Administrator Guide

Chapter 54: Tunneling............................................................................................................... 868
Configuring a Tunnel...................................................................................................................................................... 868
Configuring Tunnel Keepalive Settings......................................................................................................................869
Configuring a Tunnel Interface.................................................................................................................................... 869
Configuring Tunnel Allow-Remote Decapsulation...................................................................................................870
Configuring the Tunnel Source Anylocal................................................................................................................... 870
Chapter 55: Uplink Failure Detection (UFD)...............................................................................872
Feature Description........................................................................................................................................................ 872
How Uplink Failure Detection Works..........................................................................................................................873
UFD and NIC Teaming....................................................................................................................................................874
Important Points to Remember................................................................................................................................... 874
Configuring Uplink Failure Detection..........................................................................................................................875
Clearing a UFD-Disabled Interface..............................................................................................................................876
Displaying Uplink Failure Detection............................................................................................................................. 877
Sample Configuration: Uplink Failure Detection...................................................................................................... 879
Chapter 56: Upgrade Procedures............................................................................................... 881
Chapter 57: Virtual LANs (VLANs)............................................................................................. 882
Default VLAN................................................................................................................................................................... 882
Port-Based VLANs..........................................................................................................................................................883
VLANs and Port Tagging...............................................................................................................................................883
Configuration Task List..................................................................................................................................................884
Creating a Port-Based VLAN................................................................................................................................. 884
Assigning Interfaces to a VLAN.............................................................................................................................885
Moving Untagged Interfaces..................................................................................................................................886
Assigning an IP Address to a VLAN...................................................................................................................... 887
Configuring Native VLANs............................................................................................................................................887
Enabling Null VLAN as the Default VLAN................................................................................................................. 888
Chapter 58: Virtual Link Trunking (VLT).................................................................................... 889
Overview...........................................................................................................................................................................889
VLT Terminology........................................................................................................................................................ 891
Layer-2 Traffic in VLT Domains.............................................................................................................................892
Interspersed VLANs..................................................................................................................................................893
VLT on Core Switches............................................................................................................................................. 893
Enhanced VLT............................................................................................................................................................894
Configure Virtual Link Trunking...................................................................................................................................895
Important Points to Remember.............................................................................................................................895
Configuration Notes................................................................................................................................................. 897
Primary and Secondary VLT Peers....................................................................................................................... 899
RSTP and VLT........................................................................................................................................................... 900
VLT Bandwidth Monitoring.....................................................................................................................................900
VLT and Stacking......................................................................................................................................................900
VLT and IGMP Snooping..........................................................................................................................................901
VLT IPv6...................................................................................................................................................................... 901
VLT Port Delayed Restoration................................................................................................................................901
26
Contents