Administrator Guide

Table Of Contents
Creating Multicast Boundaries and Domains............................................................................................................. 664
38 PIM Source-Specic Mode (PIM-SSM).................................................................................................. 665
Implementation Information......................................................................................................................................... 665
Important Points to Remember............................................................................................................................. 665
Congure PIM-SSM......................................................................................................................................................666
Related Conguration Tasks...................................................................................................................................666
Enabling PIM-SSM........................................................................................................................................................ 666
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................666
Conguring PIM-SSM with IGMPv2.....................................................................................................................667
Electing an RP using the BSR Mechanism.................................................................................................................668
Enabling RP to Server Specic Multicast Groups...............................................................................................669
39 Port Monitoring....................................................................................................................................... 670
Important Points to Remember....................................................................................................................................670
Port Monitoring...............................................................................................................................................................671
Conguring Port Monitoring.........................................................................................................................................673
Enabling Flow-Based Monitoring................................................................................................................................. 674
Remote Port Mirroring.................................................................................................................................................. 675
Remote Port Mirroring Example.............................................................................................................................676
Conguring Remote Port Mirroring....................................................................................................................... 677
Displaying Remote-Port Mirroring Congurations............................................................................................... 678
Conguring the Sample Remote Port Mirroring.................................................................................................. 679
Encapsulated Remote Port Monitoring.......................................................................................................................682
ERPM Behavior on a typical Dell Networking OS .................................................................................................... 684
Decapsulation of ERPM packets at the Destination IP/ Analyzer.....................................................................684
Port Monitoring on VLT................................................................................................................................................ 685
VLT Non-fail over Scenario.....................................................................................................................................685
VLT Fail-over Scenario............................................................................................................................................686
RPM over VLT Scenarios........................................................................................................................................686
40 Private VLANs (PVLAN)..........................................................................................................................688
Private VLAN Concepts................................................................................................................................................688
Using the Private VLAN Commands...........................................................................................................................689
Conguration Task List................................................................................................................................................. 690
Creating PVLAN ports............................................................................................................................................ 690
Creating a Primary VLAN........................................................................................................................................ 691
Creating a Community VLAN.................................................................................................................................692
Creating an Isolated VLAN..................................................................................................................................... 692
Private VLAN Conguration Example.........................................................................................................................694
Inspecting the Private VLAN Conguration...............................................................................................................695
41 Per-VLAN Spanning Tree Plus (PVST+).................................................................................................... 697
Protocol Overview......................................................................................................................................................... 697
Implementation Information......................................................................................................................................... 698
Congure Per-VLAN Spanning Tree Plus................................................................................................................... 698
22
Contents