Dell PowerEdge FX2 Dell PowerEdge FN I/O Aggregator Configuration Guide 9.6(0 - Page 5

IGMP Overview, Interfaces, How IGMP Snooping is Implemented on an Aggregator

Page 5 highlights

FIP Snooping on Ethernet Bridges...70 How FIP Snooping is Implemented...72 FIP Snooping on VLANs...73 FC-MAP Value...73 Bridge-to-FCF Links...73 Impact on other Software Features 73 FIP Snooping Prerequisites...73 FIP Snooping Restrictions...74 Configuring FIP Snooping...74 Displaying FIP Snooping Information 75 FIP Snooping Example...81 Debugging FIP Snooping ...82 7 IGMP Overview...83 Internet Group Management Protocol (IGMP 83 IGMP Version 2...83 Joining a Multicast Group...84 Leaving a Multicast Group...84 IGMP Version 3...84 Joining and Filtering Groups and Sources 85 Leaving and Staying in Groups...86 IGMP Snooping...87 How IGMP Snooping is Implemented on an Aggregator 87 Displaying IGMP Information...87 8 Interfaces...90 Basic Interface Configuration...90 Advanced Interface Configuration...90 Interface Auto-Configuration...90 Interface Types...91 Viewing Interface Information...91 Disabling and Re-enabling a Physical Interface 93 Layer 2 Mode...93 Management Interfaces...94 Accessing an Aggregator...94 Configuring a Management Interface 94 Configuring a Static Route for a Management Interface 95 VLAN Membership...96 Default VLAN ...96 Port-Based VLANs...96 VLANs and Port Tagging...96 Configuring VLAN Membership...97

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292

FIP Snooping on Ethernet Bridges
......................................................................................................
70
How FIP Snooping is Implemented
....................................................................................................
72
FIP Snooping on VLANs
.................................................................................................................
73
FC-MAP Value
................................................................................................................................
73
Bridge-to-FCF Links
......................................................................................................................
73
Impact on other Software Features
..............................................................................................
73
FIP Snooping Prerequisites
............................................................................................................
73
FIP Snooping Restrictions
.............................................................................................................
74
Configuring FIP Snooping
...................................................................................................................
74
Displaying FIP Snooping Information
.................................................................................................
75
FIP Snooping Example
.........................................................................................................................
81
Debugging FIP Snooping
...................................................................................................................
82
7 IGMP Overview
....................................................................................................
83
Internet Group Management Protocol (IGMP)
..................................................................................
83
IGMP Version 2
....................................................................................................................................
83
Joining a Multicast Group
.............................................................................................................
84
Leaving a Multicast Group
............................................................................................................
84
IGMP Version 3
....................................................................................................................................
84
Joining and Filtering Groups and Sources
...................................................................................
85
Leaving and Staying in Groups
.....................................................................................................
86
IGMP Snooping
...................................................................................................................................
87
How IGMP Snooping is Implemented on an Aggregator
..................................................................
87
Displaying IGMP Information
..............................................................................................................
87
8 Interfaces
.............................................................................................................
90
Basic Interface Configuration
.............................................................................................................
90
Advanced Interface Configuration
.....................................................................................................
90
Interface Auto-Configuration
.............................................................................................................
90
Interface Types
....................................................................................................................................
91
Viewing Interface Information
............................................................................................................
91
Disabling and Re-enabling a Physical Interface
.................................................................................
93
Layer 2 Mode
.......................................................................................................................................
93
Management Interfaces
......................................................................................................................
94
Accessing an Aggregator
..............................................................................................................
94
Configuring a Management Interface
..........................................................................................
94
Configuring a Static Route for a Management Interface
.............................................................
95
VLAN Membership
..............................................................................................................................
96
Default VLAN
................................................................................................................................
96
Port-Based VLANs
.........................................................................................................................
96
VLANs and Port Tagging
...............................................................................................................
96
Configuring VLAN Membership
....................................................................................................
97