Dell PowerConnect M8024-K, PowerConnect M6220, PowerConnect M6348, PowerConnect M8024 User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerConnect M8024-K User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell PowerConnect
M6220, M6348, M8024, and
M8024-k Switch
User’s Configuration
Guide
Regulatory Models: PCM6220, PCM6348,
PCM8024, and PCM8024-k
Notes and Cautions
NOTE: A NOTE indicates important information that helps you make better use of
your computer.
CAUTION: A CAUTION indicates potential damage to hardware or loss of data if
instructions are not followed.
____________
Information in this publication is subject to change without notice.
© 2013 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc.
is strictly forbidden.
Trademarks used in this text: Dellâ„¢, the DELL logo, PowerEdgeâ„¢, EqualLogicâ„¢, PowerConnectâ„¢,
and OpenManageâ„¢ are trademarks of Dell Inc. Microsoft
®
, Windows
®
, Windows Server
®
, MS-
DOS
®
, and Windows Vista
®
are either trademarks or registered trademarks of Microsoft Corporation
in the United States and/or other countries. sFlow
®
is a registered trademark of InMon Corporation.
Cisco
®
is a registered trademark of Cisco Systems. Mozilla
®
and Firefox
®
are registered trademarks
of the Mozilla Foundation.
Other trademarks and trade names may be used in this publication to refer to either the entities claiming
the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and
trade names other than its own.
Regulatory Models: PCM6220, PCM6348, PCM8024, and PCM8024-k
January 2013 Rev. A05
Contents 3
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 49
About This Document . . . . . . . . . . . . . . . . . . 49
Audience . . . . . . . . . . . . . . . . . . . . . . . . . 50
Document Conventions . . . . . . . . . . . . . . . . . 50
Additional Documentation
. . . . . . . . . . . . . . . . 51
2 Switch Features . . . . . . . . . . . . . . . . . . . 53
System Management Features . . . . . . . . . . . . . 54
Multiple Management Options
. . . . . . . . . . . 54
Simple Mode . . . . . . . . . . . . . . . . . . . . 54
Port Aggregator
. . . . . . . . . . . . . . . . . . . 55
System Time Management . . . . . . . . . . . . . 55
Log Messages . . . . . . . . . . . . . . . . . . . 55
Integrated DHCP Server
. . . . . . . . . . . . . . 56
Management of Basic Network Information
. . . . 56
IPv6 Management Features
. . . . . . . . . . . . 56
Dual Software Images . . . . . . . . . . . . . . . 56
File Management
. . . . . . . . . . . . . . . . . . 57
Switch Database Management Templates
. . . . . 57
Automatic Installation of Firmware and
Configuration
. . . . . . . . . . . . . . . . . . . . 57
sFlow
. . . . . . . . . . . . . . . . . . . . . . . . 58
SNMP Alarms and Trap Logs . . . . . . . . . . . . 58
CDP Interoperability through ISDP . . . . . . . . . 58
Remote Monitoring (RMON)
. . . . . . . . . . . . 58
4 Contents
Stacking Features (PCM6220, PCM6348, and
PCM8024-k Only)
. . . . . . . . . . . . . . . . . . . . . 59
High Port Count
. . . . . . . . . . . . . . . . . . . 59
Single IP Management . . . . . . . . . . . . . . . 59
Automatic Firmware Update for New Stack
Members
. . . . . . . . . . . . . . . . . . . . . . 59
Stacking Compatibility with the PowerConnect
7000 Series
. . . . . . . . . . . . . . . . . . . . . 59
Master Failover with Transparent Transition . . . . 60
Nonstop Forwarding on the Stack . . . . . . . . . 60
Hot Add/Delete and Firmware
Synchronization
. . . . . . . . . . . . . . . . . . . 60
Security Features . . . . . . . . . . . . . . . . . . . . 60
Configurable Access and Authentication
Profiles
. . . . . . . . . . . . . . . . . . . . . . . 60
Password-Protected Management Access
. . . . 61
Strong Password Enforcement . . . . . . . . . . . 61
TACACS+ Client . . . . . . . . . . . . . . . . . . . 61
RADIUS Support
. . . . . . . . . . . . . . . . . . 61
