Back to Contents Page

Configuring Switch Information

Dell™ PowerConnect™ 3324/3348 User's Guide

  Configuring Network Security

  Configuring Ports

  Configuring Address Tables

  Configuring GARP

  Configuring the Spanning Tree Protocol

  Configuring VLANs

  Aggregating Ports

  Multicast Forwarding Support


This section provides all system operation and general information for configuring network security, ports, Address tables, GARP, VLANs, Spanning Tree, Port Aggregation, and Multicast Support.

Switch Page


Configuring Network Security

Dell™ PowerConnect™ 3324/3348 allows network managers to set network security through both Access Control Lists and Locked Ports.

To open the Network Security page:

Network Security Page

The Network Security page contains links to the following topics:

Network Security Overview

Access Control Lists (ACLs) allow network managers to define classification actions and rules for specific ingress ports. ACLs contain multiple classification rules and actions. Each classification rule and action is an Access Control Element (ACE). ACEs are the filters that determine traffic classifications. Packets are matched by the following ACEs:

For example, a network administrator may define an ACL rule that states that port number 20 can receive TCP packets; however, if a UDP packet is received, the packet is dropped.

A single ACL can contain more than one ACE. The ACEs within an ACL are applied in a first fit manner. The ACEs are processed sequentially, starting with the first ACE. When a packet is matched to an ACE classification, the ACE action is taken, and the ACL processing stops. If a match is not found, the packet is dropped as a default action. If several ACLs are to be processed, the default action is applied only after processing all the ACLs. The default drop action forwards all permitted traffic, including management traffic such as Telnet, HTTP, or SNMP, to the switch.

Network mangers can define two types of ACLs:

Packets entering an ingress port with an active ACL are:

PowerConnect 3324/3348 supports up to 128 ACLs. PowerConnect 3324/3348 supports up to 248 ACEs per FE port and up to 120 ACEs per GE port can be defined.

Configuring Port Security

Network users can be limited to specific ports or LAGs with Locked Ports. Locked Port is restricted to users with specific MAC addresses. Locked ports can only be enabled on static MAC addresses. In addition, the Locked Port security option enables storing a list of MAC addresses in the Configuration file. The MAC address list can be restored after the device has been reset. MAC addresses are learned either dynamically or statically.

Packets arriving at a locked port are either forwarded, dropped, or the packet is dropped, a trap is sent, and the ingress port is disabled. Disabled ports are activated from the Port Parameters page. See "Defining Port Parameters". To open the Port Security page:

Port Security Page

The Port Security page contains the following fields:

Defining a Locked Port:

  1. Open the Port Security page.

  2. Select an interface type and number.

  3. Define the Set Port, Action on Violation, and Trap fields.

  4. Click Apply Changes. The locked port is added to the Port Security Table, and the device is updated.

Displaying the Locked Port Table:

  1. Open the Port Security page.

  2. Click Show All. The Port Security Table page opens. The fields in the Port Security Table are the same as the fields in the Port Security page. Locked Ports can also be defined from the Locked Ports Table as well as the Port Security page.

Port Security Table Page

In addition to the fields displayed in the Port Security Page, the Port Security Table page contains the following additional field:

Configuring Locked Port Security with CLI Commands

The following table summarizes the equivalent CLI commands for configuring Locked Port security as displayed in the Port Security Page.

CLI Command

Description

shutdown

Disables interfaces.

set interface active {ethernet interface | port-channel port-channel-number}

Reactivates an interface that is shutdown due to port security reasons.

port security <options> trap frequency

Locks learning of new addresses on an interface.

show ports security

Displays port lock status.

The following is an example of the CLI commands:

From 18.1.16 Console # show ports security

Port Action Trap Frequency Counter

---------------------------------------------

5/7 Discard Enable 100 88

7/8 Discard Disable

Defining IP-Based ACLs

The Add ACE to IP Based ACL page allows network administrators to define IP-based Access Control Lists (ACLs) and Access Control Entries (ACEs). ACEs act as filters to match packets to forwarding criteria. To open the Add ACE to IP Based ACL page:

Add ACE to IP Based ACL Page

The Add ACE to IP Based ACL page contains the following fields:

Adding IP-based ACLs:

  1. Open the Add ACE to IP Based ACL page.

  2. Click Add. The Add ACE to IP Based ACL page opens.

Add IP Based ACL Page

  1. Define the ACL Name, New Ace Priority, Protocol, Source and Destination Port, Source and Destination IP Address, Match DSCP or Match IP Precedence, and Action fields.

  2. Click Apply Changes. The IP-based ACLs are defined. If a new ACE priority was defined, it is added to the new ACL.

Assigning ACEs to a IP-based ACL:

  1. Open the Add ACE to IP Based ACL page.

  2. Select an ACL in the ACL Name drop-down list.

  3. Define the New ACE Priority field.

  4. Define the ACE No., Protocol, Source and Destination Port, Source and Destination IP Address, Match DSCP or Match IP Precedence, and/or Action fields.

  5. Click Apply Changes. The ACE is assigned to the IP-based ACL.

Displaying ACL-specific ACEs:

  1. Open the Add ACE to IP Based ACL page.

  2. Click Show All. The ACEs Associated with IP-ACL page opens.

ACEs Associated with IP-ACL

Modifying an IP-based ACE:

  1. Open the Add ACE to IP Based ACL page.

  2. Click Show All.The ACEs Associated with IP-ACL page opens.

  3. Modify the ACL Name, New Ace Priority, Protocol, Source and Destination Port, Source and Destination IP Address, Match DSCP or Match IP Precedence, and Action fields.

  4. Click Apply Changes. The IP-based ACEs is modified, and the device is updated.

Removing ACLs:

  1. Open the Add ACE to IP Based ACL page.

  2. Click Show All.The ACEs Associated with IP-ACL page opens.

  3. Select an ACL.

  4. Check the Remove ACL check box.

  5. Click Apply Changes. The IP-based ACL is removed, and the device is updated.

Removing ACEs:

  1. Open the Add ACE to IP Based ACL page.

  2. Click Show All.The ACEs Associated with IP-ACL page opens.

  3. Select an ACE.

  4. Check the Remove check box.

  5. Click Apply Changes. The IP-based ACE is removed, and the device is updated.

Assigning IP-based ACEs to ACLs Using the CLI Commands

The following table summarizes the equivalent CLI commands for assigning IP-based ACEs to ACLs as displayed in the Add ACE to IP Based ACL page.

CLI Command

Description

ip access-list name

Enters to IP-Access list configuration mode.

permit {any | protocol} {any | {source source-wildcard}} {any | {destination destination-wildcard}} [dscp dscp number | ip-precedence ip-precedence]

Allows traffic if the conditions defined in the permit statement are matched.

deny [disable-port] {any| protocol} {any | {source source-wildcard}} {any | {destination destination-wildcard}} [dscp dscp number | ip-precedence ip-precedence]

Denies traffic if the conditions defined in the deny statement are matched.

The following is an example of the CLI commands:

Permit 00:00:bo:11:11:11 0:0:0:0:0:0 any VLAN 4

deny 00:00:bo:11:11:11 0:0:0:0:0:0 any VLAN 4

Defining MAC-Based ACLs

The Add ACE to MAC Based ACL page allows network administrators to define MAC-based Access Control Entry (ACE) and Access Control Lists (ACLs). ACEs act as filters to match packets to forwarding criteria. To open the Add ACE to MAC Based ACL:

Add ACE to MAC Based ACL Page

The Add ACE to MAC Based ACL page contains the following fields:

Adding a MAC-based ACL:

  1. Open the Add ACE to MAC Based ACL page.

  2. Click Add. The Add MAC Based ACL page opens.

ACEs Associated with Mac-Based ACLs

  1. Define the ACL Name, Source and Destination Address, and Action fields.

  2. Click Apply Changes. The MAC-based ACL is defined and the device is updated.

Assigning ACEs to a MAC-based ACL:

  1. Open the Add ACE to MAC Based ACL page.

  2. Select an ACL in the ACL Name drop-down list.

  3. Define the New ACE Priority field.

  4. Define the ACL Name, VLAN ID, Source and Destination Address, and Action fields.

  5. Click Apply Changes. The ACE is assigned to the MAC based ACL.

Displaying ACL-specific ACEs:

  1. Open the Add ACE to MAC Based ACL page.

  2. Click Show All. The ACEs Associated with MAC ACL page opens.

ACEs Associated with MAC ACL

Modifying a MAC-based ACE:

  1. Open the Add ACE to MAC Based ACL page.

  2. Click Show All.The ACEs Associated with MAC ACL page opens.

  3. Modify the ACL Name, Source and Destination Address, and Action fields.

  4. Click Apply Changes. The MAC-based ACEs is modified, and the device is updated.

Removing ACLs:

  1. Open the Add ACE to MAC Based ACL page.

  2. Click Show All. The ACEs Associated with MAC ACL page opens.

  3. Select an ACL.

  4. Check the Remove ACL check box.

  5. Click Apply Changes. The MAC-based ACL is removed, and the device is updated.

Removing ACEs:

  1. Open the Add ACE to MAC Based ACL page .

  2. Click Show All.The ACEs Associated with MAC ACL page opens.

  3. Select an ACE.

  4. Check the Remove check box.

  5. Click Apply Changes. The MAC-based ACE is removed, and the device is updated.

Assigning MAC-Based ACEs to ACLs Using the CLI Commands

The following is an example. Station A is connected to port 5, and Station B is connected to port 9. Station A has the MAC address 00-0B-CD-35-6A-00 (ip address: 10.0.0.1 255.255.255.0). Station B has the MAC address 00-06-6B-C7-A1-D8 (ip address: 10.0.0.2 255.255.255.0).

