface Configuration mode for the specified VLAN,
tunnel | loopback} tunnel, or loopback interface.
interface-id
ipv6 enable Enable IPv6 on the interface. Configuring an IPv6 address
will automatically enable IPv6 on the interface.
ipv6 address Configure the IPv6 address and network prefix length.
{autoconfig | dhcp | Setting an IPv6 address enables IPv6 on the interface. You
prefix/prefix-length can also use the ipv6 enable command to enable IPv6 on the
[eui64]} interface without setting an address.
Link-local, multicast, IPv4-compatible, and IPv4-mapped
addresses are not allowed to be configured.
Include the EUI-64 keyword to have the system add the 64-
bit interface ID to the address. You must use a network prefix
length of 64 in this case.
For VLAN interfaces, use the dhcp keyword to enable the
DHCPv6 client and obtain an IP address form a network
DHCPv6 server.
ipv6 mtu size (VLAN interfaces only) Set the IPv6 Maximum
Transmission Unit (MTU) on a routing interface. The IPv6
MTU is the size of the largest IPv6 packet that can be
transmitted on the interface without fragmentation. The
range is 1280–1500 bytes.
ipv6 traffic-filter ACL Add an access-list filter to this interface.
name
ipv6 unreachables (VLAN interfaces only) Allow the interface to send ICMPv6
Destination Unreachable messages. The no ipv6
unreachables command suppresses the ICMPv6 unreachable
messages for this interface.
exit Exit the interface configuration mode.
Command Purpose
ipv6 nd prefix Configure parameters associated with network prefixes that
prefix/prefix-length the router advertises in its Neighbor Discovery
[{valid-lifetime| advertisements.
infinite} {preferred- • ipv6-prefix—IPv6 network prefix.
lifetime| infinite}]
[no-autoconfig] [off- • prefix-length—IPv6 network prefix length.
link] • valid-lifetime—Valid lifetime of the router in seconds.
(Range: 0–4294967295 seconds.)
• infinite—Indicates lifetime value is infinite.
• preferred-lifetime—Preferred-lifetime of the router in
seconds. (Range: 0–4294967295 seconds.)
• no-autoconfig—Do not use the prefix for auto
configuration.
• off-link—Do not use the prefix for onlink determination.
ipv6 nd ra-interval Set the transmission interval between router Neighbor
maximum minimum Discovery advertisements.
• maximum — The maximum interval duration (Range:
4–1800 seconds).
• minimum — The minimum interval duration (Range: 3 –
(0.75 * maximum) seconds).
ipv6 nd ra-lifetime Set the value that is placed in the Router Lifetime field of
seconds the router Neighbor Discovery advertisements sent from the
interface.
The seconds value must be zero, or it must be an integer
between the value of the router advertisement transmission
interval and 9000 seconds. A value of zero means this router
is not to be used as the default router. (Range: 0-9000).
ipv6 nd suppress-ra Suppress router advertisement transmission on an interface.
ipv6 nd dad attempts Set the number of duplicate address detection probes
value transmitted while doing Neighbor Discovery.
The range for value is 0–600.
Command Purpose
configure Enter global configuration mode.
ipv6 route ipv6- Configure a static route.Use the keyword null instead of
prefix/prefix-length {next- the next hop router IP address to configure a static reject
hop-address | interface- route.
type interface-number • prefix/prefix-length—The IPv6 network prefix and
next-hop-address } prefix length that is the destination of the static route.
[preference] Use the ::/0 form (unspecified address and zero length
prefix) to specify a default route.
• interface-type interface-number—Must be specified
when using a link-local address as the next hop. The
interface-type can be vlan or tunnel.
• next-hop-address —The IPv6 address of the next hop
that can be used to reach the specified network. A link-
local next hop address must have a prefix length of 128.
The next hop address cannot be an unspecified address
(all zeros), a multicast address, or a loopback address. If
a link local next hop address is specified, the interface
(VLAN or tunnel), must also be specified.
• preference—Also known as Administrative Distance, a
metric the router uses to compare this route with routes
from other route sources that have the same network
prefix. (Range: 1-255). Lower values have precedence
over higher values. The default preference for static
routes is 1. Routes with a preference of 255 are
considered as “disabled” and will not be used for
forwarding. Routes with a preference metric of 254 are
used by the local router but will never be advertised to
other neighboring routers.
ipv6 route ipv6- Configure a static reject route. IPv6 packets matching
prefix/prefix-length null the reject route will be silently discarded.
[preference]
Command Purpose
show sdm prefer Show the currently active SDM template.
show sdm prefer dual- Show parameters for the SDM template.
ipv4-and-ipv6 default
show ipv6 dhcp interface View information about the DHCPv6 lease acquired by
vlan vlan-id the specified interface.
show ipv6 interface {vlan View the IP interface configuration information for the
| tunnel | loopback} specified IPv6 routing interface.
interface-id
show ipv6 brief View the global IPv6 settings for the switch.
show ipv6 route [ipv6- View the routing table.
address | ipv6- • ipv6-address—Specifies an IPv6 address for which the
prefix/prefix-length | best-matching route would be displayed.
protocol | interface-type
interface-number] [best] • protocol—Specifies the protocol that installed the
routes. Is one of the following keywords: connected,
ospf, static.
• ipv6-prefix/ prefix-length—Specifies an IPv6 network
for which the matching route would be displayed.
• interface-type interface-number—Valid IPv6 interface.
Specifies that the routes with next-hops on the selected
interface be displayed.
• best—Specifies that only the best routes are displayed.
If the connected keyword is selected for protocol, the
best option is not available because there are no best or
non-best connected routes.
show ipv6 route summary View summary information about the IPv6 routing table.
show ipv6 route View detailed information about the IPv6 route
preferences preferences.
DHCPv6 Overview
DHCP is a protocol that is generally used between clients and servers for the
purpose of assigning IP addresses, gateways, and other networking definitions
such as Domain Name System (DNS) and Network Time Protocol (NTP)
parameters. However, IPv6 natively provides IP address auto configuration
through IPv6 Neighbor Discovery Protocol (NDP) and through the use of
Router Advertisement messages. Thus, the role of DHCPv6 within the
network is different than that of DHCPv4 because DHCPv6 is not the
primary source for IP address assignment.
