HP 5500 Ei 5500 Si Switch Series Configuration Guide
Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
35 [DeviceA-Ten-GigabitEthernet1/1/2] undo shutdown [DeviceA-Ten-GigabitEthernet1/1/2] save # Create IRF port 1 on Device B, bind Ten-GigabitEthernet 2/1/1 to the IRF port, and save the configuration. system-view [DeviceB] interface ten-gigabitethernet 2/1/1 [DeviceB-Ten-GigabitEthernet2/1/1] shutdown [DeviceB] irf-port 2/1 [DeviceB-irf-port2/1] port group interface ten-gigabitethernet 2/1/1 [DeviceB-irf-port2/1] quit [DeviceB] interface ten-gigabitethernet 2/1/1 [DeviceB-Ten-GigabitEthernet2/1/1] undo shutdown [DeviceB-Ten-GigabitEthernet2/1/1] save # Activate IRF port conf iguration on Device A. [DeviceA-Ten-GigabitEthernet1/1/2] quit [DeviceA] irf-port-configuration active # Activate IRF port configuration on Device B. [DeviceB-Ten-GigabitEthernet2/1/1] quit [DeviceB] irf-port-configuration active After the IRF port configuration is activated, the two devices automatically elect a master. In this example, Device A is the master. Device B auto matically reboots and joins the Device A as a subordinate switch to form an IRF fabric. The system name of the IRF fabric is DevcieA. 4. Configure ARP MAD: # Enable MSTP globally on the IRF fabric to prevent loops. system-view [DeviceA] stp enable # Connect the ARP MAD links as shown in Figure 16. # Configure the IR F fabric to change its brid ge MAC address as soon as the master leaves. [DeviceA] undo irf mac-address persistent # Create VLAN 3, and add port GigabitEthernet 1/0/1 (on Device A) and port GigabitEthernet 2/0/1 (on Device B) to VLAN 3. [DeviceA] vlan 3 [DeviceA-vlan3] port gigabitethernet 1/0/1 gigabitethernet 2/0/1 [DeviceA-vlan3] quit # Create VLAN-interface 3, assign it an IP address, and enable ARP MAD on the interface. Because ARP MAD is not run between IRF domains, you can use the default value 0. [DeviceA] interface vlan-interface 3 [DeviceA-Vlan-interface3] ip address 192.168.2.1 24 [DeviceA-Vlan-interface3] mad arp enable You need to assign a domain ID (range: 0-4294967295) [Current domain is: 0]: The assigned domain ID is: 0 5. Configure Device C: # Enable MSTP globally on Device C to prevent loops. system-view [DeviceC] stp enable
36 # Create VLAN 3, and add GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 to VLAN 3. [DeviceC] vlan 3 [DeviceC-vlan3] port gigabitethernet 1/0/1 gigabitethernet 1/0/2 [DeviceC-vlan3] quit
37 Index A B C D E F G H I M P S A Accessing the IRF fabric,17 A pplication scenario,1 As signing a member ID to each IRF member switch, 14 A ssigning an IRF domain ID to the IRF fabric, 18 B Ba sic concepts, 2 Binding ph ysical ports to IRF ports, 16 C C onfiguration examples, 29 C onfiguration synchronization mechanism, 6 C onfiguring a member switch description, 19 C onfiguring IRF bridge MAC persistence, 20 C onfiguring IRF link load sharing mode, 19 Co nfiguring MAD, 22 C onnecting physical IRF ports, 15 D Displa ying and maintaining an IRF fabric,28 E Enabling so ftware auto-update for system software image synchronization, 21 F F ile system naming conventions, 5 G Gene ral restrictions and configuration guidelines, 11 H Har dware compatibility, 1 I In terface naming conventions,4 IRF benefits, 1 I RF multi-active detection, 6 M M aster election, 6 P P lanning the IRF fabric setup, 13 S S etting the IRF link down report delay, 22 S etup and configuration task list, 12 S pecifying a priority for each member switch, 14
i Contents Configuring Ethernet interfaces ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ··················\ 1 Ethernet interface naming conventions ··················\ ··················\ ··················\ ··················\ ················· ··················\ ················ 1 Performing general configurations ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ··················\ · 1 Configuring a combo interface ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ · 1 Configuring basic settings of an Ethernet interface ··················\ ··················\ ··················\ ··················\ ··· ··················\ · 2 Shutting down an Et hernet interface ··················\ ··················\ ··················\ ··················\ ··················\ · ··················\ ········· 3 Configuring flow control on an Ethernet interface ··················\ ··················\ ··················\ ··················\ ····· ··················\ · 3 Configuring link state change suppres sion on an Ethernet interface ··················\ ··················\ ··················\ ······ ······ 4 Configuring loopback testing on an Ethernet interface ··················\ ··················\ ··················\ ··················\ · ··············· 5 Configuring the link mode of an Ethernet interface (available only on the 5500 EI) ··················\ ··················\ ··· 6 Configuring jumbo frame support ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ········· 6 Enabling the auto power-down functi on on an Ethernet interface ··················\ ··················\ ··················\ ·········· ······ 7 Configuring a Layer 2 Ethernet interface ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ··············· 7 Layer 2 Ethernet interface configuration task list ··················\ ··················\ ··················\ ··················\ ···· ··················\ ···· 7 Configuring a port group ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ················ 8 Configuring a MAC Address for an Ethernet port (available only on the 5500 SI) ··················\ ··················\ ····· 9 Setting speed options for auto negotiation on an Ethernet interface ··················\ ··················\ ··················\ ····· ······· 9 Configuring stor m suppression ··················\ ··················\ ··················\ ··················\ ··················\ ······· ··················\ ········· 10 Setting the statistics polling in terval ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ············ 11 Enabling loopback detection on an Ethernet interface ··················\ ··················\ ··················\ ··················\ ·· ··········· 11 Setting the MDI mode of an Ethernet interface ··················\ ··················\ ··················\ ··················\ ········· ················· 13 Enabling bridging on an Ethernet interface ··················\ ··················\ ··················\ ··················\ ············ ··················\ · 14 Testing the cable connection of an Ethernet interface ··················\ ··················\ ··················\ ··················\ · ·············· 14 Configuring storm control on an Ethernet interface ··················\ ··················\ ··················\ ··················\ ···· ··············· 15 Setting the MTU for a Layer 3 Ethernet inte rface (available only on the 5500 EI) ··················\ ··················\ ·········· ··· 16 Displaying and maintaining an Ethernet interface ··················\ ··················\ ··················\ ··················\ ······ ··················\ ····· 17 Configuring loopback an d null interfaces ·················\ ··················\ ··················\ ··················\ ··············· ··················\ ········ 18 Configuring a loo pback interface ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ················ 18 Introduction to the loopback interface··················\ ··················\ ··················\ ··················\ ················· ··················\ ······ 18 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 18 Configuring a null interface ··················\ ··················\ ··················\ ··················\ ··················\ ········ ··················\ ··················\ ···· 19 Introduction to the null interface ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··············· 19 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 19 Displaying and maintaining l oopback and null interfaces ··················\ ··················\ ··················\ ················· ················· 19 Bulk configuring interfaces ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··················\ · 21 Configuration guidelines ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ··················\ ····· 21 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··················\ ···· 21 Configuring the MAC address table ·················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ········· 22 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ······ 22 How a MAC address table entry is created ··················\ ··················\ ··················\ ··················\ ··················\ ············· 22 Types of MAC address table entries ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ····· 23 MAC address table-base d frame forwarding ··················\ ··················\ ··················\ ··················\ ·············· ·············· 23 Configuring static, dynamic, and bl ackhole MAC address table entries ··················\ ··················\ ··················\ ···· ······ 23 Adding or modifying a static, dynamic, or blackhole MAC address table entry in system view ················ 23 Adding or modifying a static or dynamic MAC address table entry in interface view ··················\ ··············· 24 Disabling MAC address learning ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··· 24 Disabling global MAC address learning ··················\ ··················\ ··················\ ··················\ ················· ··················\ · 24
ii Disabling MAC address learning on ports ··················\ ··················\ ··················\ ··················\ ··············· ··················\ 24 Disabling MAC address learning on a VLAN (available only on the 5500 EI) ··················\ ··················\ ········· 25 Configuring the aging timer for dynamic MAC address entries ··················\ ··················\ ··················\ ··················\ ······· 25 Configuring the MAC learning limit on ports ··················\ ··················\ ··················\ ··················\ ··········· ··················\ 26 Enabling MAC addr ess roaming ··················\ ··················\ ··················\ ··················\ ··················\ ········ ··················\ ····· 26 Displaying and maintainin g MAC address tables ··················\ ··················\ ··················\ ··················\ ········· ··················\ ·· 28 MAC address table conf iguration example ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ······· 28 Network requirements ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············· 28 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 29 Configuring MAC Information ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ············· 30 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ······ 30 Introduction to MAC Information ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ········ 30 How MAC Inform ation works ··················\ ··················\ ··················\ ··················\ ··················\ ··········· ··················\ ······· 30 Configuring MAC Information ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ················· 30 Enabling MAC Inform ation globally ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ···· 30 Enabling MAC Informatio n on an interface ··················\ ··················\ ··················\ ··················\ ·············· ················· 30 Configuring MAC In formation mode ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ·· 31 Configuring the interval for sending Syslog or trap messages ··················\ ··················\ ··················\ ··················\ · 31 Configuring the MAC Information queue length ··················\ ··················\ ··················\ ··················\ ··················\ ······ 31 MAC Information configuration example ··················\ ··················\ ··················\ ··················\ ················· ··················\ ········· 32 Configuring Ethernet link aggregation ··················\ ··················\ ··················\ ··················\ ················· ··················\ ·········· 33 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ······ 33 Basic concepts ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ······················\ ··················\ ··· 33 Aggregating links in static mode ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ········· 36 Aggregating links in dynamic mode ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ···· 37 Load-sharing criteria for link aggregatio n groups ··················\ ··················\ ··················\ ··················\ ····· ················ 38 Configuration restrictio ns and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 39 Ethernet link aggregation configuration task list ··················\ ··················\ ··················\ ··················\ ··················\ ··············· 39 Configuring an aggregation group ·················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ············· 39 Configuration guidelines ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ·············· 40 Configuring a static aggregation group ··················\ ··················\ ··················\ ··················\ ················ ··················\ ··· 40 Configuring a dynamic aggregation group ··················\ ··················\ ··················\ ··················\ ··············· ················ 41 Configuring an aggr egate interface ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ·············· 43 Configuring the description of an aggregate interface ··················\ ··················\ ··················\ ··················\ ············· 43 Configuring the MTU of a Layer 3 aggregate interface (available only on the 5500 EI) ··················\ ·········· 44 Enabling link state traps for an aggregate interface ··················\ ··················\ ··················\ ··················\ ·· ··············· 44 Limiting the number of Selected ports for an aggregation group ··················\ ··················\ ··················\ ·········· ···· 45 Shutting down an a ggregate interface ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··· 46 Restoring the default settings for an aggregate interface ··················\ ··················\ ··················\ ··············· ············ 47 Configuring load sharing for link aggregation groups ··················\ ··················\ ··················\ ··················\ ··················\ ···· 47 Configuring load-sharing criteria for link aggregation groups ··················\ ··················\ ··················\ ··········· ······· 47 Enabling local-first load shar ing for link aggregation ··················\ ··················\ ··················\ ··················\ ··············· 48 Enabling link-aggregation traffic redirection ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··· 49 Displaying and maintaining Ethernet link aggregation ··················\ ··················\ ··················\ ··················\ ·· ··················\ · 50 Ethernet link aggregation configuration examples ··················\ ··················\ ··················\ ··················\ ······ ··················\ ····· 50 Layer 2 static aggregatio n configuration example ··················\ ··················\ ··················\ ··················\ ······ ·············· 51 Layer 2 dynamic aggregatio n configuration example ··················\ ··················\ ··················\ ··················\ ····· ········· 53 Layer 3 static aggregatio n configuration example ··················\ ··················\ ··················\ ··················\ ······ ·············· 55 Layer 3 dynamic aggregatio n configuration example ··················\ ··················\ ··················\ ··················\ ····· ········· 56 Configuring port isolation ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············ 58 Assigning a port to the isolation group ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ·············· 58 Displaying and maintainin g the isolation group ··················\ ··················\ ··················\ ··················\ ········ ··················\ ······ 58 Port isolation configuration example··················\ ··················\ ··················\ ··················\ ··················\ · ··················\ ··············· 59
iii Configuring spanning tree protocols ··················\ ··················\ ··················\ ··················\ ··················\ · ··················\ ··········· 60 STP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ··················\ ··················\ ·· 60 STP protocol packets ··················\ ··················\ ··················\ ··················\ ··················\ ················ ··················\ ················· 60 Basic concepts in STP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·············· 61 Calculation process of the STP algorithm ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ··· 62 RSTP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ··················\ ··················\ · 67 PVST ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ·············· 67 MSTP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ············· 68 STP, RSTP, and PVST limitations ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ········· 68 MSTP features ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ··················\ ··· 68 MSTP basic concepts ··················\ ··················\ ··················\ ··················\ ··················\ ················· ··················\ ··············· 68 How MSTP works ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ················ 72 Implementation of MSTP on devices ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ········ 72 Protocols and standards ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··················\ ····· 73 Spanning tree configuration task list ··················\ ··················\ ··················\ ··················\ ················· ··················\ ················· 73 Configuration restrictio ns and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ···· 73 STP configuration task list ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ················ 73 RSTP configuration task list ··················\ ··················\ ··················\ ··················\ ··················\ ········ ··················\ ··············· 74 PVST configuration task list··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ·············· 75 MSTP configuration task list ··················\ ··················\ ··················\ ··················\ ··················\ ········ ··················\ ············· 76 Setting the spanning tree mode ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ··················\ 77 Configuring an MST region ··················\ ··················\ ··················\ ··················\ ··················\ ··········· ··················\ ··················\ · 78 Configuration restrictio ns and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ···· 78 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 78 Configuring the root bridge or a secondary root bridge ··················\ ··················\ ··················\ ··················\ ··················\ 79 Configuration restrictio ns and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ···· 79 Configuring the current device as the root bridge of a specific spanning tree ··················\ ··················\ ·········· 80 Configuring the current device as a secondary root bridge of a specific spanning tree ··················\ ············ 80 Configuring the device priority ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ······· 80 Configuring the maximum hops of an MST region ··················\ ··················\ ··················\ ··················\ ········· ··················\ · 81 Configuring the network diameter of a switched network ··················\ ··················\ ··················\ ··················\ ················· 81 Configuring spanning tree timers ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ················· 82 Configuration restrictio ns and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ···· 82 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 83 Configuring the timeout factor ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ··················\ ·· 83 Configuring the maximum port rate ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ·············· 84 Configuring edge ports ··················\ ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ··················\ ····· 84 Configuration restrictions and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ···· 84 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 84 Configuring path costs of ports ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ··················\ · 85 Specifying a standard for the device to use when it calculates the default path cost ··················\ ················· 85 Configuring path costs of ports ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ················ 87 Configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ·············· 87 Configuring the port priority ··················\ ··················\ ··················\ ··················\ ··················\ ······· ··················\ ··················\ ···· 88 Configuring the port link type ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ··················\ ··· 88 Configuration restrictions and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ···· 88 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 88 Configuring the mode a port uses to recognize/send MSTP packets ··················\ ··················\ ··················\ ········· ······· 89 Enabling outputting port state transition information ··················\ ··················\ ··················\ ··················\ ··················\ ········ 90 Enabling the spanning tree feature ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ················ 90 Configuration restrictio ns and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ···· 90 Enabling the spanning tree feat ure (in STP/RSTP/MSTP mode) ··················\ ··················\ ··················\ ·············· ·· 90 Enabling the spanning tree feature (in PVST mode) ··················\ ··················\ ··················\ ··················\ ····· ············· 91 Performing mCheck ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ······· 91