To implement a MAC ACL on port 5 to allow all traffic to move from Station A to Station B, enter the following CLI commands

permit source mac address destination mac address

permit 00-0B-CD-35-6A-00 0.0.0.0.0.0 00-06-6B-C7-A1-D8 0.0.0.0.0.0

All traffic that matches the ACL passes the traffic, and all other traffic is denied. (There is an additional promiscuous deny all entered at the end of the ACL.)

For the above example, Station A is trying to send ICMP ECHO to Station B. The ICMP fails, even if it is permitted by the MAC ACL. The problem is that Station A is trying to send the ICMP ECHO to Station B, but it does not have an entry in the ARP table. Station A tries to get the MAC address of Station B by ARP request that is the broadcast frame with the source MAC of Station A (00-0B-CD-35-6A-00) and destination broadcast (FF.FF.FF.FF.FF.FF). This frame is silently dropped because it does not match the MAC ACL that was set up on port 5.

To solve this issue, the user has to enter the additional permit line that allows the broadcast frame:

permit 00-0B-CD-35-6A-00 0.0.0.0.0.0 FF.FF.FF.FF.FF.FF 0.0.0.0.0.0

NOTE: Even though a user intends to permit traffic from MAC address A to MAC address B, the user cannot succeed with simple traffic like ICMP, because the additional broadcast is not taken into consideration.

The following table summarizes the equivalent CLI commands for assigning MAC based ACEs to ACLs as displayed in the Add ACE to MAC Based ACL page.

CLI Command

Description

mac access-list name

Creates Layer 2 MAC ACLs, and enters to MAC-Access list configuration mode.

permit {any | {host source source-wildcard} any | {destination destination-wildcard}}[vlan vlan-id]

Allows traffic if the conditions defined in the permit statement are matched.

deny [disable-port] {any | {source source- wildcard} any | {destination destination- wildcard}}[vlan vlan-id]

Allows traffic if the conditions defined in the permit statement are matched.

The following is an example of the CLI commands:

Console (config)# mac access-list dell

Console (config-mac-al)# permit 6.6.6.6.6.6 0.0.0.0.0.0 any vlan 4

Console (config-mac-al)# deny 6.6.6.6.6.6 0.0.255.255.255.255

Binding ACLs

The ACL Bindings page allows network managers to assign ACL Lists to interfaces. To open the ACL Bindings page:

NOTE: ACLs have no effect unless attached to an interface.

ACL Bindings Page

The ACL Bindings page contains the following fields:

Assigning an ACL to an Interface:

  1. Open the ACL Bindings page.

  2. Select the ACL type in the Select ACL fields.

  3. Define the interface to which the ACL is attached in the Attach ACL to an Interface field.

  4. Click Apply Changes. The ACL is attached to the interface.

Assigning ACL Membership Using the CLI Commands

The following table summarizes the equivalent CLI commands for assigning ACL membership as displayed in the ACL Bindings page.

CLI Command

Description

class-map class-map-name [match-all | match-any]

Creates class maps and enters the class-map configuration mode.

match access-group ACL name

Defines the match criterion to classify traffic.

show class-map [class-map-name]

Displays all the class maps configured on the device.

The following is an example of the CLI commands:

Console (config)# class-map class1 match-any

Console (config-cmap)# match access-group dell

Console (config-cmap)# exit

Console (config)# exit

Console # exit

Console> show class-map class1

Class Map match-any class1 (id4)


Configuring Ports

This section provides an explanation and instruction for configuring port functionality including advanced features, such as Storm Control and Port Mirroring. To open the Ports page:

Ports Page

This section includes the following topics:

Defining Port Parameters

The Port Configuration page allows network administrators to define port parameters. To open the Port Configuration page:

Port Configuration

The Port Configuration page contains the following fields:

NOTE: Auto MDIX does not operate on FE ports when auto negotiation is disabled.

The following table describes the parameter combination settings required to configure ports. These settings ensure that configuration functionalities are maintained.

Auto Negotiation

Enabled

Disabled

Auto

legal

illegal

MDI

legal

legal

MDIX

legal

legal

Defining Port Parameters:

  1. Open the Port Configuration page.

  2. Select a port in the Port field.

  3. Define the Description, Admin Status, Admin Speed, Admin Duplex, Auto Negotiation, Back Pressure, Admin Auto MDIX and/or Admin Flow Control fields.

  4. Click Apply Changes. The port parameters are saved to the device.

Modifying Port Parameters:

  1. Open the Port Configuration page.

  2. Select a port in the Port field.

  3. Modify the Description, Admin Status, Admin Speed, Admin Duplex, Auto Negotiation, Back Pressure, Admin Auto MDIX and/or Admin Flow Control fields.

  4. Click Apply Changes. The port parameters are saved to the device.

Displaying the Port Configuration Table:

  1. Open the Port Configuration page.

  2. Click Show All. The Port Configuration Table opens.

Ports Configuration Table

In addition to the Port Configuration page fields, the Port Configuration Table also displays the following field:

Configuring Ports with CLI Commands

The following examples describe how to set a port to MDIX or MDI mode. To set a port to MDIX mode, enter the following at the system prompt:

console(config-if)# mdix on

The following message displays:

console # show inter config ethernet 1/e1

Flow Admin Back Mdix
Port Type Duplex Speed Neg Control State Pressure Mode

.......................................................

1/e1 100M-Copper Enabled Off Up Disabled On

To set a port to MDI mode, enter the following at the system prompt:

console(config)# inter eth 1/e1

console(config-if)# no mdix

The following message displays:

console # show inter config ethernet 1/e1

Flow Admin Back Mdix
Port Type Duplex Speed Neg Control State Pressure Mode

.......................................................

1/e1 100M-Copper Enabled Off Up Disabled Off

The following table summarizes the equivalent CLI commands for configuring ports as displayed in the Port Configuration.

CLI Command

Description

interface ethernet interface

Enters the interface configuration mode to configure an ethernet type interface.

description string

Adds a description to an interface configuration.

shutdown

Disables interfaces that are part of the currently set context.

set interface active {ethernet interface | port-channel port-channel-number}

Reactivates an interface that is shut down due to security reasons.

speed {10 | 100 | 1000}

Configures the speed of a given ethernet interface when not using auto negotiation.

duplex {half | full}

Configures the full/half duplex operation of a given ethernet interface when not using auto negotiation.

negotiation

Enables auto negotiation operation for the speed and duplex parameters of a given interface.

back-pressure

Enables Back Pressure on a given interface.

flowcontrol {auto | on | off | rx | tx}

Configures the Flow Control on a given interface.

mdix {on | auto}

Enables automatic crossover on a given interface or Port-channel.

show interfaces configuration [ethernet interface | port-channel port-channel-number]

Displays the configuration for all configured interfaces.

show interfaces status [ethernet interface | port-channel port-channel-number]

Displays the status for all configured interfaces.

show interfaces description [ethernet interface | port-channel port-channel-number]

Displays the description for all configured interfaces.