SSH/SSL. . . . . . . . . . . . . . . . . . . . . . . 62
Inbound Telnet Control . . . . . . . . . . . . . . . 62
Denial of Service
. . . . . . . . . . . . . . . . . . 62
Port Protection . . . . . . . . . . . . . . . . . . . 62
Captive Portal . . . . . . . . . . . . . . . . . . . . 63
Dot1x Authentication (IEEE 802.1X)
. . . . . . . . . 63
MAC-Based 802.1X Authentication . . . . . . . . . 63
Dot1x Monitor Mode
. . . . . . . . . . . . . . . . 64
MAC-Based Port Security
. . . . . . . . . . . . . 64
Access Control Lists (ACL) . . . . . . . . . . . . . 64
Time-Based ACLs . . . . . . . . . . . . . . . . . . 65
IP Source Guard (IPSG)
. . . . . . . . . . . . . . . 65
DHCP Snooping . . . . . . . . . . . . . . . . . . . 65
Dynamic ARP Inspection . . . . . . . . . . . . . . 65
Protected Ports (Private VLAN Edge)
. . . . . . . . 66
Contents 5
Switching Features . . . . . . . . . . . . . . . . . . . 66
Flow Control Support (IEEE 802.3x)
. . . . . . . . . 66
Head of Line Blocking Prevention . . . . . . . . . 66
Alternate Store and Forward (ASF). . . . . . . . . 66
Jumbo Frames Support
. . . . . . . . . . . . . . . 67
Auto-MDI/MDIX Support . . . . . . . . . . . . . . 67
VLAN-Aware MAC-based Switching. . . . . . . . 67
Back Pressure Support
. . . . . . . . . . . . . . . 67
Auto Negotiation . . . . . . . . . . . . . . . . . . 68
Broadcast Storm Control . . . . . . . . . . . . . . 68
Port Mirroring
. . . . . . . . . . . . . . . . . . . . 68
Static and Dynamic MAC Address Tables . . . . . 69
Link Layer Discovery Protocol (LLDP) . . . . . . . 69
Link Layer Discovery Protocol (LLDP) for Media
Endpoint Devices
. . . . . . . . . . . . . . . . . . 69
Connectivity Fault Management
(IEEE 802.1ag)
. . . . . . . . . . . . . . . . . . . . 69
Priority-based Flow Control (PFC) . . . . . . . . . 70
Data Center Bridging Exchange (DBCx)
Protocol
. . . . . . . . . . . . . . . . . . . . . . . 70
Fibre Channel over Ethernet (FCoE) Initialization
Protocol Snooping
. . . . . . . . . . . . . . . . . 70
Cisco Protocol Filtering
. . . . . . . . . . . . . . . 71
DHCP Layer 2 Relay. . . . . . . . . . . . . . . . . 71
Virtual Local Area Network Supported Features . . . . 71
VLAN Support
. . . . . . . . . . . . . . . . . . . . 71
Port-Based VLANs . . . . . . . . . . . . . . . . . 72
IP Subnet-based VLAN . . . . . . . . . . . . . . . 72
MAC-based VLAN
. . . . . . . . . . . . . . . . . 72
IEEE 802.1v Protocol-Based VLANs . . . . . . . . 72
GARP and GVRP Support . . . . . . . . . . . . . . 72
Voice VLAN
. . . . . . . . . . . . . . . . . . . . . 72
Guest VLAN . . . . . . . . . . . . . . . . . . . . . 73
6 Contents
Double VLANs. . . . . . . . . . . . . . . . . . . . 73
Spanning Tree Protocol Features
. . . . . . . . . . . . 74
Spanning Tree Protocol (STP)
. . . . . . . . . . . 74
Spanning Tree Port Settings
. . . . . . . . . . . . 74
Rapid Spanning Tree . . . . . . . . . . . . . . . . 74
Multiple Spanning Tree . . . . . . . . . . . . . . . 74
Bridge Protocol Data Unit (BPDU) Guard
. . . . . . 75
BPDU Filtering
. . . . . . . . . . . . . . . . . . . 75
Link Aggregation Features. . . . . . . . . . . . . . . . 75
Link Aggregation
. . . . . . . . . . . . . . . . . . 75
Link Aggregate Control Protocol (LACP) . . . . . . 75
Routing Features . . . . . . . . . . . . . . . . . . . . . 77
Address Resolution Protocol (ARP) Table
Management
. . . . . . . . . . . . . . . . . . . . 77
VLAN Routing
. . . . . . . . . . . . . . . . . . . . 77
IP Configuration . . . . . . . . . . . . . . . . . . . 77
Open Shortest Path First (OSPF) . . . . . . . . . . 77
BOOTP/DHCP Relay Agent
. . . . . . . . . . . . . 78
IP Helper and UDP Relay
. . . . . . . . . . . . . . 78
Routing Information Protocol
. . . . . . . . . . . . 78
Router Discovery . . . . . . . . . . . . . . . . . . 78
Routing Table . . . . . . . . . . . . . . . . . . . . 78