iv Performing mCheck globally ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ·········· 92 Performing mCheck in interface view ··················\ ··················\ ··················\ ··················\ ··················\ · ··················\ ···· 92 Configuring Dige st Snooping ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··················\ 92 Configuration restrictio ns and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ···· 92 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 93 Digest Snooping configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ · 93 Configuring No Agreement Check ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ············ 94 Configuration prerequisites ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ············· 95 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 95 No Agreement Check co nfiguration example··················\ ··················\ ··················\ ··················\ ··············· ············· 96 Configuring TC snooping ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··················\ ··· 96 Configuration restrictions and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ···· 97 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············· 97 Configuring protection functions ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ··················\ 98 Configuration prerequisites ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ············· 98 Enabling BPDU guard ··················\ ··················\ ··················\ ··················\ ··················\ ················· ··················\ ·············· 98 Enabling root guard ··················\ ··················\ ··················\ ··················\ ··················\ ················· ··················\ ················· 98 Enabling loop guard ··················\ ··················\ ··················\ ··················\ ··················\ ················· ··················\ ················ 99 Enabling TC-BPDU guard··················\ ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ········· 100 Enabling BPDU drop ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············· 100 Displaying and maintain ing the spanning tree ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ····· 101 Spanning tree config uration examples ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·········· 102 MSTP configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ······· 102 PVST configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ········ 105 Configuring BPDU tunneling ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····· 109 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ···· 109 Background ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··························\ ··················\ ·· 109 BPDU tunneling implementation ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············· 110 Enabling BPDU tunneling ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··················\ · 111 Configuration prerequisites ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··········· 111 Configuration restrictio ns and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ·· 112 Enabling BPDU tunneling ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ······ 112 Configuring destination multicast MAC address for BPDUs ··················\ ··················\ ··················\ ················· ············· 112 BPDU tunneling configuration examples ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ········ 113 BPDU tunneling for STP configuration example ··················\ ··················\ ··················\ ··················\ ·········· ············· 113 BPDU tunneling for PVST configuration example ··················\ ··················\ ··················\ ··················\ ········· ············ 114 Configurin g VLANs ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ · ··················\ ··················\ 116 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ···· 116 VLAN fundamentals··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····················\ ············· 116 VLAN types ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ········ ··················\ ··················\ ·· 117 Protocols and standards ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············ 118 Configuring basic VLAN se ttings··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ·············· 118 Configuration restrictio ns and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ·· 118 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 118 Configuring basic settings of a VLAN interface ··················\ ··················\ ··················\ ··················\ ········ ··················\ ····· 119 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 119 VLAN interface conf iguration example ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ · 120 Configuring port-based VLANs ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····· 121 Introduction to port-based VLAN ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ······ 121 Assigning an access port to a VLAN ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ·· 122 Assigning a trunk port to a VLAN··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ····· 123 Assigning a hybrid port to a VLAN ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ···· 124 Port-based VLAN conf iguration example ··················\ ··················\ ··················\ ··················\ ················· ················· 125
v Configuring MAC-based VLANs ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··········· 127 Introduction to MAC-based VLAN ··················\ ··················\ ··················\ ··················\ ··················\ ······ ··················\ ··· 127 Configuration restrictio ns and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ·· 129 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 129 MAC-based VLAN conf iguration example ··················\ ··················\ ··················\ ··················\ ··················\ ············· 132 Configuring protoc ol-based VLANs ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ··········· 134 Introduction to prot ocol-based VLAN ··················\ ··················\ ··················\ ··················\ ··················\ · ··················\ ··· 134 Configuration restrictio ns and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ·· 134 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 135 Protocol-based VLAN configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ········· 135 Configuring IP subnet-based VLANs ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ··········· 138 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 138 IP subnet-based VLAN configuration example ··················\ ··················\ ··················\ ··················\ ············ ············· 139 Displaying and maintaining VLAN ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ··········· 141 Configuring a super VLAN (ava ilable only on the 5500 EI) ·················\ ··················\ ··················\ ················· ········· 142 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ···· 142 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··················\ ·· 142 Displaying and mainta ining super VLAN ··················\ ··················\ ··················\ ··················\ ················· ··················\ ······· 144 Super VLAN configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ·········· 144 Configuring an is olate-user-VLAN ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ·········· 147 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ···· 147 Configuration restrictions and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 148 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··················\ ·· 148 Displaying and maintaining isolate-user-VLAN ··················\ ··················\ ··················\ ··················\ ··················\ ··············· 149 Isolate-user-VLAN configuration example ··················\ ··················\ ··················\ ··················\ ··············· ··················\ ········· 150 Configuring a voice VLAN ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ············· 153 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ···· 153 OUI addresses ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·······················\ ··················\ 153 Voice VLAN assignment modes ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ···· 153 Security mode and normal mode of voice VLANs ··················\ ··················\ ··················\ ··················\ ·········· ········· 155 Configuration prerequisites ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··················\ ·· 156 Configuring QoS priority settings fo r voice traffic on an interface ··················\ ··················\ ··················\ ····· ············· 157 Configuration restrictio ns and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ·· 157 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 157 Configuring a port to operate in au tomatic voice VLAN assignment mode ··················\ ··················\ ··················\ ···· 157 Configuring a port to operate in ma nual voice VLAN assignment mode ··················\ ··················\ ··················\ ······ ·· 158 Configuration restrictio ns and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ·· 158 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 158 Displaying and mainta ining voice VLAN ··················\ ··················\ ··················\ ··················\ ················· ··················\ ······· 159 Voice VLAN configur ation examples ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ·········· 159 Automatic voice VLAN mode configuration example ··················\ ··················\ ··················\ ··················\ ······· ······ 159 Manual voice VLAN assignment mode configuration example ··················\ ··················\ ··················\ ··············· 161 Configuring GVRP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ··················\ · 164 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ···· 164 GARP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ································\ ··················\ ······ 164 GVRP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ·· 167 Protocols and standards ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············ 167 GVRP configuratio n task list ··················\ ··················\ ··················\ ··················\ ··················\ ········ ··················\ ··················\ ·· 167 Configuring GVRP functions ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·········· 168 Configuration restrictions and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ·· 168 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 168 Configuring the GARP timers ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ················· 169
vi Displaying and maintaining GVRP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ················· 170 GVRP configuration examples ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··············· 170 GVRP normal registration mode configuration example ··················\ ··················\ ··················\ ··················\ ········· 170 GVRP fixed registration mode configuration example ··················\ ··················\ ··················\ ··················\ ···· ········ 172 GVRP forbidden registration mode configurati on example ··················\ ··················\ ··················\ ··················\ ···· 173 Configuring QinQ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ·· 176 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ···· 176 Background and benefits ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ······ 176 How QinQ works ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ·············· 176 QinQ frame structure ··················\ ··················\ ··················\ ··················\ ··················\ ················ ··················\ ·············· 177 Implementations of QinQ ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ·········· 178 Modifying the TPID in a VLAN tag ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ···· 178 Protocols and