The following is an example of the CLI commands:

Console (config)# interface ethernet 1/e5

Console (config-if)#

Console (config-if)# description RD SW#3

Console (config-if)# shutdown

Console (config-if)# no shutdown

Console (config-if)# speed 100

Console (config-if)# duplex full

Console (config-if)# negotiation

Console (config-if)# back-pressure

Console (config-if)# flowcontrol on

Console (config-if)# mdix auto

Console (config-if)# exit

Console (config)# exit

Console# show interfaces configuration

Port Type Duplex Speed Neg Flow Back MDIX Admin

Cont Pres Mode State

---- ---------- ------ ----- ---- ---- ---- ----- -----

1/e1 1g-combo-c Full 1000 Auto On Enable Auto Up

2/e1 100-copper Full 1000 Off Off Disable off Up

2/e2 1g-Fiber Full 1000 Off Off Disable on Up

Neg : Negotiation

Flow Cont: Flow Control

Back Pres: Back Pressure

Console# show interfaces status

Port Port Duplex Speed Neg Flow Back MDI Link

Cont Pres Mode State

---- ---------- ------ ----- ---- ---- ---- ---- -----

2/e1 100-copper Full 1000 off Off Disable Off Down*

Legend

Neg : Negotiation

Flow Cont: Flow Control

Back Pres: Back Pressure

*: The interface was suspended by the system.

Router# show interfaces description

Port Description

---- --------------------------------------------

1/e1 Port that should be used for management only

2/e1

2/e2

Port Channel Description

------------ -----------

1 dell

2 projects

Defining LAG Parameters

The LAG Configuration page allows network managers to configure parameter for configured LAGs. PowerConnect 3324/3348 supports up to 8 ports per LAG, and 6 LAGs per system. The system provides 6 permanent LAGs. For information about Link Aggregated Groups (LAGs) and assigning ports to LAGs, see "Aggregating Ports".

To open the LAG Configuration page:

NOTE: If port configuration is modified while the port is a LAG member, the configuration change is only effective after the port is removed from the LAG.

LAG Configuration Page

The LAG Configuration page contains the following fields:

Defining LAG parameters:

  1. Open the LAG Configuration page.

  2. Select a LAG in the LAG field.

  3. Define the Description, Admin Status, Port Speed, Admin Auto Negotiation, Admin Speed, and/or Admin Flow Control fields.

  4. Click Apply Changes. The LAG parameters are saved to the device.

Modifying LAG parameters:

  1. Open the LAG Configuration page

  2. Select a LAG in the LAG field.

  3. Modify the Description, Admin Status, Port Speed, Admin Auto Negotiation, Admin Speed, and/or Admin Flow Control fields.

  4. Click Apply Changes. The LAG parameters are saved to the device.

Displaying the LAG Configuration Table:

  1. Open the LAG Configuration page.

  2. Click Show All. The LAG Configuration Table opens.

LAG Configuration Table

Configuring LAGs with CLI Commands

The following is an example of how to set up LAG with auto-negotiation disabled, 100Full.

At the system prompt, enter the following to set up static link aggregation:

console> en

console# config

console(config)# interface port-channel 1

console(config-if)# no neg

console(config-if)# speed 100

console(config-if)# exit

console(config)# interface range ethernet 1/e23-24

console(config-if)# no mdix

console(config-if)# no neg

console(config-if)# speed 100

console(config-if)# duplex full

console(config-if)# channel-group 1 mode on

console(config-if)# end

The following message displays:

console# sh interfaces status port-channel 1

Flow Link Back
ch Type Duplex Speed Neg Control State Pressure

..............................................................

ch1 100M Full 100 Disabled Off Up Disabled

The following table summarizes the equivalent CLI commands for configuring LAGs as displayed in the LAG Configuration page.

CLI Command

Description

interface port-channel port-channel-number

Creates a port-channel and enters port-channel configuration mode.

channel-group port-channel-number mode {on | auto}

Associates a port with a port-channel.

show interfaces port-channel [port-channel-number]

Displays Port-channel information (which ports are members of a Port-channel, and whether they are currently active or not).

The following is an example of the CLI commands:

Console (config)# interface ethernet 1/e5

Console (config-if)# channel-group 1 mode on

Console (config-if)# exit

Console (config-if)# exit

Console # show interfaces port-channel

Channel Port

------------ ----------------------------------

1 Active 1/e5, 2/e2 Inactive 3/e3

2 Active 1/e2

3 Inactive 3/e8

Enabling Storm Control

A Broadcast Storm is a result of an excessive amount of broadcast messages simultaneously transmitted across a network by a single port. Forwarded message responses are loaded onto the network, straining network resources or causing the network to time out.

Storm Control is enabled for all fast Ethernet ports or for Giga ports by defining the packet type and the rate the packets are transmitted. Ports can also be grouped to provide Storm protection for the entire group.

The system measures the incoming Broadcast, Multicast, and Unknown frame rate separately on each port, and discards frames when the rate exceeds a user-defined rate.

The Storm Control page allows network managers to enable and configure Storm Control. To open the Storm Control page :

Storm Control Page

The Storm Control page contains the following fields:

Enabling Storm Control on the device:

  1. Open the Storm Control page

  2. Select an interface on which to implement storm control.

  3. Define the Unknown Unicast Control, Unknown Multicast Control, Broadcast Control, and the Rate Threshold (250-148000) fields.

  4. Click Apply Changes. Storm control is enabled on the device.

Modifying Storm Control port parameters:

  1. Open the Storm Control page.

  2. Modify the Unknown Unicast Control, Unknown Multicast Control, Broadcast Control, and the Rate Threshold (250-148000) fields.

  3. Click Apply Changes. The storm control port parameters are saved to the device.

Displaying the Port Parameters Table:

  1. Open the Storm Control page .

  2. Click Show All. The Storm Control Settings Table opens.

Storm Control Settings Table

Configuring Storm Control with CLI Commands

The following table summarizes the equivalent CLI commands for configuring storm control as displayed in the Storm Control page.

CLI Command

Description

port storm-control enable {unknown | broadcast | multicast} {fastethernet | gigaethernet interface}

Enables broadcast storm control for Unicast, Multicast, and Broadcast packets.

port storm-control rate gigaethernet interface rate.

Configures the maximum broadcast rate.

show ports storm-control

Displays the storm control configuration.

The following is an example of the CLI commands:

Console(config)# port storm-control rate fastethernet 300

Console(config)# port storm-control enable fastethernet

Console# show ports storm-control

Port Unknown Broadcast Multicast Rate

[Packets/sec]

-------------- -------- --------- -------- -----------

Gigaethernet 1 Enabled Disabled Enabled 2000

Gigaethernet 2 Enabled Enabled Enabled 2000

FastEthernet Enabled Enabled Enabled 1000

Defining Port Mirroring Sessions

Port mirroring monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port to a monitoring port. Port mirroring can be used as a diagnostic tool and/or debugging feature. Port mirroring also enables switch performance monitoring.

Network administrators configure port mirroring by selecting a specific port to copy all packets, and different ports from which the packets are copied. Before configuring port mirroring, note the following:

The following restrictions apply to ports configured to be destination ports:

The following restrictions apply to ports configured to be source ports:

The following restriction applies to ports configured as source ports:

All the RX/TX packets should be monitored to the same port.

To open the Port Mirroring page:

NOTE: When a port is set to be a target port for a port-mirroring session, all normal operations on this port are suspended. These operations include Spanning Tree and LACP.

Port Mirroring Page

Adding a port mirroring session:

  1. Open the Port Mirroring page.

  2. Click Add. The Add Source Port page opens.

Add Source Port

  1. Define the Source Port and Type fields.

  2. Click Apply Changes. The new source port is defined, and the device is updated.

Deleting a copy port from a port mirroring session:

  1. Open the Port Mirroring page.

  2. Check the Remove check box.

  3. Click Apply Changes. The port mirroring session is deleted, and the device is updated.

Configuring a Port Mirroring Session Using CLI Commands

The following table summarizes the equivalent CLI commands for configuring a Port Mirroring session as displayed in the Port Mirroring page.

CLI Command

Description

port monitor src-interface [rx | tx]

Displays the port copy status.

show ports monitor

Starts a port monitoring session.

The following is an example of the CLI commands:

Console(config)# interface ethernet 1/e1

Console(config-if)# port monitor 1/e8

Console# show ports monitor

Source port Destination Port Type Status

----------- ---------------- ----- -------

1/e1 1/e8 RX, TX Active

1/e2 1/e8 RX Active


Configuring Address Tables

MAC addresses are stored in either the Static Address or the Dynamic Address databases. A packet addressed to a destination stored in one of the databases is forwarded immediately to the port. The Static and Dynamic Address Tables can be sorted by interface, VLAN, and interface type. MAC addresses are dynamically learned as packets from sources arrive at the switch. Addresses are associated with ports by learning the ports from the frame's source address. Frames addressed to a destination MAC address that is not associated with any port are flooded to all ports of the relevant VLAN. Static addresses are manually configured by the user. In order to prevent the bridging table from overflowing, dynamic MAC addresses, are erased if they do not experience any traffic after a certain time period.

