Reference Guide

Table Of Contents
250 | interface tunnel Dell PowerConnect ArubaOS 6.0 Command Line Interface | Reference Guide
Syntax
Usage Guidelines
You can configure a GRE tunnel between an Dell controller and another GRE-capable device. Layer-3 GRE
Parameter Description Range Default
tunnel Identification number for the tunnel. 1-2147483647
description String that describes this interface. Tunnel
Interface
inter-tunnel-
flooding
Enables inter-tunnel flooding. enabled
ip address IP address of the tunnel. This represents the entrance to the
tunnel.
——
mtu MTU size for the interface. 1500
no Negates any configured parameter.
shutdown Causes a hard shutdown of the interface.
trusted Set this interface and range of VLANs to be trusted. VLANs
not included in the trusted range of VLANs will be, by default,
untrusted.
Trusted ports and VLANs are typically connected to internal
controlled networks, while untrusted ports connect to third-
party APs, public areas, or other networks to which access
controls should be applied. When Dell APs are attached
directly to the controller, set the port to be trusted.
—disabled
tunnel Configures tunneling. mode gre ip
checksum Enables end-to-end checksum of packets that pass through
the tunnel.
—disabled
destination Destination IP address for the tunnel endpoint.
keepalive Enables sending of periodic keepalive frames on the tunnel
to determine the tunnel status (up or down). You can
optionally set the interval at which keepalive frames are
sent, and the number of times the frames are resent before a
tunnel is considered to be down.
—disabled
<interval> (Optional) Number of seconds at which keepalive frames are
sent.
1-86400 10 seconds
<retries> (Optional) Number of consecutive times that the keepalives
fail before the tunnel is considered to be down.
0-1024 3
key Key used to authenticate packets on the tunnel. 0-4294967295
mode gre
Specifies generic route encapsulation (GRE) type. You
configure either a 16-bit protocol number (for Layer-2
tunnels) or ip (for a Layer-3 tunnel). The 16-bit protocol
number uniquely identifies a Layer-2 tunnel. The controllers
at both endpoints of the tunnel must be configured with the
same protocol number.
——
source
The local endpoint of the tunnel on the controller. This can
be one of the following:
z specified IP address
z the loopback interface configured on the controller
z specified VLAN
——
vlan
VLANs to be included in this tunnel.
——