Virtual Router Redundancy Protocol (VRRP)
. . . . 79
Tunnel and Loopback Interfaces . . . . . . . . . . 79
IPv6 Routing Features . . . . . . . . . . . . . . . . . . 79
IPv6 Configuration
. . . . . . . . . . . . . . . . . 79
IPv6 Routes . . . . . . . . . . . . . . . . . . . . . 80
OSPFv3 . . . . . . . . . . . . . . . . . . . . . . . 80
DHCPv6
. . . . . . . . . . . . . . . . . . . . . . . 80
Contents 7
Quality of Service (QoS) Features . . . . . . . . . . . . 81
Differentiated Services (DiffServ)
. . . . . . . . . 81
Class Of Service (CoS) . . . . . . . . . . . . . . . 81
Auto Voice over IP (VoIP). . . . . . . . . . . . . . 81
Internet Small Computer System Interface
(iSCSI) Optimization
. . . . . . . . . . . . . . . . . 82
Layer 2 Multicast Features . . . . . . . . . . . . . . . 82
MAC Multicast Support
. . . . . . . . . . . . . . . 82
IGMP Snooping . . . . . . . . . . . . . . . . . . . 82
IGMP Snooping Querier . . . . . . . . . . . . . . 83
MLD Snooping
. . . . . . . . . . . . . . . . . . . 83
Multicast VLAN Registration . . . . . . . . . . . . 83
Layer 3 Multicast Features . . . . . . . . . . . . . . . 84
Distance Vector Multicast Routing Protocol
. . . . 84
Internet Group Management Protocol . . . . . . . 84
IGMP Proxy . . . . . . . . . . . . . . . . . . . . . 84
Protocol Independent Multicast—Dense
Mode
. . . . . . . . . . . . . . . . . . . . . . . . 84
Protocol Independent Multicast—Sparse
Mode
. . . . . . . . . . . . . . . . . . . . . . . . 85
Protocol Independent Multicast—Source
Specific Multicast
. . . . . . . . . . . . . . . . . 85
Protocol Independent Multicast IPv6 Support
. . . 85
MLD/MLDv2 (RFC2710/RFC3810) . . . . . . . . . . 85
3 Hardware Overview. . . . . . . . . . . . . . . . . 87
PowerConnect M6220, M6348, M8024, and M8024-k
Front Panel
. . . . . . . . . . . . . . . . . . . . . . . . 87
PowerConnect M6220 Front Panel
. . . . . . . . . 87
PowerConnect M6348 Front Panel . . . . . . . . . 89
PowerConnect M8024 Front Panel . . . . . . . . . 90
PowerConnect M8024-k Front Panel . . . . . . . . 91
8 Contents
Console (RS-232) Port . . . . . . . . . . . . . . . . . . 91
Console Redirect
. . . . . . . . . . . . . . . . . . 92
Out-of-Band Management Port
. . . . . . . . . . . . . 92
LED Definitions . . . . . . . . . . . . . . . . . . . . . . 93
Port LEDs
. . . . . . . . . . . . . . . . . . . . . . 93
System LEDs . . . . . . . . . . . . . . . . . . . . 96
Switch Addresses . . . . . . . . . . . . . . . . . . . . 97
4 Using Dell OpenManage Switch
Administrator . . . . . . . . . . . . . . . . . . . . 101
About Dell OpenManage Switch Administrator. . . . 101
Starting the Application . . . . . . . . . . . . . . . . 102
Understanding the Interface
. . . . . . . . . . . . . . 103
Defining Fields . . . . . . . . . . . . . . . . . . . . . 105
Understanding the Device View . . . . . . . . . . . . 106
Using the Device View Port Features
. . . . . . . 106
5 Using the Command-Line Interface . . . . 107
Accessing the Switch Through the CLI . . . . . . . . 107
Console Connection
. . . . . . . . . . . . . . . . 107
Telnet Connection
. . . . . . . . . . . . . . . . . 108
Understanding Command Modes
. . . . . . . . . . . 109
Entering CLI Commands . . . . . . . . . . . . . . . . 111
Using the Question Mark to Get Help
. . . . . . . 111
Using Command Completion . . . . . . . . . . . 112
Contents 9
Entering Abbreviated Commands . . . . . . . . . 112
Negating Commands . . . . . . . . . . . . . . . . 112
Understanding Error Messages . . . . . . . . . . 113
Recalling Commands from the History Buffer
. . . 113
Specifying Physical Ports . . . . . . . . . . . . . 114
6 Default Settings. . . . . . . . . . . . . . . . . . . 117
7 Setting the IP Address and Other
Basic Network Information . . . . . . . . . . 123
IP Address and Network Information Overview . . . . 123
What Is the Basic Network Information?