DHCPv6 server and client interactions are described by RFC 3315 [6]. There
are many similarities between DHCPv6 and DHCPv4 interactions and
options, but there are enough differences in the messages and option
definitions that there is no DHCPv4 to DHCPv6 migration or
interoperability.
In Figure 39-1, the PowerConnect acts as the Prefix Delegation (PD) server
and defines one or more general prefixes to allocate and assign addresses to
hosts that may be utilizing IPv6 auto-address configuration or acting as
DHCPv6 clients.
DHCPv6 clients may request multiple IPv6 prefixes. Also, DHCPv6 clients
may request specific IPv6 prefixes. If the configured DHCPv6 pool contains
the specific prefix that a DHCPv6 client requests, then that prefix will be
delegated to the client. Otherwise, the first available IPv6 prefix within the
configured pool will be delegated to the client.
4 From the DNS Server Address menu, select an existing DNS Server
Address to associate with this pool, or select Add and specify a new server
to add.
5 From the Domain Name menu, select an existing domain name to
associate with this pool, or select Add and specify a new domain name.
6 Click Apply.
Figure 39-9 shows the screen when the selected interface mode is Relay.
Command Purpose
configure Enter Global Configuration mode.
service dhcpv6 Enable the DHCPv6 server.
ipv6 dhcp relay-agent- Configure a number to represent the DHCPv6 Relay
info-opt option Agent Information Option.
The option parameter is an integer from 54–65535.
ipv6 dhcp relay-agent- Configure a number to represent the DHCPv6 remote-ID
info-remote-id-subopt sub-option
suboption The suboption parameter is an integer from 1–65535.
exit Exit to Privileged EXEC mode.
show ipv6 dhcp Verify the global DHCPv6 server configuration.
Command Purpose
configure Enter Global Configuration mode.
ipv6 dhcp pool name Create a DHCPv6 pool and enter DHCPv6 pool
configuration mode.
dns-server ipv6-address Set up to 8 IPv6 DNS server addresses to provide to a
DHCPv6 client by the DHCPv6 server.
Command Purpose
configure Enter Global Configuration mode.
ipv6 dhcp pool name Create a DHCPv6 pool and enter DHCPv6 pool
configuration mode.
prefix-delegation ipv6- Define an IPv6 prefixes within a pool for distributing to
prefix/prefix-length specific DHCPv6 Prefix delegation clients.
client-DUID [name • prefix/prefix-length—Delegated IPv6 prefix.
hostname] [valid-
lifetime {valid-lifetime | • client-DUID—DHCP Unique Identifier for the client
infinite}] [preferred- (e.g. 00:01:00:09:f8:79:4e:00:04:76:73:43:76').
lifetime {preferred- • hostname—Client hostname used for logging and
lifetime | infinite}] tracing. (Range: 0-31 characters.) The command allows
spaces in the host name.
• valid-lifetime—Valid lifetime for delegated prefix.
(Range: 0-4294967295 seconds) or use the keyword
infinite.
• preferred-lifetime—Preferred lifetime for delegated
prefix. (Range: 0-4294967295 seconds) or use the
keyword infinite.
CTRL + Z Exit to Privileged EXEC mode.
show ipv6 dhcp pool View information about the DHCPv6 pools configured on
the switch.
Command Purpose
configure Enter Global Configuration mode.
interface {tunnel Enter interface configuration mode for a tunnel or VLAN
tunnel-id | vlan vlan-id} routing interface to configure as a DHCPv6 relay agent.
ipv6 dhcp relay Configure the interface for DHCPv6 relay functionality.
{destination relay- • destination — Keyword that sets the relay server IPv6
address [interface vlan address.
vlan-id] | interface vlan
vlan-id} [remote-id • relay-address — An IPv6 address of a DHCPv6 relay
{duid-ifid | user- server.
defined-string}] • interface — Sets the relay server interface.
• vlan-id — A valid VLAN ID.
• [remote-id {duid-ifid | user-defined-string}] — The
Relay Agent Information Option “remote ID” sub-option
to be added to relayed messages. This can either be the
special keyword duid-ifid, which causes the “remote ID”
to be derived from the DHCPv6 server DUID and the
relay interface number, or it can be specified as a user-
defined string.
exit Exit to Global Configuration Mode
interface {tunnel Enter interface configuration mode for a tunnel or VLAN
tunnel-id | vlan vlan-id} routing interface to configure with DHCPv6 server
functionality.
Command Purpose
show ipv6 dhcp binding View the current binding information in the DHCP server
[address] database. Specify the IP address to view a specific binding.
show ipv6 dhcp statistics View DHCPv6 server and relay agent statistics.
clear ipv6 dhcp statistics Reset all DHCPv6 server and relay agent statistics to zero.
console(config-dhcp6s-pool)#prefix-delegation
2001:DB8:1001::/32
00:01:00:09:f8:79:4e:00:04:76:73:43:76 valid-
lifetime 600 preferred-lifetime 400
console(config-dhcp6s-pool)#exit
3 Configure the DHCPv6 server functionality on VLAN 200 and specify the
pool to use for DHCPv6 clients.
console(config)#interface vlan 200
console(config-if-vlan200)#ipv6 dhcp server my-
pool2 preference 20
DiffServ Overview
Standard IP-based networks are designed to provide “best effort” data delivery
service. Best effort service implies that the network delivers the data in a
timely fashion, although there is no guarantee that it will. During times of
congestion, packets may be delayed, sent sporadically, or dropped. For typical
Internet applications, such as email and file transfer, a slight degradation in
service is acceptable and in many cases unnoticeable. Conversely, any
degradation of service has undesirable effects on applications with strict
timing requirements, such as voice or multimedia.
DiffServ Configuration
Use the DiffServ Configuration page to display the DiffServ administrative
mode setting as well as the current and maximum number of rows in each of
the main DiffServ private MIB tables.
To display the page, click Quality of Service → Differentiated Services →
DiffServ Configuration in the navigation panel.
2 Enter a name for the class and select the protocol to use for class match
criteria.