To open the Address Tables page:

Address Tables Page

The Address Tables page contains links to the following:

Defining Static Addresses

The Static MAC Address page contains a list of static MAC addresses. Static addresses can be added and removed from the Static MAC Address page. In addition, several MAC addresses can be defined for a single port. To open the Static MAC Address page:

Add Static MAC Address Page

The Add Static MAC Address page contains the following fields:

Adding a static address to the Static Address Table:

  1. Open the Static Address Table.

  2. Click Add. The Add Static MAC Address page opens.

Add Static MAC Address Page

  1. Define the Interface, MAC Address, VLAN ID or VLAN Name, and the Status fields.

  2. Click Apply Changes. The new static address is added to the Static Address table, and the device is updated.

Modifying a static address in the Static Address Table:

  1. Open the Static Address Table.

  2. Modify the Port, MAC Address, and the VLAN field.

  3. Click Apply Changes. The static address is modified, and the device is updated.

Displaying the Static MAC Address Table:

  1. Open the Static Address Table.

  2. Click Show All. The Static MAC Address Table opens.

Static MAC Address Table

Removing a static address from the Static Address Table:

  1. Open the Static Address Table.

  2. Click Show All to open the Static MAC Address Table.

  3. Select a single or multiple table entries.

  4. Check the Remove check box.

  5. Click Apply Changes. The selected static addresses are deleted, and the device is updated.

Configuring Static Address Parameters Using CLI Commands

The following table summarizes the equivalent CLI commands for configuring static address parameters as displayed in the Add Static MAC Address page.

CLI Command

Description

bridge address mac-address {ethernet interface | port-channel port-channel-number} [permanent | delete-on-reset | delete-on-timeout| secure]

Adds a static MAC-layer station source address to the bridge table.

show bridge address-table static [vlan vlan] [ethernet interface | port-channel port-channel-number]

Displays classes of statically entered entries in the bridge-forwarding database.

The following is an example of the CLI commands:

Console (config-vlan)# bridge address 168.210.0.10 ethernet 1/e8 permanent

Console# show bridge address table static

Aging time is 300 sec

vlan mac address port type

---- -------------- ----- -----

200 0010.0D48.37FF 5/9 delete-on-reset

Viewing Dynamic Addresses

The Dynamic Address page contains information about querying the Dynamic Address Table, including the interface type, MAC addresses, VLAN, and table sorting. Packets forwarded to an address stored in the Address Table are forwarded directly to those ports. To open the Dynamic Address Page:

Dynamic Address Table Page

The Dynamic Address page contains the following fields:

The Query Results Table contains the following columns:

Redefining the Aging Time:

  1. Open the Dynamic Address Table.

  2. Define the Aging Time field.

  3. Click Apply Changes. The aging time is modified, and the device is updated.

Querying the Dynamic Address Table:

  1. Open the Dynamic Address Table.

  2. Define the parameter by which to query the Dynamic Address Table. The Dynamic Address Table entries can be queried by interface, MAC Address, or VLAN.

  3. Click Query. The Dynamic Address Table is queried. The query results are sorted by the selected Address Table Sort Key field value.

Querying and Sorting Dynamic Addresses Using CLI Commands

The following table summarizes the equivalent CLI commands for querying and sorting dynamic addresses as displayed in the Dynamic Address Table page.

CLI Command

Description

bridge aging-time seconds

Sets the address table aging time.

show bridge address-table [vlan vlan] [ethernet interface | port-channel port-channel-number]

Displays classes of dynamically created entries in the bridge-forwarding database.

The following is an example of the CLI commands:

Console (config)# bridge aging-time 250

Console (config)# exit

Console# show bridge address table

Aging time is 250 sec

vlan mac address port type

---- -------------- ----- -----

1 0060.704C.73FF 5/e8 dynamic

1 0060.708C.73FF 5/e8 dynamic

200 0010.0D48.37FF 5/e9 static


Configuring GARP

Generic Attribute Registration Protocol (GARP) protocol is a general-purpose protocol that registers any network connectivity or membership-style information. GARP defines a set of devices interested in a given network attribute, such as VLAN or multicast address. To open the GARP page:

GARP Page

This section includes the following topic:

Defining GARP Timers

The GARP Timers page contains parameters for enabling GARP on the device. To open the GARP Timers page:

GARP Timers Page

The GARP Timers page contains the following fields:

NOTE: The following relationships between the various timer values must be maintained: Leave time must be greater than or equal to three times the join time. Leave-all time must be greater than the leave time.

Defining GARP Timers:

  1. Open the GARP Timers page.

  2. Define the Interface, GARP Join Time, GARP Leave Timer, and GARP Leave All Timer.

  3. Click Apply Changes. The GARP parameters are saved to the device.

Displaying the GARP Timers Table:

  1. Open the GARP Timers page.

  2. Click Show All. The GARP Timers Table opens.

GARP Timers Table

In addition to the GARP Timers page fields, the GARP Timers Table page also displays the following fields:

Copying GARP Information:

  1. Open the GARP Timers page.

  2. Click Show All. The GARP Timers Table opens.

  3. Select an interface in the Copy Parameters from field.

  4. Select the interfaces to which the GARP Timers information is copied in the Copy To fields.

Defining GARP Timers Using CLI Commands

The following table summarizes the equivalent CLI commands for defining GARP timers as displayed in the GARP Timers page.

CLI Command

Description

garp timer {join | leave | leaveall} timer_value

Sets the GARP application join, leave, and leaveall GARP timer values.

The following is an example of the CLI commands:

Console (config)# interface ethernet 1/e8

Console (config-if)# garp timer leave 900


Configuring the Spanning Tree Protocol

The Spanning Tree Protocol (STP) provides a single path between end stations on a Layer 2 network, thereby eliminating loops.

Loops occur when alternate routes exist between hosts. Loops in an extended network may cause bridges to forward traffic indefinitely, resulting in increased traffic and a reduction in network performance. To open the Spanning Tree page:

Spanning Tree Page

This section contains the following topics:

Defining STP Global Settings

The Spanning Tree Global Parameters page contains parameters for enabling and configuring STP operation on the device. To open the Spanning Tree Global Parameters page:

Spanning Tree Global Settings Page

The Spanning Tree Global Parameters page contains the following fields:

Defining STP Global Parameters:

  1. Open the Spanning Tree Global Parameters page.

  2. Select Enable in the Spanning Tree State field.

  3. Select the Classic STP in the STP Operation Mode field.

  4. Click Apply Changes. STP is enabled on the device.

Modifying STP Global Parameters:

  1. Open the Spanning Tree Global Parameters page.

  2. Define the STP Operation Mode, Bridge Priority, Hello Time (Sec), Max Age (Sec), and the Forward Delay (Sec) fields.

  3. Click Apply Changes. The STP parameters are modified, and the device is updated.

Defining STP Global Parameters Using CLI Commands

The following table summarizes the equivalent CLI commands for defining STP Global Parameters as displayed in the Spanning Tree Global Settings page.

CLI Command

Description

spanning-tree

Enables spanning tree functionality.

spanning-tree mode {stp | rstp}

Configures the spanning tree protocol currently running.

spanning-tree priority priority

Configures the spanning tree priority.

spanning-tree hello-time seconds

Configures the spanning tree bridge Hello Time, which is how often the switch broadcasts Hello messages to other switches.

spanning-tree max-age seconds

Configures the spanning tree bridge maximum age, which determines the amount of time protocol information received on a port is stored by the switch.

spanning-tree forward-time seconds

Configures the spanning tree bridge forward time, which is the amount of time a port remains in the listening and learning states before entering the forwarding state.

show spanning-tree [ethernet interface | port-channel port-channel-number]

Displays spanning tree configuration.