. . . . . 123
Why Is Basic Network Information Needed? . . . 124
How Is Basic Network Information
Configured?
. . . . . . . . . . . . . . . . . . . . . 125
What Is Out-of-Band Management and In-Band
Management?
. . . . . . . . . . . . . . . . . . . 125
Default Network Information
. . . . . . . . . . . . . . 127
Configuring Basic Network Information (Web) . . . . . 128
Out-of-Band Interface
. . . . . . . . . . . . . . . 128
IP Interface Configuration (Default VLAN
IP Address)
. . . . . . . . . . . . . . . . . . . . . 129
Route Entry Configuration (Switch Default
Gateway)
. . . . . . . . . . . . . . . . . . . . . . 130
Domain Name Server
. . . . . . . . . . . . . . . . 132
Default Domain Name
. . . . . . . . . . . . . . . 133
Host Name Mapping . . . . . . . . . . . . . . . . 134
Dynamic Host Name Mapping . . . . . . . . . . . 135
Configuring Basic Network Information (CLI)
. . . . . . 136
Enabling the DHCP Client on the OOB Port
. . . . . 136
10 Contents
Enabling the DHCP Client on the Default
VLAN
. . . . . . . . . . . . . . . . . . . . . . . 136
Managing DHCP Leases . . . . . . . . . . . . . 137
Configuring Static Network Information on the
OOB Port
. . . . . . . . . . . . . . . . . . . . . 138
Configuring Static Network Information on the
Default VLAN
. . . . . . . . . . . . . . . . . . . 138
Configuring and Viewing Additional Network
Information
. . . . . . . . . . . . . . . . . . . . 139
Basic Network Information Configuration
Example
. . . . . . . . . . . . . . . . . . . . . . . . 140
8 Managing a Switch Stack . . . . . . . . . . . 143
Stacking Overview . . . . . . . . . . . . . . . . . . . 143
Creating a PowerConnect M6220 Stack
. . . . . 145
Creating a PowerConnect M6348 Stack
. . . . . 146
Creating a PowerConnect M8024-k Stack . . . . 147
PowerConnect 7000 Series and M6348
Stacking Compatibility
. . . . . . . . . . . . . . 149
How is the Stack Master Selected? . . . . . . . 150
Adding a Switch to the Stack. . . . . . . . . . . 151
Removing a Switch from the Stack
. . . . . . . . 152
How is the Firmware Updated on the Stack? . . . 152
What is Stacking Standby?
. . . . . . . . . . . . 153
What is Nonstop Forwarding?
. . . . . . . . . . 153
Switch Stack MAC Addressing and Stack
Design Considerations
. . . . . . . . . . . . . . 156
NSF Network Design Considerations
. . . . . . . 156
Why is Stacking Needed? . . . . . . . . . . . . 157
Default Stacking Values . . . . . . . . . . . . . . . . 157
Managing and Monitoring the Stack (Web)
. . . . . . 158
Unit Configuration
. . . . . . . . . . . . . . . . . 158
Contents 11
Stack Summary . . . . . . . . . . . . . . . . . . . 160
Stack Firmware Synchronization. . . . . . . . . . 161
Supported Switches . . . . . . . . . . . . . . . . 162
Stack Port Summary
. . . . . . . . . . . . . . . . 163
Stack Port Counters . . . . . . . . . . . . . . . . 164
Stack Port Diagnostics . . . . . . . . . . . . . . . 164
NSF Summary
. . . . . . . . . . . . . . . . . . . . 165
Checkpoint Statistics . . . . . . . . . . . . . . . . 166
Managing the Stack (CLI) . . . . . . . . . . . . . . . . 167
Configuring Stack Member, Stack Port, and
NSF Settings
. . . . . . . . . . . . . . . . . . . . 167
Viewing and Clearing Stacking and NSF
Information
. . . . . . . . . . . . . . . . . . . . . 169
Stacking and NSF Usage Scenarios
