Reference Guide

Table Of Contents
Dell PowerConnect W-Series ArubaOS 6.1 CLI | Reference Guide interface port-channel | 285
Usage Guidelines
A port channel allows you to aggregate ports on a controller. You can configure a maximum of 8 port channels per
supported controller with a maximum of 8 interfaces per port channel.
Note the following when setting up a port channel between a controller and a Cisco switch (such as a Catalyst
6500 Series Switch):
There must be no negotiation of the link parameters.
The port-channel mode on the Cisco switch must be “on”.
Example
The following command configures a port channel:
native
Specifies the native VLAN for the trunk mode interface. Frames on
the native VLAN are not 802.1q tagged.
——
trusted
Set this interface and range of VLANs to be trusted. VLANs not
included in the trusted range of VLANs are, by default, untrusted.
Trusted ports and VLANs are typically connected to internal
controlled networks, while untrusted ports connect to third-party
APs, public areas, or other networks to which access controls
should be applied. When Dell APs are attached directly to the
controller, set the port to be trusted.
disabled
vlan <word> Sets the supplied range of VLANs as trusted. All remaining become
untrusted automatically.
For example, if you set a VLAN range as:
vlan 1-10, 100-300, 301, 305-400, 501-4094
Then all VLANs in this range are trusted and all others become
untrusted by default. You can also use the no trusted vlan command
to explicitly make an individual VLAN untrusted. The no trusted vlan
command is additive and adds given vlans to the existing untrusted
vlan set.
However, if you execute the trusted vlan <word> command, it
overrides any earlier untrusted VLANs or a range of untrusted
VLANs and creates a new set of trusted VLANs.
NOTE: A port supports a user VLAN range from 1-4094. If you want
to set all VLANs (1-4094) on a port as untrusted then mark the port
itself as untrusted. By default the port and all its associated VLANs
are trusted.
1-4094
xsec
Enables and configures the Extreme Security (xSec) protocol.
NOTE: You must purchase and install the xSec software module
license in the controller.
——
point-to-point
MAC address of the controller that is the xSec tunnel termination
point, and the 16-byte shared key used to authenticate the
controllers to each other. The key must be the same on both
controllers.
——
allowed vlan
VLANs that are allowed on the xSec tunnel.
mtu
(Optional) MTU size for the xSec tunnel.
vlan
xSec VLAN ID. For controller-to-controller communications, both
controllers must belong to the same VLAN.
1-4094
Parameter Description Range Default