standards ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············ 179 QinQ configuration task list ··················\ ··················\ ··················\ ··················\ ··················\ ········ ··················\ ··················\ ·· 179 Configuring basic QinQ ··················\ ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ··················\ · 180 Enabling basic QinQ ··················\ ··················\ ··················\ ··················\ ··················\ ················· ··················\ ············· 180 Configuring VLAN trans parent transmission ··················\ ··················\ ··················\ ··················\ ············· ··············· 180 Configuring selective QinQ ··················\ ··················\ ··················\ ··················\ ··················\ ·········· ··················\ ··················\ 181 Configuring an outer VL AN tagging policy ··················\ ··················\ ··················\ ··················\ ·············· ··············· 181 Configuring an inner-outer VL AN 802.1p priority mapping ··················\ ··················\ ··················\ ··················\ ·· 183 Configuring inner VLAN ID substitution (available only on the 5500 EI) ··················\ ··················\ ················· 184 Configuring the TPID value in VLAN tags ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ······ 185 Configuring the TPID value on the 5500 EI ··················\ ··················\ ··················\ ··················\ ··················\ ············ 185 Configuring the TPID value on the 5500 SI ··················\ ··················\ ··················\ ··················\ ··················\ ············ 185 QinQ configuration examples ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··············· 186 Basic QinQ configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ······· 186 Selective QinQ configuration example (configuring an outer VLAN tagging policy in port-based approach) ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ············ 188 Selective QinQ configuration example (configuring an outer VLAN tagging policy in QoS policy-based approach) ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ············ 191 Selective QinQ configuration example (inner VLAN ID substitution)··················\ ··················\ ··················\ ······· 194 Configuring VLAN mapping (available only on the 5500 EI) ··················\ ··················\ ··················\ ··················\ ····· 199 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ···· 199 Application scenario of one-to-one and many-to-one VLAN mapping ··················\ ··················\ ··················\ ···· 199 Application scenario of two-to-two VLAN mapping ··················\ ··················\ ··················\ ··················\ ······· ········· 200 Concepts and terms ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·············· 201 VLAN mapping implementations ··················\ ··················\ ··················\ ··················\ ··················\ ········ ··················\ ··· 202 VLAN mapping conf iguration tasks ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ··········· 203 Configuring one-to-one VLAN mapping ··················\ ··················\ ··················\ ··················\ ··················\ · ··················\ ······· 204 Configuration prerequisites ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··········· 204 Configuring an uplink policy ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ 204 Configuring a downlink policy ··················\ ··················\ ··················\ ··················\ ··················\ ······· ··················\ ······· 204 Configuring the customer-side port ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ········ 205 Configuring the network-side port ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ······ 205 Configuring many-to-one VLAN mapping ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····· 206 Configuration prerequisites ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··········· 206 Enabling DHCP snooping ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····· 206 Enabling ARP detection in SVLANs ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ··· 207 Configuring an uplink policy ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ 207 Configuring the customer-side port ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ········ 207 Configuring the network-side port ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ······ 208 Configuring two-to-two VLAN mapping ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ········· 208 Configuring an uplink policy for the customer-side port ··················\ ··················\ ··················\ ················· ·········· 209
vii Configuring an uplink policy for the network-side port ··················\ ··················\ ··················\ ··················\ ··········· 209 Configuring a downlink policy for the customer-side port ··················\ ··················\ ··················\ ················ ········ 210 Configuring the customer-side port ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ········ 211 Configuring the network-side port ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ······ 211 VLAN mapping config uration examples ··················\ ··················\ ··················\ ··················\ ··················\ · ··················\ ······ 212 One-to-one and many-to-one VLAN mapping configuration example ··················\ ··················\ ··················\ ····· 212 Two-to-two VLAN mapping configuration example ··················\ ··················\ ··················\ ··················\ ········· ········ 218 Configurin g