Class Criteria
Use the DiffServ Class Criteria page to define the criteria to associate with a
DiffServ class. As packets are received, these DiffServ classes are used to
identify packets.
To display the page, click Quality of Service → Differentiated Services →
Class Criteria in the navigation panel.
The DiffServ Policy - Policing page displays the Policy Name, Class
Name, and Policing Style.
Select a value for the following fields:
• Color Mode — The type of color policing used: Color Blind or Color
Aware.
• Conform Action Selector — The action taken on packets that are
considered conforming (below the police rate). Options are Send,
Drop, Mark CoS, Mark IP DSCP, Mark IP Precedence.
• Violate Action — The action taken on packets that are considered
non-conforming (above the police rate). Options are Send, Drop,
Mark CoS, Mark IP DSCP, Mark IP Precedence.
2 Click Apply.
The policy-class is defined, and the device is updated.
To view a summary of the services configured on the switch, click Show All.
Internet
Port 1/0/5
Outbound Layer 3 Switch
1/0/3
Finance 1/0/4
Development
Marketing
Source IP:
172.16.20.0 Source IP:
255.255.255.0 172.16.40.0
Test 255.255.255.0
Source IP:
172.16.30.0
255.255.255.0
console(config)#class-map match-all
development_dept
console(config-classmap)#match srcip 172.16.40.0
255.255.255.0
console(config-classmap)#exit
console(config-policy-map)#class marketing_dept
console(config-policy-classmap)#assign-queue 2
console(config-policy-classmap)#exit
console(config-policy-map)#class test_dept
console(config-policy-classmap)#assign-queue 3
console(config-policy-classmap)#exit
console(config-policy-map)#class development_dept
console(config-policy-classmap)#assign-queue 4
console(config-policy-classmap)#exit
console(config-policy-map)#exit
4 Attach the defined policy to 10-Gigabit Ethernet interfaces 1/0/1 through
1/0/4 in the inbound direction
console(config)#interface tengigabitethernet 1/0/1
console(config-if-Te1/0/1)#service-policy in
internet_access
console(config-if-Te1/0/1)#exit
`
Layer 3 Switch
Operating as
Router 1
Port 1/0/2
Port 1/0/3
Internet
Layer 3 Switch
Operating as
Router 2
console(config-policy-map)#class class_voip
console(config-policy-classmap)#mark ip-dscp ef
console(config-policy-classmap)#assign-queue 6
CoS Overview
The CoS feature lets you give preferential treatment to certain types of traffic
over others. To set up this preferential treatment, you can configure the
ingress ports, the egress ports, and individual queues on the egress ports to
provide customization that suits your environment.
The level of service is determined by the egress port queue to which the
traffic is assigned. When traffic is queued for transmission, the rate at which
it is serviced depends on how the queue is configured and possibly the
amount of traffic present in other queues for that port.
Some traffic is classified for service (i.e., packet marking) before it arrives at
the switch. If you decide to use these classifications, you can map this traffic
to egress queues by setting up a CoS Mapping table.
To access the Interface Queue Drop Precedence Status page, click the Show
All link at the top of the page.
L3 Multicast Overview
IP Multicasting enables a network host (or multiple hosts) to send an IP
datagram to multiple destinations simultaneously. The initiating host sends
each multicast datagram only once to a destination multicast group address,
and multicast routers forward the datagram only to hosts who are members of
the multicast group. Multicast enables efficient use of network bandwidth
because each multicast datagram needs to be transmitted only once on each
network link, regardless of the number of destination hosts. Multicasting
contrasts with IP unicasting, which sends a separate datagram to each
recipient host. The IP routing protocols can route multicast traffic, but the IP
multicast protocols handle the multicast traffic more efficiently with better
use of network bandwidth.
What Is IGMP?
The Internet Group Management Protocol (IGMP) is used by IPv4 systems
(hosts, L3 switches, and routers) to report their IP multicast group
memberships to any neighboring multicast routers. The PowerConnect 8000-
series and 8100-series switches performs the multicast router role of the
IGMP protocol, which means it collects the membership information needed
by the active multicast routing protocol.
The PowerConnect 8000-series and 8100-series switches supports IGMP
Version 3. Version 3 adds support for source filtering, which is the ability for a
system to report interest in receiving packets only from specific source
addresses, as required to support Source-Specific Multicast [SSM], or from all
but specific source addresses, sent to a particular multicast address. Version 3
is designed to be interoperable with Versions 1 and 2.
What Is MLD?
Multicast Listener Discovery (MLD) protocol enables IPv6 routers to
discover the presence of multicast listeners, the hosts that wish to receive the
multicast data packets, on its directly-attached interfaces. The protocol
specifically discovers which multicast addresses are of interest to its
neighboring nodes and provides this information to the active multicast
routing protocol that makes decisions on the flow of multicast data packets.
The Multicast router sends General Queries periodically to request multicast
address listeners information from systems on an attached network. These
queries are used to build and refresh the multicast address listener state on
attached networks. Multicast listeners respond to these queries by reporting
their multicast addresses listener state and their desired set of sources with
Current-State Multicast address Records in the MLD2 Membership Reports.
The Multicast router also processes unsolicited Filter-Mode-Change records
and Source-List-Change Records from systems that want to indicate interest
in receiving or not receiving traffic from particular sources.
The PowerConnect implementation of MLD v2 supports the multicast router
portion of the protocol (i.e., not the listener portion). It is backward-
compatible with MLD v1.
NOTE: Dell recommends configuring a first-hop router from the multicast video
source as the RP.
What Is DVMRP?
DVMRP is an interior gateway protocol that is suitable for routing multicast
traffic within an autonomous system (AS). DVMRP should not be used
between different autonomous systems due to limitations with hop count and
scalability.
Adding a Candidate RP
To add PIM Candidate rendezvous points (RPs) for each IP multicast group:
1 Open the Candidate RP Configuration page.
2 Click Add.
The Add Candidate RP page displays.
Adding a Static RP
To add a static RP for the PIM router.
1 Open the Static RP Configuration page.
2 Click Add.
The Add Static RP page displays.
3 Click the Add Default SSM Range check box to add the default SSM
Range. The default SSM Range is 232.0.0.0/8 for IPv4 multicast and
ff3x::/32 for IPv6 multicast.