The following is an example of the CLI commands:

Console(config)# spanning-tree

Console(config)# spanning-tree mode rstp

Console(config)# spanning-tree priority 12288

Console(config)# spanning-tree hello-time 5

Console(config)# spanning-tree max-age 10

Console(config)# spanning-tree forward-time 25

Console(config)# exit

Console# show spanning-tree

Spanning tree enabled mode RSTP

Root ID Priority 32768

Address X.X.X.X.X.X

Cost 57

Port 1/e1

Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

Bridge ID Priority 32769

Address X.X.X.X.X.X

Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

Number of topology changes 2 last change occurred 00:23:56 ago

Times: hold 1, topology change 35, notification 2

hello 2, max age 20, forward delay 15

Interface Port ID Designated Port ID

Name Prio Cost Sts Cost Bridge ID Prio.Nbr

-------- ------ --- --- -------------------- ------

1/e1 128 19 FWD 38 8000 00:30:94:41:62c1 80 001

1/e2 128 19 FWD 57 8000 00:02:4b:29:7a:00 80 002

ch1 128 19 FWD 57 8000 00:02:4b:29:7a:00 80 003

Defining STP Port Settings

The STP Port Settings page allows network managers to assign STP properties to individual ports. To open the STP Port Settings page:

STP Port Settings Page

The STP Port Settings page contains the following fields:

Enabling STP on a port:

  1. Open the STP Port Settings page.

  2. Select Enabled in the STP field.

  3. Define the Priority, Path Cost, Default Path Cost, and the Fast Link fields.

  4. Click Apply Changes. STP is enabled on the port.

Modifying STP Port Properties:

  1. Open the STP Port Settings page.

  2. Modify the Priority, Path Cost, Default Path Cost, and the Fast Link fields.

  3. Click Apply Changes. The STP port parameters are modified, and the device is updated.

STP Port Table Page

Defining STP Port Parameters Using CLI Commands

The following table summarizes the equivalent CLI commands for defining STP port parameters as displayed in the STP Port Settings page.

CLI Command

Description

spanning-tree disable

Disables spanning tree on a specific port.

spanning-tree cost cost

Configures the spanning tree port cost for a port.

spanning-tree port-priority priority

Configures port priority.

show spanning-tree [ethernet interface | port-channel port-channel-number]

Displays spanning tree configuration.

spanning-tree portfast

Enables PortFast mode.

The following is an example of the CLI commands:

Console(config)# interface ethernet 1/e5

Console(config-if)# spanning-tree disable

Console(config-if)# spanning-tree cost 35000

Console(config-if)# spanning-tree port-priority 96

Console(config-if)# exit

Console(config)# exit

Console# show spanning-tree ethernet 1/e5

Console# show spanning-tree ethernet 1/e5

Interface Port ID Designated Port ID

Name Prio Sts Enb Cost Cost Bridge ID Prio.Nbr

----- ---- --- --- ---- ------------------ --------

1/e5 128 DSBL True 100 0 8000 xx.xx.xx.xx.xx.xx 80 001

Spanning tree enabled

Port Fast: no (configured: no)

Type: point-to-point (configured: auto)

Number of transitions to forwarding state: 1

BPDU: sent 2, received 120638

Defining STP LAG Settings

The STP LAG Settings page allows network managers to assign STP parameters for LAGs. To open the STP LAG Settings page:

STP LAG Settings Page

The STP LAG Settings page contains the following fields:

NOTE: Use the Fast Link option only in appropriate cases; for example, when the device is a leaf in the STP network topology for end stations.

Enabling STP on a LAG:

  1. Open the STP LAG Settings page.

  2. Select Enable in the STP field.

  3. Define the Priority, Path Cost, and Fast Link fields.

  4. Click Apply Changes. STP is enabled on the LAG, and the device is updated.

Modifying the LAG STP parameters:

  1. Open the STP LAG Settings page.

  2. Modify the Priority, Path Cost, and Fast Link fields.

  3. Click Apply Changes. The STP LAG parameters are modified, and the device is updated.

STP LAG Table Page

Defining STP LAG Parameters Using CLI Commands

The following table summarizes the equivalent CLI commands for defining STP LAG parameters as displayed in the STP LAG Settings page.

CLI Command

Description

interface port-channel port-channel-number

Enters Port-channel configuration mode.

spanning-tree port-priority priority

Configures LAG priority.

The following is an example of the CLI commands:

console(config)# interface port-channel 1

console(config-if)# spanning-tree port-priority 16

Configuring Rapid Spanning Tree

The Classic Spanning Tree prevents L2 forwarding loops in a general network topology. However, convergence can take up to 30-60 seconds. The convergence time is considered too long for many applications. When network topology allows, faster convergence may be possible. The Rapid Spanning Tree Protocol (RSTP) detects and uses network topologies that provide faster convergence of the spanning tree without creating forwarding loops.

STP has the following different port states:

A listening port is either a designated or a root port, and is in the process of moving to the forwarding state. However, after the port is in the forwarding state, there is no way to determine whether the port is a root or designated port. The RSTP addresses this problem by decoupling the port's role and its state. Use the Spanning Tree Global Settings page to enable RSTP.

To open the Rapid Spanning Tree (RSTP) page:

Rapid Spanning Tree (RSTP) Page

The Rapid Spanning Tree (RSTP) page contains the following fields:

NOTE: Fast Link is enabled in the STP Port Settings page or the STP LAG Settings page. For more information about enabling Fast Link, see "Defining STP Port Settings" or "Defining STP LAG Settings".

Enabling Rapid STP:

  1. Open the Rapid Spanning Tree (RSTP) page.

  2. Define the Point-to-Point Admin, Protocol Operation, and Activate Protocol Migration fields.

  3. Click Apply Changes. The RSTP is enabled, and the device is updated.

Rapid Spanning Tree (RSTP) Table

Defining Rapid STP Parameters Using CLI Commands

The following table summarizes the equivalent CLI commands for defining RSTP parameters as displayed in the Rapid Spanning Tree (RSTP) page.

CLI Command

Description

spanning-tree link-type {point-to-point | shared}

Overrides the default link-type setting, which is determined by the port duplex mode, and enables the Rapid Spanning-Tree Protocol (RSTP) transitions to the forwarding state.

spanning tree mode {stp |rstp}

Configures the RSTP currently running.

clear spanning-tree detected-protocols

Restarts the protocol migration process.

show spanning-tree [ethernet interface | port-channel port-channel-number]

Displays RSTP configuration.

The following is an example of the CLI commands:

Console(config)# interface ethernet 1/e5

Console(config-if)# spanning-tree link-type shared


Configuring VLANs

VLANs are logical subgroups of a Local Area Network (LAN) created by software rather than by defining a hardware solution. VLANs combine user stations and network devices into a single domain regardless of the physical LAN segment to which they are attached. VLANs allow network traffic to flow more efficiently within subgroups. VLANs managed through software reduce the amount of time in which network changes are implemented.

VLANs are software-based and not defined by physical attributes. As a result, VLANs have an unlimited number of ports and can be created per unit, per device, per stack, or any other logical connection combination.

VLANs function at Layer 2. Since VLANs isolate traffic within the VLAN, a Layer 3 functioning router is needed to allow traffic to flow between VLANs. Layer 3 routers identify segments and coordinate with VLANs. VLANs are broadcast and multicast domains. Broadcast and multicast traffic is only transmitted in the VLAN where the traffic is generated.

VLAN tagging provides a method for transferring VLAN information between VLAN groups. VLAN tagging attaches a four byte tag to packet headers. The VLAN tag indicates to which VLAN the packet belongs. VLAN tags are attached to the packet by either the end station or by the network device. VLAN tags also contain VLAN network priority information. Combining VLANs and GVRP allows network managers to automatically disperse VLAN information.To display the VLAN page:

VLAN Page

The VLAN page contains links for defining the following:

Defining VLAN Members

The VLAN Membership page allows network managers to define VLAN groups. To open the VLAN Membership page:

VLAN Membership Page

The VLAN Membership page is divided into the following sections:

VLAN Membership Section

The VLAN Membership Section contains parameters for assigning VLAN membership to ports. PowerConnect 3324/3348 supports up to 256 VLANs.

NOTE: All ports must have a defined PVID. If no other value is configured, use the default VLAN PVID.

VLAN Membership Section

The VLAN Membership Section contains the following fields:

Adding new VLANs:

  1. Open the VLAN Membership page.

  2. Click Add. The Create New VLAN page opens:

Create New VLAN Page

  1. Define the VLAN ID and VLAN Name fields.

  2. Click Apply Changes. The new VLAN is added, and the device is updated.

Modifying VLAN Name Groups:

  1. Open the VLAN Membership page.

  2. Select a VLAN in the Show VLAN field.

  3. Modify the VLAN Name field.

  4. Click Apply Changes. The VLAN membership information is modified, and the device is updated.

Deleting a VLAN:

  1. Open the VLAN Membership page.

  2. Select a VLAN in the Show VLAN field.

  3. Check the Remove check box.

  4. Click Apply Changes. The VLAN is deleted, and the device is updated.

Defining VLAN Membership Groups Using CLI Commands

The following table summarizes the equivalent CLI commands for defining VLAN membership groups as displayed in the VLAN Membership page.

