Administrator Guide

54 Tunneling...............................................................................................................................822
Configuring a Tunnel.........................................................................................................................................................822
Configuring Tunnel Keepalive Settings...........................................................................................................................823
Configuring a Tunnel Interface........................................................................................................................................ 823
Configuring Tunnel Allow-Remote Decapsulation.........................................................................................................824
Configuring the Tunnel Source Anylocal........................................................................................................................ 824
55 Uplink Failure Detection (UFD)................................................................................................ 825
Feature Description...........................................................................................................................................................825
How Uplink Failure Detection Works.............................................................................................................................. 826
UFD and NIC Teaming...................................................................................................................................................... 827
Important Points to Remember.......................................................................................................................................827
Configuring Uplink Failure Detection.............................................................................................................................. 828
Clearing a UFD-Disabled Interface..................................................................................................................................829
Displaying Uplink Failure Detection................................................................................................................................. 830
Sample Configuration: Uplink Failure Detection.............................................................................................................831
56 Upgrade Procedures............................................................................................................... 833
57 Virtual LANs (VLANs)..............................................................................................................834
Default VLAN.....................................................................................................................................................................834
Port-Based VLANs............................................................................................................................................................835
VLANs and Port Tagging................................................................................................................................................. 835
Configuration Task List.....................................................................................................................................................836
Creating a Port-Based VLAN.....................................................................................................................................836
Assigning Interfaces to a VLAN.................................................................................................................................836
Moving Untagged Interfaces..................................................................................................................................... 837
Assigning an IP Address to a VLAN.......................................................................................................................... 838
Configuring Native VLANs...............................................................................................................................................839
Enabling Null VLAN as the Default VLAN...................................................................................................................... 839
58 Virtual Link Trunking (VLT)..................................................................................................... 840
Overview............................................................................................................................................................................ 840
VLT Terminology......................................................................................................................................................... 842
Layer-2 Traffic in VLT Domains.................................................................................................................................842
Interspersed VLANs.................................................................................................................................................... 843
VLT on Core Switches................................................................................................................................................844
Enhanced VLT..............................................................................................................................................................844
Configure Virtual Link Trunking.......................................................................................................................................845
Important Points to Remember.................................................................................................................................845
Configuration Notes....................................................................................................................................................846
Primary and Secondary VLT Peers........................................................................................................................... 849
RSTP and VLT............................................................................................................................................................. 849
VLT Bandwidth Monitoring........................................................................................................................................850
VLT and Stacking........................................................................................................................................................850
VLT and IGMP Snooping............................................................................................................................................850
VLT IPv6.......................................................................................................................................................................850
VLT Port Delayed Restoration...................................................................................................................................850
26
Contents