4 Enter the SSM Group IP Address.
5 Enter the SSM Group Mask (IPv4) or SSM Prefix Length (IPv6).
6 Click Apply.
The new SSM Range is added, and the device is updated.
Command Purpose
configure Enter global configuration mode.
ip multicast Enable IPv4 multicast on the switch.
ip mroute source-address Create a static multicast route for a source range.
mask rpf-address preference • source-address — The IP address of the multicast data
source.
• mask — The IP subnet mask of the multicast data
source.
• rpf-address — The IP address of the next hop towards
the source.
• preference — The cost of the route (Range: 1 - 255).
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN.
ip mcast boundary Add an administrative scope multicast boundary
groupipaddr mask specified by the multicast group IP address
(groupipaddr) and group IP subnet mask (mask) for
which this multicast administrative boundary is
applicable.
The group IP address valid range is 239.0.0.0 to
239.255.255.255.
ip multicast ttl-threshold Apply a Time to Live (TTL) value to the interface. The
ttlvalue ttlvalue is the TTL threshold which is applied to the
multicast data packets forwarded through the interface.
Command Purpose
configure Enter global configuration mode.
ipv6 mroute source- Create a static multicast route for a source range.
address/prefix-length rpf- • source-address/prefix-length — The IPv6 address of the
address preference multicast data source.
• rpf-address — The IPv6 address of the next hop towards
the source.
• preference — The cost of the route (Range: 1 - 255).
exit Exit to Privileged EXEC mode.
show ip mcast interface View the multicast information for all interfaces or for the
[vlan vlan-id] specified interface.
show ipv6 mroute View a summary or all the details of the multicast table.
{detail | summary}
show ipv6 mroute group View the multicast configuration settings such as flags,
groupipaddr {detail | timer settings, incoming and outgoing interfaces, RPF
summary} neighboring routers, and expiration times of all the entries
in the multicast mroute table containing the groupipaddr
value.
show ipv6 mroute source View the multicast configuration settings such as flags,
sourceipaddr {summary timer settings, incoming and outgoing interfaces, RPF
| groupipaddr} neighboring routers, and expiration times of all the entries
in the multicast mroute table containing the sourceipaddr
or sourceipaddr | groupipaddr pair value(s).
show ipv6 mroute static View all the static routes configured in the static mcast
[sourceipaddr ] table if it is specified or display the static route associated
with the particular sourceipaddr.
Command Purpose
configure Enter global configuration mode.
ip igmp Enable IGMP on the switch.
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN.
ip igmp Enable IGMP on the interface.
ip igmp version version Set the version of IGMP for an interface.
The version variable can be 1, 2, or 3.
ip igmp robustness Configure the robustness that allows tuning of the
robustness interface, that is, tuning for the expected packet loss on a
subnet. If a subnet is expected to have significant loss, the
robustness variable may be increased for the interface.
The range for robustness is 1–255.
ip igmp query-interval Configure the query interval for the specified interface.
seconds The query interval determines how fast IGMP Host-
Query packets are transmitted on this interface.
The range for seconds is 0–3600 seconds.
ip igmp query-max- Configure the maximum response time interval for the
response-time seconds specified interface. It is the maximum query response
time advertised in IGMPv2 queries on this interface.
The range for seconds is 0–25 seconds.
ip igmp startup-query- Set the interval between general queries sent at startup on
interval seconds the interface.
The range for seconds is 0–300 seconds.
ip igmp startup-query- Set the number of queries sent out on startup —at
count count intervals equal to the startup query interval for the
interface.
The range for count is 1–20.
NOTE: Configure only the upstream interface as the IGMP proxy. IGMP should
be enabled on all downstream interfaces. IP routing and IP multicast must be
enabled on the switch for the IGMP proxy feature to operate.
Command Purpose
configure Enter global configuration mode.
interface vlan vlan-id Enter Interface Configuration mode for the
specified VLAN.
ip igmp-proxy Configure the interface as an IGMP proxy
interface.
ip igmp-proxy reset-status (Optional) Reset the host interface status
parameters of the IGMP Proxy.
ip igmp-proxy unsolicit-rprt- Configure the unsolicited report interval for the
interval seconds IGMP proxy interface.
The range for seconds is 0–260 seconds.
CTRL + Z Exit to Privileged EXEC mode.
show ip igmp-proxy View a summary of the host interface status
parameters.
show ip igmp-proxy interface View a detailed list of the host interface status
parameters. This command displays information
only when IGMP Proxy is operational.
show ip igmp-proxy groups View a table of information about multicast
groups that IGMP Proxy reported. This
command displays information only when IGMP
Proxy is operational.
Command Purpose
configure Enter global configuration mode.
ipv6 mld router Enable MLD on the switch.
interface vlan vlan-id Enter Interface Configuration mode for the
specified VLAN.
ipv6 mld router Enable MLD on the interface.
ipv6 mld version version Set the version of MLD for an interface.
The version variable can be 1 or 2.
ipv6 mld query-interval seconds Configure the query interval for the specified
interface. The query interval determines how fast
MLD Host-Query packets are transmitted on this
interface.
The range for seconds is 0–3600 seconds.
ipv6 mld query-max-response- Configure the maximum response time interval
time seconds for the specified interface. It is the maximum
query response time advertised in MLD queries
on this interface.
The range for seconds is 0–25 seconds.
ipv6 mld last-member-query- Set the last member query interval for the MLD
interval tenthsofseconds interface, which is the value of the maximum
response time parameter in the group-specific
queries sent out of this interface.
The range is 0–65535 milliseconds.
ipv6 mld last-member-query- Set the number of listener-specific queries sent
count count before the router assumes that there are no local
members on the interface.
The range for count is 1–20.
CTRL + Z Exit to Privileged EXEC mode.
NOTE: Configure only the upstream interface as the MLD proxy. MLD should be
enabled on all downstream interfaces. IPv6 routing must be enabled on the
switch for the MLD proxy feature to operate.
