Administrator Guide

Conguring a Designated Router................................................................................................................................. 591
Creating Multicast Boundaries and Domains............................................................................................................. 592
35 PIM Source-Specic Mode (PIM-SSM).................................................................................................. 593
Implementation Information..........................................................................................................................................593
Important Points to Remember............................................................................................................................. 593
Congure PIM-SSM......................................................................................................................................................594
Related Conguration Tasks...................................................................................................................................594
Enabling PIM-SSM........................................................................................................................................................ 594
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................594
Conguring PIM-SSM with IGMPv2.................................................................................................................... 595
Electing an RP using the BSR Mechanism.................................................................................................................596
Enabling RP to Server Specic Multicast Groups...............................................................................................596
36 Port Monitoring....................................................................................................................................... 598
Important Points to Remember................................................................................................................................... 598
Port Monitoring..............................................................................................................................................................599
Conguring Port Monitoring......................................................................................................................................... 601
Conguring Monitor Multicast Queue........................................................................................................................ 602
Enabling Flow-Based Monitoring.................................................................................................................................603
Remote Port Mirroring..................................................................................................................................................604
Remote Port Mirroring Example............................................................................................................................ 604
Conguring Remote Port Mirroring.......................................................................................................................605
Displaying Remote-Port Mirroring Congurations...............................................................................................607
Conguring the Sample Remote Port Mirroring.................................................................................................. 607
Encapsulated Remote Port Monitoring....................................................................................................................... 610
ERPM Behavior on a typical Dell Networking OS ..................................................................................................... 612
Decapsulation of ERPM packets at the Destination IP/ Analyzer......................................................................612
Port Monitoring on VLT................................................................................................................................................. 613
VLT Non-fail over Scenario..................................................................................................................................... 613
VLT Fail-over Scenario.............................................................................................................................................614
RPM over VLT Scenarios........................................................................................................................................ 614
37 Private VLANs (PVLAN)...........................................................................................................................616
Private VLAN Concepts................................................................................................................................................ 616
Using the Private VLAN Commands............................................................................................................................617
Conguration Task List.................................................................................................................................................. 618
Creating PVLAN ports............................................................................................................................................. 618
Creating a Primary VLAN........................................................................................................................................ 619
Creating a Community VLAN.................................................................................................................................620
Creating an Isolated VLAN..................................................................................................................................... 620
Private VLAN Conguration Example......................................................................................................................... 622
Inspecting the Private VLAN Conguration............................................................................................................... 623
38 Per-VLAN Spanning Tree Plus (PVST+)................................................................................................... 625
Protocol Overview.........................................................................................................................................................625
20
Contents