CLI Command

Description

vlan database

Enters the interface configuration (VLAN) mode.

vlan {vlan-range}

Creates a VLAN.

name string

Adds a name to a VLAN.

The following is an example of the CLI commands:

Console # vlan database

Console (config-switch)#

Console (config-switch)# vlan 1972

Console (config-switch)# exit

Console (config)# interface vlan 19

Console (config-if)# name Marketing

VLAN Port Membership Table

The VLAN Port Membership Table contains a port table for assigning ports to VLANs. Ports are assigned VLAN membership by toggling through the port control settings. Ports can have the following values:

VLAN Port Membership Control Settings

Port Control

Definition

T

The interface is a member of a VLAN. All packets forwarded by the interface are tagged. The packets contain VLAN information.

U

The interface is a member of this member. Packets forwarded by the interface are untagged.

F

The interface is denied membership to a VLAN via GVRP.

Blank

The interface is not a member of this VLAN. Packets associated with the VLAN are not forwarded.

NOTE: Ports that are LAG members are not displayed in the VLAN Port Membership Table.

The VLAN Port Membership Table displays the ports and the ports states, as well as LAGs.

VLAN Port Membership Table

Assigning ports to a VLAN group:

  1. Open the VLAN Membership page.

  2. Select a VLAN from the Show VLAN drop-down list.

  3. Select ports in the Port Membership Table, and assign the port a value (v, t, f, or b).

  4. Click Apply Changes. The ports are assigned to the VLAN group, and the device is updated.

Deleting VLANs:

  1. Open the VLAN Membership page.

  2. Select a VLAN from the Show VLAN drop-down list.

  3. Check the Remove check box.

  4. Click Apply Changes. The VLAN group is deleted, and the device is updated.

Assigning Ports to VLAN Groups Using CLI Commands

The following table summarizes the equivalent CLI commands for assigning ports to VLAN groups as displayed in the VLAN Membership page.

CLI Command

Description

vlan database

Enters the interface configuration (VLAN) mode.

vlan {vlan-range}

Creates or deletes a VLAN.

interface vlan vlan-id

Enters the interface configuration (VLAN) mode to configure an existing VLAN.

name string

Adds a name to a VLAN.

interface range ethernet {port-range | all}

Enables command execution on multiple ports at the same time.

switchport forbidden vlan {add vlan-list | remove vlan-list}

Forbids adding specific VLANs to the port

The following is an example of the CLI commands:

Console # vlan database

Console (config-vlan)# vlan 1972

Console (config-vlan)# exit

Console (config)# interface vlan 1972

Console (config-if)# name Marketing

Console (config-if)# exit

Console (config)# interface range ethernet 1/e18 - e20

Defining VLAN Ports Settings

The VLAN Port Settings page provides parameters for managing ports that are part of a VLAN.

The Port Default VLAN ID (PVID) is configured on the VLAN Port Settings page. All untagged packets arriving to the device are tagged by the ports PVID. To open the VLAN Port Settings page:

VLAN Port Settings Page

The VLAN Port Settings page contains the following fields:

NOTE: VLAN 4095 is the discard VLAN.

Assigning port settings:

NOTE: Ingress filtering can only be disabled on ports set to general VLAN mode.
  1. Open the VLAN Port Settings page.

  2. Define the Port Mode, PVID, Frame Type, and the Ingress Filtering fields.

  3. Click Apply Changes. The VLAN port parameters are defined, and the device is updated.

Displaying the VLAN Port Table:

  1. Open the VLAN Port Settings page.

  2. Click Show All. The VLAN Port Table opens.

VLAN Port Table

In addition to the VLAN Port Settings page fields, the VLAN Port Table page also displays the following field:

Assigning Ports to VLAN Groups Using CLI Commands

The following table summarizes the equivalent CLI commands for assigning ports to VLAN groups as displayed in the VLAN Port Settings page.

CLI Command

Description

interface ethernet interface

Enters the interface configuration mode to configure an ethernet type interface.

switchport mode {access | trunk | general}

Configures a port VLAN membership mode.

switchport general pvid vlan-id

Configure the Port VLAN ID (PVID) when the interface is in general mode.

switchport general allowed vlan add vlan-list [tagged | untagged]

Adds VLANs to a general port.

switchport general allowed vlan remove vlan-list

Removes VLANs from a general port.

switchport general ingress-filtering disable

Disables port ingress filtering.

The following is an example of the CLI commands:

Console (config)# interface range ethernet 1/e18 - e20

Console (config-if)# switchport mode access

Console (config-if)# switchport general pvid 234

Console (config-if)# switchport general allowed vlan add 1,2,5,6 tagged

Console (config-if)# switchport general ingress-filtering disable

Defining VLAN LAG Settings

The VLAN LAG Settings page provides parameters for managing LAGs that are part of a VLAN. VLANs are composed of individual ports or LAGs. Untagged packets entering the switch on a LAG are tagged as specified by the LAG's PVID. To open the VLAN LAG Settings page:

VLAN LAG Setting Page

The VLAN LACP Parameters page contains the following fields:

Assigning LAG settings:

  1. Open the VLAN LAG Settings page.

  2. Define the Port Mode, PVID, Frame Type, and the Ingress Filtering fields.

  3. Click Apply Changes. The VLAN LAG parameters are defined, and the device is updated.

Displaying the VLAN LAG Table:

  1. Open the VLAN LAG Settings page.

  2. Click Show All. The VLAN LAG Table opens.

VLAN LAG Table

Assigning LAGs to VLAN Groups Using CLI Commands

The following table summarizes the equivalent CLI commands for assigning LAGs to VLAN groups as displayed in the VLAN LAG Settings page.

CLI Command

Description

switchport mode {access | LAG | general}

Configures a port VLAN membership mode.

switchport LAG native vlan vlan-id

Defines the LAG as a member of the specified VLAN, and the VLAN ID as the "port default VLAN ID (PVID)".

switchport general pvid vlan-id

Configure the Port VLAN ID (PVID) when the interface is in general mode.

switchport general allowed vlan add vlan-list [tagged | untagged]

Adds VLANs to a general port.

switchport general allowed vlan remove vlan-list [tagged | untagged]

Removes VLANs from a general port.

switchport general acceptable-frame-types tagged-only

Discards untagged frames at ingress.

switchport general ingress-filtering off

Disables port ingress filtering.

The following is an example of the CLI commands:

Console (config)# interface port channel 1 1/e8

Console (config-if)# switchport mode access

console (config-if)# switchport LAG native vlan 123

Console (config-if)# switchport general pvid 234

Console (config-if)# switchport general allowed vlan add 1,2,5,6 tagged

Console (config-if)# switchport general acceptable-frame-types tagged-only

Console (config-if)# switchport general ingress-filtering disable

Configuring GVRP

The GARP VLAN Registration Protocol (GVRP) protocol is specifically provided for automatic distribution of VLAN membership information among VLAN-aware bridges. GVRP allows VLAN-aware bridges to automatically learn VLANs to bridge ports mapping, without having to individually configure each bridge, and to register VLAN membership.

To minimize the memory requirements when running the GVRP protocol, two proprietary tuning variables have been added to the standard variables:

The maximum number of GVRP VLANs includes all the VLANs participating in GVRP operation regardless whether they are static or dynamic.

The following should be considered when specifying the maximum number of VLANs participating in GVRP by setting the maximum number of GVRP VLANs after reset value:

To ensure the correct operation of the GVRP protocol, users are advised to set the maximum number of GVRP VLANs equal to a value which significantly exceeds the sum of:

Increasing the value of maximum number of the GVRP VLANs to a value beyond the sums, allows users to run GVRP, and not reset the device to receive a larger amount of GVRP VLANs. For example, if three VLANs exist and another two VLANs are expected to be configured as a result of VLAN static or dynamic registration, set the maximum number of GVRP VLANs after reset to 10. To open the GVRP Parameters page:

GVRP Parameters Page

The GVRP Parameters page contains the following fields:

Enabling GVRP on the device:

  1. Open the GVRP Parameters page.

  2. Select Enable in the GVRP Global Status field.

  3. Click Apply Changes. GVRP is enabled on the device.

Defining GVRP Ports:

  1. Open the GVRP Parameters page.

  2. Click Show All. The GVRP Parameters page opens. The GVRP Port Parameters contains parameters for enabling GVRP on a port and permitting port to participate in VLAN registration through GVRP. In addition, the GVRP Port Parameters Table also contains information about the VLAN registration mode. Specific ports can also be blocked from registering or being used in a VLAN.