Command Purpose
configure Enter global configuration mode.
interface vlan vlan-id Enter Interface Configuration mode for the
specified VLAN.
ipv6 mld-proxy Configure the interface as an MLD proxy
interface.
ipv6 mld-proxy reset-status (Optional) Reset the host interface status
parameters of the MLD Proxy.
ipv6 igmp-proxy unsolicit-rprt- Configure the unsolicited report interval for the
interval seconds MLD proxy interface.
The range for seconds is 0–260 seconds.
CTRL + Z Exit to Privileged EXEC mode.
Command Purpose
configure Enter global configuration mode.
ip pim dense Enable PIM-DM on the switch.
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN.
ip pim Enable PIM-DM on the interface.
ip pim hello-interval seconds Specify the number of seconds (range: 0–65535) to
wait between sending PIM hello messages on the
interface.
exit Exit to Privileged EXEC mode.
show ip pim View system-wide PIM information.
show ip pim interface vlan View the PIM-DM information for the specified
vlan-id interface.
show ip pim neighbor View a summary or all the details of the multicast
[interface vlan vlan-id | all] table.
Command Purpose
configure Enter global configuration mode.
ipv6 pim dense Enable PIM-DM on the switch.
interface vlan vlan-id Enter Interface Configuration mode for the
specified VLAN.
ipv6 pim Enable PIM on the interface.
ipv6 pim hello-interval seconds Specify the number of seconds (range: 0–65535)
to wait between sending PIM hello messages on
the interface.
exit Exit to Privileged EXEC mode.
show ipv6 pim View system-wide PIM information.
show ipv6 pim interface vlan View the PIM information for the specified
vlan-id interface.
show ipv6 pim neighbor View a summary or all the details of the multicast
[interface vlan vlan-id | all] table.
Command Purpose
configure Enter global configuration mode.
ip pim sparse Enable PIM-SM as the multicast routing protocol on
the switch.
ip pim spt-threshold Set the Data Threshold rate, in Kbps (range: 0–2000)
threshold for the last-hop (or leaf) router to switch to the
shortest path.
ip pim register-threshold Set the rate, in Kbps (range: 0–2000), above which the
threshold Rendezvous Point router will switch to a source-
specific shortest path tree.
ip pim bsr-candidate vlan Configure the switch to announce its candidacy as a
vlan-id hash-mask-length bootstrap router (BSR).
[priority] [interval interval] • vlan-id — A valid VLAN ID.
• hash-mask-length — The length of a mask that is to
be ANDed with the group address before the hash
function is called. All groups with the same seed
hash correspond to the same RP. For example, if this
value is 24, only the first 24 bits of the group
addresses matter. This allows you to get one RP for
multiple groups. (Range 0–32 bits).
• priority — The priority of the candidate BSR. The
BSR with the higher priority is preferred. If the
priority values are the same, the router with the
higher IP address is the BSR. (Range 0–255).
• interval — (Optional) Indicates the BSR candidate
advertisement interval. The range is from 1 to 16383
seconds. The default value is 60 seconds.
Command Purpose
configure Enter global configuration mode.
ipv6 pim sparse Enable PIM-SM as the multicast routing protocol on
the switch.
ipv6 pim spt-threshold Set the Data Threshold rate, in Kbps (range: 0–2000)
threshold for the last-hop (or leaf) router to switch to the
shortest path.
ipv6 pim register-threshold Set the rate, in Kbps (range: 0–2000), above which the
threshold Rendezvous Point router will switch to a source-
specific shortest path tree.
Command Purpose
configure Enter global configuration mode.
ip dvmrp Enable DVMRP on the switch.
interface vlan vlan-id Enter Interface Configuration mode for the specified
VLAN routing interface.
ip dvmrp Enable DVMRP on the interface.
ip dvmrp metric metric Configure the metric (range: 1–31) for an interface. This
value is used in the DVMRP messages as the cost to reach
this network.
exit Exit to Privileged EXEC mode.
show ip dvmrp interface View the multicast information for the specified interface.
vlan vlan-id]
show ip dvmrp neighbor View neighbor information for DVMRP.
show ip dvmrp nexthop View the next hop information on outgoing interfaces for
routing multicast datagrams.
show ip dvmrp prune View the table that lists the router’s upstream prune
information
show ip dvmrp route View the multicast routing information for DVMRP.
NOTE: PIM does not require OSPF specifically; static routing or RIP could also
be configured for unicast routing.
Video Server
L3 Switch A
(PIM RP)
Port 23 Port 24
L3 Switch B
L3 Switch C
IGMP
Join
IGMP
Join
`
`
`
VLAN 20
VLAN 10 ` Members
Members
console(config)#interface te1/0/24
console(config-if-Te1/0/24)#switchport mode trunk
console(config-if-Te1/0/24)#switchport trunk
allowed vlan add 10
console(config-if-Te1/0/24)#exit
4 Enable routing on the switch and configure the OSPF router ID.
console(config)#ip routing
console(config)#router ospf
console(config-router)#router-id 3.3.1.1
console(config-router)#exit
5 Configure VLAN 10 as a VLAN routing interface and specify the OSPF
area. When you assign an IP address to the VLAN, routing is automatically
enabled.
