Users Guide

Conguring a Tunnel...................................................................................................................................................... 854
Conguring Tunnel Keepalive Settings........................................................................................................................... 855
Conguring a Tunnel Interface....................................................................................................................................... 855
Conguring Tunnel Allow-Remote Decapsulation........................................................................................................... 856
Conguring Tunnel source anylocal Decapsulation......................................................................................................... 856
57 Uplink Failure Detection (UFD)..................................................................................858
Feature Description........................................................................................................................................................858
How Uplink Failure Detection Works.............................................................................................................................. 859
UFD and NIC Teaming....................................................................................................................................................860
Important Points to Remember......................................................................................................................................860
Conguring Uplink Failure Detection............................................................................................................................... 861
Clearing a UFD-Disabled Interface................................................................................................................................. 862
Displaying Uplink Failure Detection................................................................................................................................. 863
Sample Conguration: Uplink Failure Detection..............................................................................................................865
58 Upgrade Procedures..................................................................................................867
Get Help with Upgrades.................................................................................................................................................867
59 Virtual LANs (VLANs)............................................................................................... 868
Default VLAN.................................................................................................................................................................868
Port-Based VLANs.........................................................................................................................................................869
VLANs and Port Tagging................................................................................................................................................869
Conguration Task List................................................................................................................................................... 870
Creating a Port-Based VLAN....................................................................................................................................870
Assigning Interfaces to a VLAN.................................................................................................................................871
Moving Untagged Interfaces.................................................................................................................................... 872
Assigning an IP Address to a VLAN.......................................................................................................................... 873
Conguring Native VLANs..............................................................................................................................................873
Enabling Null VLAN as the Default VLAN....................................................................................................................... 874
60 Virtual Link Trunking (VLT)........................................................................................875
Overview........................................................................................................................................................................875
VLT on Core Switches..............................................................................................................................................876
Enhanced VLT.......................................................................................................................................................... 876
VLT Terminology............................................................................................................................................................. 877
Congure Virtual Link Trunking....................................................................................................................................... 877
Important Points to Remember.................................................................................................................................877
Conguration Notes................................................................................................................................................. 879
Primary and Secondary VLT Peers............................................................................................................................881
RSTP and VLT..........................................................................................................................................................882
VLT Bandwidth Monitoring.......................................................................................................................................882
VLT and Stacking..................................................................................................................................................... 882
VLT and IGMP Snooping.......................................................................................................................................... 882
VLT IPv6.................................................................................................................................................................. 883
VLT Port Delayed Restoration.................................................................................................................................. 883
29