  3. Select a port.

  4. Define the GVRP State, Dynamic VLAN Creation, VLAN Registration, and the GVRP Registration fields.

  5. Click Apply Changes. GVRP is enabled on the port, parameters are defined, and the device is updated.

Displaying the GVRP Port Parameters Table:

  1. Open the GVRP Parameters page.

  2. Click Show All. The GVRP Port Parameters Table opens.

GVRP Port Parameters Table

In addition to the field displayed in the GVRP Parameters page , the GVRP Port Parameters Table page also displays the following fields:

Configuring GVRP Using CLI Commands

The following table summarizes the equivalent CLI commands for configuring GVRP as displayed in the GVRP Parameters page.

CLI Command

Description

gvrp enable

Enables GVRP globally.

gvrp enable

Enables GVRP on an interface.

gvrp vlan-creation-forbid

Enables or disables dynamic VLAN creation.

gvrp registration-forbid

Unregisters all VLANs, and prevents dynamic VLAN creation or registration on the port.

show gvrp configuration [ethernet interface | port-channel port-channel-number]

Displays GVRP configuration information, including timer values, whether GVRP and dynamic VLAN creation is enabled, and which ports are running GVRP.

gvrp max-vlan number

Configures the maximum number of VLANs when GVRP is enabled.

The following is an example of the CLI commands:

Console (config)# gvrp enable

Console (config)# interface ethernet 1/e8

Console (config-if)# gvrp enable

Console (config-if)# gvrp-vlan-creation-forbid

Console (config-if)# gvrp registration-forbid

Console# show gvrp configuration

GVRP Feature is currently enabled on the switch.

Maximum VLANs: 256, Maximum VLANs after reset: 256.

Port(s)Status Registration Dynamic VLAN Timers (milliseconds)

Creation Join Leave Leave All

------ ------- ---------- -------- ----- ----- -----

2/1 Enabled Normal Enabled 200 600 10000

4/4 Enabled Normal Enabled 200 600 10000


Aggregating Ports

Port Aggregation optimizes port usage by linking a group of ports together to form a single Link Aggregated Group (LAG). Port Aggregation multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy. Both the PowerConnect 3324 and PowerConnect 3348 support up to six LAGs, and eight ports per LAG per stack or stand-alone unit.

Each LAG is composed of ports of the same speed, set to full-duplex operations. Ports in a LAG, can be of different media types (UTP/Fiber, or different fiber types), provided they operate at the same speed.

Aggregated links can be assigned manually or automatically by enabling the Link Aggregation Control Protocol (LACP) on the relevant links. PowerConnect 3324/3348 provides LAG Load Balancing based on both source MAC addresses and destination MAC addresses.

Aggregated links are treated as a single logical port by the system. Specifically, the Aggregated link has similar port attributes to a non-aggregated port, including auto-negotiation, speed, duplex setting, and so forth.

PowerConnect 3324/3348 supports both static LAGs and Link Aggregation Control Protocol (LACP) LAGs. LACP LAGs negotiate aggregated port links with other LACP ports located on a different device. If the other device ports are also LACP ports, the devices establish a LAG between them.

Use the following guidelines when adding ports to a LAG for either a standalone or a stacking configuration:

NOTE: Ports can be configured as LACP ports only if the ports are not part of a previously configured LAG.

PowerConnect 3324/3348 uses a hash function to determine which frames are carried on which aggregated-link member. The hash function statistically load-balances the aggregated link members. PowerConnect 3324/3348 considers an aggregated link to be a single logical port.

Each aggregated link has an aggregated link port type, including Gigabit Ethernet ports and Fast Ethernet ports. Ports can be added to an aggregated link only if they are the same port type. When ports are removed from an aggregated link, the ports revert to the original port settings. To open the Link Aggregation page:

Link Aggregation Page

This section includes the following topics:

Defining LACP Parameters

The LACP Parameters page contains information for configuring LACP LAGs. Aggregate ports can be linked into link-aggregation port-groups. Each group is comprised of ports with the same speed.

Aggregated links can be manually set up or automatically established by enabling the Link Aggregation Control Protocol (LACP) on the relevant links. To open the LACP Parameters page:

LACP Parameters Page

The LACP Parameters page contains the following sections:

Global Parameters

Global Parameters contains information for assigning LACP priority. Aggregate ports can be linked into link-aggregation port-groups. LAGs may be set up manually, by explicit user assignment, or automatically by enabling the Link Aggregation Control Protocol (LACP) on the relevant LAGs.

Global Parameters

The Global Parameters section contains the following field:

Defining Global Parameters:

  1. Open the LACP Parameters page.

  2. Scroll to the Global Parameters section.

  3. Define the LACP System Priority and the LACP Timeout fields.

  4. Click Apply Changes. The Global Parameters are defined, and the device is updated.

Port Parameters Table

The Port Parameters Table contains information for assigning LACP priority and timeout values to ports:

Port Parameters Table

The Port Parameters table contains the following fields:

Defining Port Parameters:

  1. Open the LACP Parameters page.

  2. Scroll to the Link Aggregation Port Parameters Table.

  3. Define the LACP System Priority and the LACP Timeout fields.

  4. Click Apply Changes. The Link Aggregation Global Parameters are defined, and the device is updated.

Displaying the LACP Parameters Table:

  1. Open the LACP Parameters page.

  2. Click Show All. The LACP Parameters Table opens.

LACP Parameters Table

In addition to the LACP Parameters page fields, the LACP Parameters Table page also displays the following field:

Configuring LACP Parameters Using CLI Commands

The following table summarizes the equivalent CLI commands for configuring LACP parameters as displayed in the Link Aggregation page.

CLI Command

Description

lacp system-priority value

Configures the system priority.

lacp port-priority value

Configures the priority value for physical ports.

lacp timeout {long | short}

Assigns an administrative LACP timeout.

show lacp ethernet interface [parameters | statistics | protocol-state]

Displays LACP information for ethernet ports.

show lacp port-channel

[port_channel_number]

Displays LACP information for a Port-channel.

The following is an example of the CLI commands:

Console (config)# lacp system-priority 120

Console (config)# interface ethernet 1/e8

Console (config-if)# lacp port-priority 247

Console (config-if)# lacp timeout long

Console (config-if)# exit

Console# show lacp ethernet 1/e1 statistics

Port 1/e1 LACP Statistics:

LACP PDUs sent:2

LACP PDUs received:2

Defining LAG Membership

The LAG Membership page allows network managers to assign ports to LAGs. LAGs can include up to 8 ports. Currently PowerConnect 3324/3348 supports 6 LAGs per system, whether the device is a standalone device or in a stack. The LAG Membership Table contains the following rows:

To open the LAG Membership page:

LAG Membership Page

Adding a port to a LAG:

  1. Open the LAG Membership page.

  2. Toggle under the port number to assign the LAG setting and number.

  3. Click Apply Changes. The port is added to the LAG, and the device is updated.

Assigning Ports to LAGs Using CLI Commands

The following table summarizes the equivalent CLI commands for assigning ports to LAGs as displayed in the LAG Membership page.

CLI Command

Description

channel-group port-channel-number mode {on | auto}

Configures a port to a Port channel.

show interface port_channel

Displays the interfaces attached to a LAG.

The following is an example of the CLI commands:

Console# channel-group port-channel-number mode on auto 1

Port-Channel 1:Port Type 1000 Ethernet

Actor

System Priority:1

MAC Address: 000285:0E1C00

Admin Key: 29

Oper Key: 29

Partner

System Priority:0

MAC Address: 000000:000000

Oper Key: 14


Multicast Forwarding Support

Multicast forwarding allows a single packet to be forwarded to multiple destinations. L2 Multicast service is based on a L2 switch receiving a single packet addressed to a specific multicast addresses. Multicast forwarding creates copies of the packet, and transmits the packets to the relevant ports.

PowerConnect 3324/3348 supports both:

To open the Multicast Support page:

Multicast Support Page

The Multicast Support page includes links to the following topics:

Defining IGMP Snooping Settings

Layer 2 switching forwards multicast packets to all relevant VLAN ports by default, treating the packet as a multicast packet. This type of traffic forwarding is functional; however, irrelevant ports also receive multicast traffic, causing increased network traffic.

IGMP snooping eliminates unnecessary multicast traffic by examining IGMP frames while they are forwarded from stations to a multicast routers.