console(config)#interface vlan 10
console(config-if-vlan10)#ip address 192.168.10.4
255.255.255.0
console(config-if-vlan10)#ip ospf area 0
6 Enable IGMPv2 and PIM-SM on the VLAN routing interface.
console(config-if-vlan10)#ip igmp
console(config-if-vlan10)#ip igmp version 2
console(config-if-vlan10)#ip pim
console(config-if-vlan10)#exit
console(config)#interface vlan 20
console(config-if-vlan20)#ip address 192.168.20.1
255.255.255.0
console(config-if-vlan20)#ip dvmrp
console(config-if-vlan20)#ip igmp
console(config-if-vlan20)#exit
Index 1247
examples, 187 B
RADIUS, 191
back panel features, 92
auto configuration
back pressure, 66
auto save, 339
CLI configuration, 343 banner, CLI, 264
defaults, 341 baud rate, 93
defined, 333
BOOTP/DHCP relay agent, 77
DHCP, 344
configuration file, 337 BPDU
image, 336 filtering, 74, 612
IP address, obtaining, 335 flooding, 612
example, 344 guard, 74
files protection, 614
USB, 334 bridge multicast address groups,
files, managing, 339 configuring, 693
stopping, 339
bridge multicast forwarding, 695
using DHCP, 335
web-based configuration, 342 bridge multicast group
table, 692
auto image download
DHCP, 344 bridge table, 837
auto negotiation, 67
auto save feature, 339 C
auto VoIP cable test, 203, 211
CLI configuration, 1156
defaults, 1152 candidate BSR, 1164
understanding, 1151 captive portal, 62
web-based configuration, 1153 CLI configuration, 429
auto-provisioning, iSCSI, 390 client management, 434
configuring, 436
Auto-VoIP customizing pages, 405
and ACLs, 1152
defaults, 406
1248 Index
defined, 401 configuration file
dependencies, 402 defined, 309
design considerations, 403 DHCP auto configuration, 337
example, 435 downloading, 312
localization, 405 editing, 312
understanding, 401, 404 SNMP, 313
user logout mode, 405 USB device, 331
users, RADIUS server, 417 configuration scripts, 312, 329
web-based configuration, 408
configuration, saving the, 313
cards
supported, 257 Configuring, 859
console port
CDP, interoperability through
ISDP, 57 connecting to, 107
description, 93
certificates, 310
copy, files, 321
checkpointing, 149
CoS
Cisco protocol filtering, 70
and iSCSI, 388
CLI and PFC, 801
accessing the switch, 107 CLI configuration, 1144
banner, 237 configuration example, 1147
command completion, 112 defaults, 1136
command modes, 109 defined, 1133
command prompt, 238 queue management
error messages, 113 methods, 1135
negating commands, 112 traffic queues, 1135
CLI banner, configuring, 264 traffic shaping, 1134
trusted mode ports, 1134
clock, system, 246
untrusted mode ports, 1134
command modes, CLI, 109 web-based configuration, 1137
commands CoS queuing
abbreviated, 112
entering, 111
history buffer, 113 D
Compellent storage arrays, 391 DAI
Index 1249
defaults, 749 DHCP client, 861
optional features, 748 default VLAN, 132
purpose, 749 OOB port, 132
understanding, 748 DHCP relay, 70, 861
data center CLI configuration, 925
and DHCP snooping, 777 defaults, 913
and NSF, 170 example, 929
SDM template, 239 layer 2, 908
data center bridging layer 3, 907
exchange, 69 understanding, 907
VLAN, 909
Data Center Bridging Exchange
web-based configuration, 914
protocol, 807
DHCP server, 55
date, setting, 262
address pool configuration, 878
daylight saving time, 238 CLI configuration, 874
DCBX defaults, 861
and iSCSI, 391 examples, 878
leases, 133
DCBx, 807
options, 860
default gateway, web-based configuration, 862
configuring, 121, 127
DHCP snooping, 64, 861
default VLAN, 134
bindings database, 745
DHCP client, 132
defaults, 749
IP address configuration, 125 example, 777
denial of service, 61, 499 logging, 746
device discovery protocols, 638 purpose, 749
understanding, 744
device view, 106
VLANs, 746
DHCP
DHCPv6
understanding, 859
client, 1068
DHCP auto configuration defined, 79
dependencies, 340 examples, 1099
enabling, 344 pool, 1084
monitoring, 339 prefix delegation, 1084
process, 335
1250 Index
relay agent, configuring, 1101 document conventions, 50
relay agent, understanding, 1084 domain name server, 128
stateless server
configuring, 1099 domain name, default, 129
stateless server, Dot1x, 62
understanding, 1084 dot1x
understanding, 1083
authentication, 180
dhcpv6, 1083 double-VLAN tagging, 544
DHCPv6 pool
downloading files, 317
stateless server support, 1095
DSCP value and iSCSI, 388
DHCPv6 relay
CLI configuration, 1095 dual images, 55
defaults, 1085 dual IPv4 and IPv6 template, 239
web-based configuration, 1086 duplex mode, 86
DHCPv6 server DVMRP, 83
CLI configuration, 1095 defaults, 1167
prefix delegation, 1100 example, 1235
web-based configuration, 1086 understanding, 1165
DHCPv6 server relay web-based configuration, 1209
defaults, 1085 when to use, 1166
DiffServ dynamic ARP inspection, 64
and 802.1X, 465 dynamic LAGs, 797
and RADIUS, 465
dynamic VLAN creation, 490
and switch role, 1104
CLI configuration, 1119
defaults, 1105
elements, 1104 E
example, 1126 EAP statistics, 360
understanding, 1103
email alert
VoIP, 1130
statistics, 224
web-based configuration, 1106
email alerting, 233
diffServ, 80
log messages, 230
discovery, device, 637
enable authentication, 180
Index 1251
enhanced transmission downloading to the switch, 311
selection, 69, 819 types, 307
EqualLogic and iSCSI, 390 uploading from the switch, 311
1252 Index
VLAN IEEE 802.1X, 62
guest, 489 and DiffServ, 465
GVRP, 544 authentication, 62
statistics, 359 configuring, 481
defined, 458
monitor mode, 63, 463, 478
port authentication, 476
H
port states, 459
head of line blocking RADIUS-assigned VLANs, 479
prevention, 65 reauthenticating ports, 469
health, system, 209 VLAN assignment, 461
help, accessing web-based, 111 IEEE 802.1x
host name, 237 authentication, 180
Index 1253
interface, 843 IPSG
configuration mode, 442 and port security, 747
loopback, 844 example, 779
OOB, 124 purpose, 749
routing, 843 understanding, 747
CLI configuration, 855
IPv4 and IPv6 networks,
web configuration, 849
interconnecting, 1005
routing defaults, 848
supported types, 442 IPv4 multicast
tunnel, 845 web-based configuration, 1169
1254 Index
iSCSI CLI configuration, 796
ACL usage, 389 web-based configuration, 788
and Compellent storage LAG
arrays, 391
and STP, 784
and CoS, 388 CLI configuration, 793
and DCBX, 391
defaults, 785
and Dell EqualLogic arrays, 390
examples, 797
assigning flows, 388 guidelines, configuration, 785
CLI configuration, 397
interaction with other
defaults, 392 features, 784
examples, 399 LACP, 74
flow detection, 388 purpose, 782
information tracking, 389 static and dynamic, 782
servers and a disk array, 399 statistics, 374
understanding, 387 threshold, minimum links, 793
using, 388 understanding, 781
web-based configuration, 393 web-based configuration, 786
ISDP LAG hashing, 783
and CDP, 57
languages, captive portal, 405
CLI configuration, 656
configuring, 657 LED
enabling, 657 100/1000/10000Base-T port, 95
example, 661 port, 92
understanding, 637 SFP port, 95
web-based configuration, 641 system, 96
Link, 95
link aggregation group. See LAG.