. . . . . . . . . . . 169
Basic Failover
. . . . . . . . . . . . . . . . . . . . 170
Preconfiguring a Stack Member
. . . . . . . . . . 172
NSF in the Data Center . . . . . . . . . . . . . . . 174
NSF and VoIP . . . . . . . . . . . . . . . . . . . . 175
NSF and DHCP Snooping
. . . . . . . . . . . . . . 176
NSF and the Storage Access Network. . . . . . . 177
NSF and Routed Access . . . . . . . . . . . . . . 179
9 Configuring Authentication,
Authorization, and Accounting . . . . . . . 181
AAA Overview . . . . . . . . . . . . . . . . . . . . . . 181
Methods
. . . . . . . . . . . . . . . . . . . . . . 182
Access Lines
. . . . . . . . . . . . . . . . . . . . 183
Authentication
. . . . . . . . . . . . . . . . . . . . . . 183
Authorization. . . . . . . . . . . . . . . . . . . . . . . 184
Exec Authorization Capabilities
. . . . . . . . . . 185
12 Contents
Accounting . . . . . . . . . . . . . . . . . . . . . . . 186
Authentication Examples
. . . . . . . . . . . . . . . 187
Local Authentication Example
. . . . . . . . . . 187
TACACS+ Authentication Example
. . . . . . . . 188
RADIUS Authentication Example . . . . . . . . . 190
Authorization Examples . . . . . . . . . . . . . . . . 191
Local Authorization Example—Direct Login to
Privileged EXEC Mode
. . . . . . . . . . . . . . 191
TACACS+ Authorization Example—Direct Login
to Privileged EXEC Mode
. . . . . . . . . . . . . 191
TACACS+ Authorization Example—
Administrative Profiles
. . . . . . . . . . . . . . 192
TACACS+ Authorization Example—Custom
Administrative Profile
. . . . . . . . . . . . . . . 193
TACACS+ Authorization Example—
Per-command Authorization
. . . . . . . . . . . 194
RADIUS Authorization Example—Direct Login
to Privileged EXEC Mode
. . . . . . . . . . . . . 195
RADIUS Authorization Example—Administrative
Profiles
. . . . . . . . . . . . . . . . . . . . . . 195
Using RADIUS Servers to Control Management
Access
. . . . . . . . . . . . . . . . . . . . . . . . . 196
How Does RADIUS Control Management
Access?
. . . . . . . . . . . . . . . . . . . . . . 196
Which RADIUS Attributes Does the Switch
Support?
. . . . . . . . . . . . . . . . . . . . . . 198
How Are RADIUS Attributes Processed on the
Switch?
. . . . . . . . . . . . . . . . . . . . . . 200
Using TACACS+ Servers to Control Management
Access
. . . . . . . . . . . . . . . . . . . . . . . . . 201
Which TACACS+ Attributes Does the Switch
Support?
. . . . . . . . . . . . . . . . . . . . . . 202
Contents 13
Default Configurations. . . . . . . . . . . . . . . . . . 203
Method Lists
. . . . . . . . . . . . . . . . . . . . 203
Access Lines (AAA) . . . . . . . . . . . . . . . . 203
Access Lines (Non-AAA) . . . . . . . . . . . . . . 204
Administrative Profiles
. . . . . . . . . . . . . . . 204
10 Monitoring and Logging System
Information . . . . . . . . . . . . . . . . . . . . . . 207
System Monitoring Overview . . . . . . . . . . . . . . 207
What System Information Is Monitored?
. . . . . . 207
Why Is System Information Needed? . . . . . . . 208
Where Are Log Messages Sent? . . . . . . . . . . 208
What Are the Severity Levels?
. . . . . . . . . . . 209
What Are the System Startup and Operation
Logs?
. . . . . . . . . . . . . . . . . . . . . . . . 209
What Is the Log Message Format? . . . . . . . . . 210
What Factors Should Be Considered When
Configuring Logging?