When IGMP snooping is globally enabled, the switching ASIC is programmed to forward all IGMP frames to the CPU. The CPU analyzes the incoming frames and determines which ports want to join which Multicast groups, which ports have Multicast routers generating IGMP queries, and what Routing protocols are forwarding packets and Multicast traffic. A port wishing to join a specific multicast group issues an IGMP report specifying that multicast group.

The Multicast Global Parameters page allows network managers to enable IGMP Snooping and Multicast Filtering in general on the device. To open the Multicast Global Parameters page:

Multicast Global Parameters Page

The Multicast Global Parameters page contains the following fields:

Enabling bridge multicast filtering on the device:

  1. Open the Multicast Global Parameters page.

  2. Select Enable in the bridge multicast filtering field.

  3. Click Apply Changes. Bridge Multicast is enabled on the device.

Enabling IGMP snooping on the device:

  1. Open the Multicast Global Parameters page.

  2. Select Enable in the IGMP Snooping Status field.

  3. Click Apply Changes. IGMP snooping is enabled on the device.

Enabling Multicast Forwarding and IGMP Snooping Using CLI Commands

The following table summarizes the equivalent CLI commands for enabling multicast forwarding and IGM snooping as displayed in the Multicast Support page.

CLI Command

Description

bridge multicast filtering

Enables filtering of multicast addresses.

ip igmp snooping

Enables Internet Group Management Protocol (IGMP) snooping.

The following is an example of the CLI commands:

Console (config)# bridge multicast filtering

Console (config)# ip igmp snooping

Adding Bridge Multicast Group Members

The Bridge Multicast Group page displays the ports and LAGs attached to the multicast service group in the Port and LAG Table. The Port and LAG tables also reflect the manner in which the port or LAGs joined the multicast group. Ports can be added either to existing groups or to new multicast service groups. The Bridge Multicast Group page permits new multicast service groups to be created. The Bridge Multicast Group page also assigns ports to a specific multicast service address group. To open the Bridge Multicast Group page:

Bridge Multicast Group Page

The Bridge Multicast Group page contains the following fields:

The IGMP Port/LAG Members Table figure displays IGMP Port/LAG member status.

IGMP Port/LAG Members Table

The IGMP Port/LAG Members Table Control Settings Table contains the settings for managing IGMP port and LAG members.

Port Control

Definition

D

Indicates that the port/LAG has joined the multicast group dynamically in the Current row.

S

Attaches the port to the multicast group as static member in the Static Row. Indicates that the port/LAG has joined the Multicast group statically in the Current row.

F

Indicates that the port is forbidden to join this multicast group.

Blank

Indicates that the port is not attached to the multicast group.

IGMP Port/LAG Members Table Control Settings

Defining ports to receive multicast service:

  1. Open the Bridge Multicast page.

  2. Define the VLAN ID and the Bridge Multicast Address fields.

  3. Toggle a port to S to join the port to a selected multicast group, or Toggle a port to F to forbid the port from joining that multicast group.

  4. Click Apply Changes. The port is assigned to the multicast group, and the device is updated.

Assigning LAGs to receive multicast service:

  1. Open the Bridge Multicast page.

  2. Define the VLAN ID and the Bridge Multicast Address fields.

  3. Toggle the LAG to S to join the LAG to the selected multicast group, or toggle a port to F to forbid the port from joining a multicast group.

  4. Click Apply Changes. The LAG is assigned to the multicast group, and the device is updated.

Managing Multicast Service Members Using CLI Commands

The following table summarizes the equivalent CLI commands for managing multicast service members as displayed in the Bridge Multicast Group page.

CLI Command

Description

bridge multicast address {mac-multicast-address | ip-multicast-address} {add | remove} {ethernet interface-list | port-channel port-channel-number-list}

Registers MAC-layer multicast addresses to the bridge table, and adds static ports to the group.

show bridge multicast address-table [vlan vlan-id] [address mac-multicast-address | ip-multicast-address] [format ip | mac]

Displays multicast MAC address table information.

 

The following is an example of the CLI commands:

Console (config)# interface vlan 8

bridge multicast address 0100.5e02.0203

bridge multicast address 0100.5e02.0203 add ethernet 1/e1, 2/e2

Console (config-if)# Exit

Console # show bridge multicast address-table

Vlan MAC Address type Ports

---- -------------- ----- -------------------

1 0100.5e02.0203 static 1/e1, 2/e2

19 0100.5e02.0208 static 1/e1-8

19 0100.5e02.0208 dynamic 1/e9-11

Forbidden ports for multicast addresses:

Vlan MAC Address Ports

---- -------------- -------------------

1 0100.5e02.0203 2/e8

19 0100.5e02.0208 2/e8

Assigning Multicast Forward All Parameters

The Bridge Multicast Forward All page allows network managers to enable attaching ports or LAGs to a switch attached to a neighboring multicast router/switch. Once IGMP snooping is enabled, multicast packets are forwarded to the appropriate port or VLAN.

Bridge Multicast Forward All Page

The Bridge Multicast Forward All page contains the following fields:

The Bridge Multicast Forward All page contains the settings for managing switch and port settings.

Port Control

Definition

D

Attaches the port to the multicast router or switch as a dynamic port.

S

Attaches the port to the multicast router or switch as a static port.

F

Indicates that the port if forbidden from joining a multicast group.

Blank

Indicates that the port is not attached to a multicast router or switch.

Bridge Multicast Forward All Router/Port Control Settings

Attaching a port to multicast router or switch:

  1. Open Bridge Multicast Forward All page.

  2. Define the VLAN ID field.

  3. Select a port in the Multicast Router Port Table, and assign the port a value.

  4. Click Apply Changes. The port attached to the multicast router or group is updated.

Attaching a LAG to multicast router or switch:

  1. Open Bridge Multicast Forward All page.

  2. Define the VLAN ID field.

  3. Select a LAG in the Multicast Router Port Table and assign a value to the LAG.

  4. Click Apply Changes. The LAG attached to the multicast router or group is updated.

Managing LAGs and Ports Attached to Multicast Routers Using CLI Commands

The following table summarizes the equivalent CLI commands for managing LAGs and ports attached to multicast routers as displayed in the Bridge Multicast Forward All page.

CLI Command

Description

show bridge multicast filtering vlan-id

Displays the multicast configuration.

bridge multicast forbidden forward-all

Disables forwarding multicast packets on a port.

bridge multicast forward-all {add | remove} {ethernet interface-list | port-channel port-channel-number-list}

Enables forwarding of all multicast packets on a port.

The following is an example of the CLI commands:

Console # show bridge multicast filtering

Filtering: Enabled

VLAN: 1

Port Forward-All

Static Status

------ --------- ------

1/e1 Forbidden Filter

1/e2 Forward Forward(s)

1/e3 - Forward(s)

Enabling IGMP Snooping

The IGMP Snooping page allows network managers to add IGMP members. To open the IGMP Snooping page:

IGMP Snooping Page

The IGMP Snooping page contains the following information:

Displaying the IGMP Snooping Table:

  1. Open the IGMP Snooping page.

  2. Click Show All. The IGMP Snooping Table opens.

IGMP Snooping Table

Configuring IGMP Snooping with CLI Commands

The following table summarizes the equivalent CLI commands for configuring IGMP Snooping as displayed in the IGMP Snooping page.

CLI Command

Description

ip igmp snooping

Enables Internet Group Management Protocol (IGMP) snooping a specific VLAN.

ip igmp snooping mrouter learn-pim-dvmrp

Enables automatic learning of Multicast router ports in the context of a specific VLAN.

ip igmp snooping host-time-out time-out

Configures the host-time-out.

ip igmp snooping mrouter-time-out time-out

Configures the mrouter-time-out.

ip igmp snooping leave-time-out {time-out | immediate-leave}

Configures the leave-time-out.

show ip igmp snooping mrouter [interface vlan-id]

Displays information on dynamically learned multicast router interfaces.

The following is an example of the CLI commands:

Console (config)# interface vlan 2

Console (config-if)# ip igmp snooping

Console (config-if)# ip igmp snooping mrouter learn-pim-dvmrp

Console (config-if)# ip igmp snooping host-time-out 300

Console (config-if)# ip igmp snooping mrouter-time-out 300

Console (config-if)# exit

Console (config)# interface vlan 2

Console (config-if)# ip igmp snooping leave-time-out 60

Console (config-if)# exit

Console (config)# exit

Console # show igmp snooping mrouter interface 1000

VLAN Ports

------- -----------------------------------------

200 1/e1, 2/e1


Back to Contents Page