J
link dependencies
jumbo frames, 66 CLI configuration, 452
creating, 448
example, 455
L scenarios, 441
LACP, 74 understanding, 440
adding a LAG port, 791 web configuration, 448
Index 1255
link local protocol filtering, see loopback, 78
LLPF loopback interface
LLDP configuring, 857
CLI configuration, 656 purpose, 847
defaults, 639 understanding, 844
example, 662
LSA, OSPF, 933
understanding, 637
web-based configuration, 641
LLDP-MED M
and voice VLANs, 547
configuring, 660 M6348 and stacking, 144
understanding, 638 MAC ACL
viewing information, 661 example, 531
understanding, 502
LLPF
defaults, 668, 800 MAC address table
example, 679 and port security, 747
understanding, 667 contents, 838
localization, captive portal, 405 defaults, 838
defined, 837
log messages, 54 dynamic, 841
log server, remote, 217 managing, CLI, 842
logging populating, 837
ACL, 504 stacking, 838
CLI configuration, 225 web-based management, 839
considerations, 207 MAC multicast support, 81
defaults, 207 MAC port locking, 496
destination for log messages, 204
example, 232 MAC-based 802.1X
authentication
file, 216
understanding, 460
log message format, 206
operation logs, 205 MAC-based VLAN, 542
severity levels, 205 mail server
system startup logs, 205 adding, 220
trap log, 292 configuring, 229
web-based configuration, 208
1256 Index
email alert, 220 monitoring system
management information, 203
access control list, 534 MSTP
access control using example, 635
RADIUS, 192 operation in the network, 607
access control using support, 73
TACACS+, 197 understanding, 605
management access list, MTU, configuring, 452
example, 536
MTU, management
management, in-band and interface, 122
out-of-band, 121
Multicast
MD5, 240 VLAN registration, 82
MDI/MDIX, auto, 66 multicast
MIB, SNMP, 271 DVMRP, 83
IGMP, 83
Microsoft Network Load
Balancing, 1166 IGMP proxy, 83
IGMP snooping, 81
mirror, ACL, 503 IPv4, 1169
mirroring, flow-based, 1118 layer 2, 81
MLD, 84 configuring (CLI), 725
configuring (web), 691
defaults, 1167
defaults, 689
understanding, 1162
understanding, 681
web-based configuration, 1186 when to use, 685
MLD snooping, 82 layer 3, 83
configuring, 730 CLI configuration, 1215
defaults, 689, 749 defaults, 1167
understanding, 683 examples, 1231
VLAN configuration, 731 understanding, 1157
when to use, 1160
mode MAC layer, 81
interface configuration, 442 MLD snooping, 82
monitor mode, IEEE protocols
802.1X, 463 roles, 1159-1160
Index 1257
VLAN Routing with IGMP and network design
PIM-SM, 1231 considerations, 151
multicast bridging, 681, 725 understanding, 147
multicast protocols,
supported, 1159
O
multicast routing table, 1160
OOB port, 92-93, 124
multicast snooping, 736
DHCP client, 132
multicast tunneling, 1161
OpenManage Switch
multicast VLAN Administrator, about, 101
registration, 684 optical transceiver
MVR diagnostics, 212
adding an interface, 717 OSPF, 76
areas, 932
border router, 996
N CLI configuration, 976
netinfo, 119 defaults, 940
difference from OSPFv3, 933
network information
examples, 996
CLI configuration, 132
flood blocking, 938, 1013
default, 123
LSA pacing, 937
defined, 119
NSSA, 999
example, 136
static area range cost, 936, 1008
purpose, 120
stub area, 999
web-based configuration, 124
stub routers, 934
network pool, DHCP, 865 topology, 932
nonstop forwarding, see NSF trap flags, 290
understanding, 932
NSF
web-based configuration, 942
and DHCP snooping, 172
and routed access, 175 OSPFv3, 79
and the storage access CLI configuration, 987
network, 173 difference from OSPF, 933
and VoIP, 171 global settings, 987
in the data center, 170 interface settings, 989
1258 Index
NSSA, 999 locking, 496
stub area, 999 OOB, 92-93
trap flags, 291 protected, 65, 672, 677
web-based configuration, 959 statistics, 373
out of band port, IP address, 134 traffic control, 665, 799
USB, 92
out-of-band management, 121
port channel. See LAG.