. . . . . . . . . . . . . . . . 211
Default Log Settings
. . . . . . . . . . . . . . . . . . . 211
Monitoring System Information and Configuring
Logging (Web)
. . . . . . . . . . . . . . . . . . . . . . 213
Device Information
. . . . . . . . . . . . . . . . . 213
System Health
. . . . . . . . . . . . . . . . . . . 215
System Resources
. . . . . . . . . . . . . . . . . 216
Integrated Cable Test for Copper Cables
. . . . . . 217
Optical Transceiver Diagnostics . . . . . . . . . . 218
Log Global Settings . . . . . . . . . . . . . . . . . 220
RAM Log . . . . . . . . . . . . . . . . . . . . . . 221
Log File
. . . . . . . . . . . . . . . . . . . . . . . 222
Remote Log Server
. . . . . . . . . . . . . . . . . 222
Email Alert Global Configuration
. . . . . . . . . . 225
Email Alert Mail Server Configuration . . . . . . . 226
14 Contents
Email Alert Subject Configuration . . . . . . . . 228
Email Alert To Address Configuration
. . . . . . . 229
Email Alert Statistics
. . . . . . . . . . . . . . . 230
Monitoring System Information and Configuring
Logging (CLI)
. . . . . . . . . . . . . . . . . . . . . . 231
Viewing System Information
. . . . . . . . . . . 231
Running Cable Diagnostics . . . . . . . . . . . . 231
Configuring Local Logging . . . . . . . . . . . . 232
Configuring Remote Logging
. . . . . . . . . . . 234
Configuring Mail Server Settings
. . . . . . . . . 235
Configuring Email Alerts for Log Messages . . . 236
Logging Configuration Examples . . . . . . . . . . . 238
Configuring Local and Remote Logging
. . . . . 238
Configuring Email Alerting . . . . . . . . . . . . 239
11 Managing General System Settings . . . 243
System Settings Overview . . . . . . . . . . . . . . . 243
Why Does System Information Need to Be
Configured?
. . . . . . . . . . . . . . . . . . . . 244
What is Simple Mode? . . . . . . . . . . . . . . 245
What is the Port Aggregator Feature?
. . . . . . 247
What Is the LAG Dependency Feature in Port
Aggregator Mode?
. . . . . . . . . . . . . . . . 248
What Are SDM Templates?
. . . . . . . . . . . . 248
Why is the System Time Needed? . . . . . . . . 249
How Does SNTP Work?. . . . . . . . . . . . . . 249
What Configuration Is Required for Plug-
In Modules?
. . . . . . . . . . . . . . . . . . . . 250
Default General System Information . . . . . . . . . 251
Default Port Aggregator Configurations
. . . . . 251
Contents 15
Configuring General System Settings (Web) . . . . . . 254
System Information
. . . . . . . . . . . . . . . . . 254
CLI Banner . . . . . . . . . . . . . . . . . . . . . 257
SDM Template Preference . . . . . . . . . . . . . 258
Operational Mode Configuration
. . . . . . . . . . 259
Port Aggregator Global Configuration . . . . . . . 261
Port Aggregator Port Configuration . . . . . . . . 262
Port Aggregator Group Configuration . . . . . . . 264
Port Aggregator Internal Port VLAN
Configuration
. . . . . . . . . . . . . . . . . . . . 266
Port Aggregator Port Channel Summary
. . . . . . 268
Group VLAN MAC Summary . . . . . . . . . . . . 269
Clock . . . . . . . . . . . . . . . . . . . . . . . . 270
SNTP Global Settings
. . . . . . . . . . . . . . . . 271
SNTP Authentication . . . . . . . . . . . . . . . . 272
SNTP Server . . . . . . . . . . . . . . . . . . . . 274
Summer Time Configuration . . . . . . . . . . . . 278
Time Zone Configuration . . . . . . . . . . . . . . 279
Slot Summary . . . . . . . . . . . . . . . . . . . . 280
Supported Cards . . . . . . . . . . . . . . . . . . 281
Configuring System Settings (CLI)
. . . . . . . . . . . . 282
Configuring System Information
. . . . . . . . . . 282
Configuring the Banner
. . . . . . . . . . . . . . . 283
Managing the SDM Template
. . . . . . . . . . . 284
Configuring the Operational Mode and Port
Aggregator Features
. . . . . . . . . . . . . . . . 284
Configuring SNTP Authentication and an
SNTP Server
. . . . . . . . . . . . . . . . . . . . 286
Setting the System Time and Date Manually. . . . 288
Viewing Slot Information . . . . . . . . . . . . . . 289
General System Settings Configuration Examples . . . 290
Configuring System and Banner Information
. . . 290
Configuring SNTP. . . . . . . . . . . . . . . . . . 293
Configuring the Time Manually . . . . . . . . . . . 295
16 Contents
12 Configuring SNMP . . . . . . . . . . . . . . . . . 297
SNMP Overview . . . . . . . . . . . . . . . . . . . . 297
What Is SNMP?
. . . . . . . . . . . . . . . . . . 297
What Are SNMP Traps?