LLDP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ··················\ ··· 221 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ···· 221 Background ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··························\ ··················\ ·· 221 Basic concepts ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ··················\ · 221 How LLDP works ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ················ 225 Protocols and standards ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ············ 226 LLDP configuration task list ··················\ ··················\ ··················\ ··················\ ··················\ ········ ··················\ ··················\ ···· 226 Performing basic LLDP configuration ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·············· 227 Enabling LLDP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ··················\ · 227 Setting the LLDP operating mode ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ······ 227 Setting the LLDP re-i nitialization delay ··················\ ··················\ ··················\ ··················\ ·············· ··················\ ······ 227 Enabling LLDP polling··················\ ··················\ ··················\ ··················\ ··················\ ················ ··················\ ·············· 228 Configuring the adv ertisable TLVs ··················\ ··················\ ··················\ ··················\ ··················\ ··· ··················\ ······ 228 Configuring the management addre ss and its encoding format ··················\ ··················\ ··················\ ·············· 229 Setting other LLDP parameters ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ················ 230 Setting an encapsulation format for LLDPDUs ··················\ ··················\ ··················\ ··················\ ··········· ··············· 230 Configuring CDP compatibility ··················\ ··················\ ··················\ ··················\ ··················\ ······· ··················\ ················ 231 Configuration prerequisites ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··········· 231 Configuring CDP compatibility ··················\ ··················\ ··················\ ··················\ ··················\ ······· ··················\ ······· 231 Enabling LLDP to automatically discover IP phones ··················\ ··················\ ··················\ ··················\ ··················\ ········ 232 Configuration prerequisites ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ··········· 232 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 233 Configuring LLDP to advertis e a specific voice VLAN ··················\ ··················\ ··················\ ··················\ ··· ··················\ · 233 Configuration guidelines ··················\ ··················\ ··················\ ··················\ ··················\ ············ ··················\ ············ 233 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 234 Dynamically advertising server-assigned VLANs th rough LLDP ··················\ ··················\ ··················\ ·············· ··········· 235 Configuring LLDP trapping ··················\ ··················\ ··················\ ··················\ ··················\ ··········· ··················\ ··················\ · 235 Displaying and maintaining LLDP ··················\ ··················\ ··················\ ··················\ ··················\ ····· ··················\ ·············· 235 LLDP configuration examples ··················\ ··················\ ··················\ ··················\ ··················\ ········· ··················\ ················· 236 Basic LLDP configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ····· 236 CDP-compatible LLDP configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ········· 239 Configuring a service loopback group (available only on the 5500 EI) ··················\ ··················\ ··················\ ···· ·· 241 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ···· 241 Service types of service loopback groups ··················\ ··················\ ··················\ ··················\ ·············· ··················\ 241 Requirements on serv ice loopback ports ··················\ ··················\ ··················\ ··················\ ················ ··················\ 241 States of servic e loopback ports ··················\ ··················\ ··················\ ··················\ ··················\ ···· ··················\ ········ 241 Configuration restrictio ns and guidelines ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 242 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··················\ ·· 242 Displaying and maintainin g service loopback groups ··················\ ··················\ ··················\ ··················\ ··················\ ··· 243 Service loopback group configuration example ··················\ ··················\ ··················\ ··················\ ··················\ ············· 243 Network requirements ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··········· 243 Configuration procedure ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ··········· 243 Configuring MVRP ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ·· ··················\ ··················\ 245 Overview ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ···················\ ··················\ ···· 245 Introduction to MRP ·················\ ··················\ ··················\ ··················\ ··················\ ··················\ ··················\ ················ 245 MVRP registration modes ··················\ ··················\ ··················\ ··················\ ··················\ ············· ··················\ ·········· 247