port characteristics
P CLI configuration, 451
web-based configuration, 445
password
protecting management port control, 470
access, 60 port fast, STP, 612
strong, 60
Port LEDs, 95
PFC, 801
port mirroring
PIM configuring, 375
defaults, 1167 mode, enabling, 352
IPv4 web-based understanding, 351
configuration, 1196
port security
IPv6 web-based
configuring, 498
configuration, 1196
MAC-based, 63
PIM-DM, using, 1164
PIM-SM, using, 1163 understanding, 495
SSM range, 1205 port-based traffic control
understanding, 1163 CLI configuration, 676, 807
web-based configuration, 669
port
access control, 471 port-based VLAN, 542
characteristics, 439 port-MAC locking, 63
configuration examples, 454 see port security
configuring multiple, 446
Ports, 49
defaults, 444
defined, 439 power supplies, 93
device view features, 106 priority flow control, 801
example, 454
LEDs, 92
Index 1259
priority-based flow control, 68, redirect, ACL, 503
801 relay agent, DHCPv6, 1084
private VLAN edge, 65
relay, DHCP, 907
private VLANs, 547, 602
remote logging, 228
protected port rendezvous point, PIM, 1163
defined, 667
example, 679 RIP, 77
CLI configuration, 1027
protocol filtering, Cisco, 70
defaults, 1021
protocol-based VLAN, 542 determining route
information, 1019
example, 1031
Q supported versions, 1020
understanding, 1019
QoS
web-based configuration, 1022
CoS queuing
diffserv, 80 RMON, 57
CLI management, 378
QSFP module, 91
defaults, 352
queues, CoS, 1135 example, 386
understanding, 350
web-based configuration, 353
R router discovery, 901
RADIUS, 60 router discovery protocol, 77
and DiffServ, 465
router, OSPF, 933
authentication, 186
authorization, 191 routes
for management access IPv4, 897
control, 192 IPv6, 1072
supported attributes, 194 selecting, 933
understanding, 192 Routing
RAM log, 215 table, 77
real time clock, 238 routing
Red, 96 defaults (IPv4), 885
defaults (IPv6), 1061
1260 Index
example, 904 CLI configuration, 476
IPv4, CLI configuration, 899 defaults, 466, 495
IPv4, web-based examples, 481
configuration, 887 web-based
IPv6, CLI configuration, 1073 configuration, 467
IPv6, web-based sFlow, 57
configuration, 1063 CLI management, 378
understanding, 883 defaults, 352
routing interfaces example, 384
CLI configuration, 855 understanding, 347
defaults, 848 web-based management, 353
understanding, 843 SFP port LEDs, 95
using, 846
SFP+ module, 91
web-based configuration, 849
SFTP, managing files, 325
routing table
best routes, 894 SNMP
configuring, 902 CLI configuration, 293
IPv6, 1077, 1079 defaults, 273
examples, 302
RSTP
MIB, 271
understanding, 605
purpose, 273
running-config, saving, 313 traps, 272
understanding, 271
uploading files, 313
S web-based configuration, 275
save, system settings, 313 SNMPv1 example, 302
SDM template SNMPv2 example, 302
configuration guidelines, 239 SNMPv3
managing, 260 engine ID, 293
understanding, 239 example, 303
SDM templates, 56 snooping,FIP, 814
security SNTP
port, defined, 495 authentication, 260
port-based authentication key, 248
Index 1261
example, 267 web-based configuration, 153
server, 260 static reject route, 884
server configuration, 251
statistics
understanding, 240
IPv6, 1066
software image, 307
statistics, Etherlike, 358
spanning tree. See STP.
storage arrays and iSCSI, 390
Speed, 95
storage arrays, Compellent, 391
split horizon, 1020
storm control
SSH files, 310 configuring, 676
SSH/SSL, 61 default, 668, 800
SSL files, 310 example, 679
understanding, 666
SSM range, 1205
STP
stacking and LAGs, 784
adding a switch, 145
classic, 605
and NSF, 59
CLI configuration, 628
CLI configuration, 162 defaults, 615
defaults, 152
defined, 605
defined, 141
examples, 633
design consideration, 150 loop guard, 613
failover, 59
MSTP, 73
failover, example, 166
optional features, 612
failover, initiating, 148 port fast, 612
features, 58
port settings, 73
firmware synchronization, 147
root guard, 613
firmware update, 147 RSTP, 73
MAC address table, 838
understanding, 606
MAC addresses, 150 web-based configuration, 616
NSF usage scenario, 164
preconfiguration, 168 subnet mask, configuring, 121
purpose, 151 subnet-based VLAN, 542
removing a switch, 146 summer time, 238
standby, 147
switchport modes, VLAN, 542
switch compatibility, 144
1262 Index
switchport statistics, web time zone, 255
view, 363 time, setting the system, 269
system description, 49
time-based ACLs, 504, 533
system health, monitoring, 208
traffic class queue, 388
system information traffic control
CLI configuration, 258
port based, 665, 799
default, 240
defined, 237 traffic inspection, 743
example, 264 traffic monitoring, 347
purpose, 238 traffic snooping, 743
web-based configuration, 241
traps
system LEDs, 92 OSPF, 290
system time, 240 trunk port
and 802.1X authentication, 489,
491
T trunking, 579
TACACS+, 60 tunnel, 78
authentication, 184
authorization, 187-188 tunnel interfaces, 845
management access control, 197
supported attributes, 198
understanding, 197 U
tagging, VLAN, 543 UDP relay, 77, 909
telnet upgrade, stack firmware, 58
configuration options, 61 uploading files, 319
connecting to the switch, 108
USB auto configuration
TFTP, image download, 322 files, 334
Thermal LEDs, 96 understanding, 334
time domain reflectometry, 211 USB flash drive, example, 331
time management, 54 USB port, 92
time range, 527 user security model, SNMP, 272
Index 1263
users voice traffic, 546
authenticated, 470 voice, example, 601
captive portal, 414 voice, understanding, 545
IAS database, 465 web-based configuration, 556
USM, 272 VLAN membership,
defining, 556
VLAN priority tag and
V iSCSI, 388
ventilation system, 94 VLAN routing, 843, 846
virtual link, OSPF, 1003 VLAN tagging, 543
VLAN, 784 VLANs
authenticated and dynamically created, 490
unauthenticated, 461 RADIUS-assigned, 490
CLI configuration, 576 voice traffic, identifying, 546
defaults, 554
voice VLAN, 546
double, 72
and LLDP-MED, 547
double-VLAN tagging, 544
dynamic, 462 example, 601
understanding, 545
example, 592, 597
guest, 72, 462, 490 VoIP, 80
IP subnet-based, 71 VoIP and DiffServ, 1130
MAC-based, 71, 542
VoIP, auto, 1151
port-based, 70, 542
private, 547, 602 VRRP, 78
protocol-based, 71, 542 accept mode, 1037
RADIUS-assigned, 490 CLI configuration, 1048
routing, 76 defaults, 1039
routing interfaces, 843, 855 example, 1050
static, 542 interface tracking, 1037
support, 70 load sharing example, 1050
switchport modes, 542 preemption, 1036
trunk port, 579 route and interface tracking
understanding, 539 example, 1054
voice, 71, 546 route tracking, 1037
router priority, 1036
1264 Index
understanding, 1035
web-based configuration, 1040
W
web-based configuration, 102
web-based interface,
understanding, 103
writing to memory, 313
Index 1265
Index 1266