. . . . . . . . . . . . . 298
Why Is SNMP Needed?. . . . . . . . . . . . . . 299
Default SNMP Values . . . . . . . . . . . . . . . . . 299
Configuring SNMP (Web)
. . . . . . . . . . . . . . . 301
SNMP Global Parameters
. . . . . . . . . . . . 301
SNMP View Settings
. . . . . . . . . . . . . . . 302
Access Control Group
. . . . . . . . . . . . . . 304
SNMPv3 User Security Model (USM) . . . . . . 306
Communities . . . . . . . . . . . . . . . . . . . 309
Notification Filter
. . . . . . . . . . . . . . . . . 311
Notification Recipients . . . . . . . . . . . . . . 312
Trap Flags . . . . . . . . . . . . . . . . . . . . . 315
OSPFv2 Trap Flags
. . . . . . . . . . . . . . . . 316
OSPFv3 Trap Flags . . . . . . . . . . . . . . . . 317
Trap Log . . . . . . . . . . . . . . . . . . . . . . 318
Configuring SNMP (CLI) . . . . . . . . . . . . . . . . 319
Configuring the SNMPv3 Engine ID
. . . . . . . . 319
Configuring SNMP Views, Groups, and
Users
. . . . . . . . . . . . . . . . . . . . . . . 320
Configuring Communities . . . . . . . . . . . . . 323
Configuring SNMP Notifications (Traps
and Informs)
. . . . . . . . . . . . . . . . . . . . 325
SNMP Configuration Examples
. . . . . . . . . . . . 328
Configuring SNMPv1 and SNMPv2
. . . . . . . . 328
Configuring SNMPv3
. . . . . . . . . . . . . . . 329
Contents 17
13 Managing Images and Files . . . . . . . . . 333
Image and File Management Overview . . . . . . . . . 333
What Files Can Be Managed?
. . . . . . . . . . . 333
Why Is File Management Needed?
. . . . . . . . . 335
What Methods Are Supported for File
Management?
. . . . . . . . . . . . . . . . . . . 337
What Factors Should Be Considered When
Managing Files?
. . . . . . . . . . . . . . . . . . 337
How Is the Running Configuration Saved? . . . . . 339
Managing Images and Files (Web) . . . . . . . . . . . 340
File System
. . . . . . . . . . . . . . . . . . . . . 340
Active Images . . . . . . . . . . . . . . . . . . . 341
File Download. . . . . . . . . . . . . . . . . . . . 342
File Upload . . . . . . . . . . . . . . . . . . . . . 344
Copy Files
. . . . . . . . . . . . . . . . . . . . . . 346
Managing Images and Files (CLI) . . . . . . . . . . . . 347
Downloading and Activating a New Image
(TFTP)
. . . . . . . . . . . . . . . . . . . . . . . . 347
Managing Files in Internal Flash
. . . . . . . . . . 348
Uploading a Configuration File (SCP)
. . . . . . . . 349
Managing Configuration Scripts (SFTP)
. . . . . . 350
File and Image Management Configuration
Examples
. . . . . . . . . . . . . . . . . . . . . . . . . 351
Upgrading the Firmware
. . . . . . . . . . . . . . 351
Managing Configuration Scripts . . . . . . . . . . 354
18 Contents
14 Automatically Updating the Image
and Configuration . . . . . . . . . . . . . . . . . 357
Auto Configuration Overview . . . . . . . . . . . . . 357
What Is the DHCP Auto Configuration
Process?
. . . . . . . . . . . . . . . . . . . . . 357
Monitoring and Completing the DHCP Auto
Configuration Process
. . . . . . . . . . . . . . 362
What Are the Dependencies for DHCP Auto
Configuration?
. . . . . . . . . . . . . . . . . . 363
Default Auto Configuration Values . . . . . . . . . . 364
Managing Auto Configuration (Web) . . . . . . . . . 365
Auto-Install Configuration
. . . . . . . . . . . . 365
Managing Auto Configuration (CLI)
. . . . . . . . . . 366
Managing Auto Configuration
. . . . . . . . . . 366
Auto Configuration Example . . . . . . . . . . . . . . 367
Enabling DHCP Auto Configuration and Auto
Image Download
. . . . . . . . . . . . . . . . . 367
15 Monitoring Switch Traffic . . . . . . . . . . . 369
Traffic Monitoring Overview. . . . . . . . . . . . . . 369
What is sFlow Technology?
. . . . . . . . . . . . 369
What is RMON?
. . . . . . . . . . . . . . . . . . 372
What is Port Mirroring?
. . . . . . . . . . . . . . 373
Why is Traffic Monitoring Needed? . . . . . . . 374
Default Traffic Monitoring Values . . . . . . . . . . . 374
Monitoring Switch Traffic (Web)
. . . . . . . . . . . 375
sFlow Agent Summary
. . . . . . . . . . . . . . 375
sFlow Receiver Configuration
. . . . . . . . . . 376
Contents 19
sFlow Sampler Configuration. . . . . . . . . . . . 377
sFlow Poll Configuration
. . . . . . . . . . . . . . 378
Interface Statistics . . . . . . . . . . . . . . . . . 379
Etherlike Statistics . . . . . . . . . . . . . . . . . 380
GVRP Statistics
. . . . . . . . . . . . . . . . . . . 381
EAP Statistics. . . . . . . . . . . . . . . . . . . . 382
Utilization Summary . . . . . . . . . . . . . . . . 383
Counter Summary
. . . . . . . . . . . . . . . . . . 384
Switchport Statistics . . . . . . . . . . . . . . . . 385
RMON Statistics . . . . . . . . . . . . . . . . . . 386
RMON History Control Statistics
. . . . . . . . . . 387
RMON History Table
. . . . . . . . . . . . . . . . 389
RMON Event Control
. . . . . . . . . . . . . . . . 390
RMON Event Log . . . . . . . . . . . . . . . . . . 392
RMON Alarms . . . . . . . . . . . . . . . . . . . 393
Port Statistics
. . . . . . . . . . . . . . . . . . . . 395
LAG Statistics. . . . . . . . . . . . . . . . . . . . 396
Port Mirroring. . . . . . . . . . . . . . . . . . . . 397
Monitoring Switch Traffic (CLI)
. . . . . . . . . . . . . 399
Configuring sFlow
. . . . . . . . . . . . . . . . . . 399
Configuring RMON
. . . . . . . . . . . . . . . . . 401
Viewing Statistics. . . . . . . . . . . . . . . . . . 403
Configuring Port Mirroring . . . . . . . . . . . . . 404
Traffic Monitoring Configuration Examples. . . . . . . 405
Configuring sFlow
. . . . . . . . . . . . . . . . . . 405
Configuring RMON
. . . . . . . . . . . . . . . . . 407
16 Configuring iSCSI Optimization . . . . . . . 409
iSCSI Optimization Overview . . . . . . . . . . . . . . 409
What Does iSCSI Optimization Do?
. . . . . . . . . 410
How Does the Switch Detect iSCSI Traffic
Flows?
. . . . . . . . . . . . . . . . . . . . . . . . 410
20 Contents
How Is Quality of Service Applied to iSCSI
Traffic Flows?
. . . . . . . . . . . . . . . . . . . 410
How Does iSCSI Optimization Use ACLs? . . . . 411
What Information Does the Switch Track in
iSCSI Traffic Flows?
. . . . . . . . . . . . . . . . 411
How Does iSCSI Optimization Interact With
Dell EqualLogic Arrays?
. . . . . . . . . . . . . . 413
What Occurs When iSCSI Optimization Is
Enabled or Disabled?
. . . . . . . . . . . . . . . 413
How Does iSCSI Optimization Interact with
DCBx?
. . . . . . . . . . . . . . . . . . . . . . . 414
How Does iSCSI Optimization Interact with
Dell Compellent Arrays?
. . . . . . . . . . . . . 414
iSCSI CoS and Priority Flow Control/Enhanced
Transmission Selection Interactions
. . . . . . . 415
Default iSCSI Optimization Values
. . . . . . . . . . . 416
Configuring iSCSI Optimization (Web). . . . . . . . . 417
iSCSI Global Configuration
. . . . . . . . . . . . 417
iSCSI Targets Table . . . . . . . . . . . . . . . . 418
iSCSI Sessions Table . . . . . . . . . . . . . . . 419
iSCSI Sessions Detailed . . . . . . . . . . . . . 420
Configuring iSCSI Optimization (CLI)
. . . . . . . . . 421
iSCSI Optimization Configuration Examples . . . . . 423
Configuring iSCSI Optimization Between
Servers and a Disk Array
. . . . . . . . . . . . . 423
17 Configuring Captive Portal . . . . . . . . . . 425
Captive Portal Overview . . . . . . . . . . . . . . . . 425
What Does Captive Portal Do?
. . . . . . . . . . 425
Is the Captive Portal Feature Dependent on
Any Other Feature?
. . . . . . . . . . . . . . . . 426
/