Users Guide

Table Of Contents
Conguring a Static Rendezvous Point...................................................................................................................... 624
Overriding Bootstrap Router Updates.................................................................................................................. 625
Conguring a Designated Router.................................................................................................................................625
Creating Multicast Boundaries and Domains..............................................................................................................627
36 PIM Source-Specic Mode (PIM-SSM).................................................................................................. 628
Implementation Information..........................................................................................................................................628
Important Points to Remember............................................................................................................................. 628
Congure PIM-SSM......................................................................................................................................................629
Related Conguration Tasks...................................................................................................................................629
Enabling PIM-SSM........................................................................................................................................................ 629
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................629
Conguring PIM-SSM with IGMPv2.....................................................................................................................630
Electing an RP using the BSR Mechanism..................................................................................................................631
Enabling RP to Server Specic Multicast Groups................................................................................................631
37 Port Monitoring....................................................................................................................................... 633
Important Points to Remember................................................................................................................................... 633
Port Monitoring..............................................................................................................................................................634
Conguring Port Monitoring........................................................................................................................................ 636
Conguring Monitor Multicast Queue.........................................................................................................................637
Enabling Flow-Based Monitoring.................................................................................................................................638
Remote Port Mirroring.................................................................................................................................................. 639
Remote Port Mirroring Example............................................................................................................................ 639
Conguring Remote Port Mirroring.......................................................................................................................640
Displaying Remote-Port Mirroring Congurations...............................................................................................642
Conguring the Sample Remote Port Mirroring.................................................................................................. 642
Encapsulated Remote Port Monitoring.......................................................................................................................645
ERPM Behavior on a typical Dell EMC Networking OS ...........................................................................................647
Decapsulation of ERPM packets at the Destination IP/ Analyzer..................................................................... 647
Port Monitoring on VLT................................................................................................................................................ 648
VLT Non-fail over Scenario.....................................................................................................................................648
VLT Fail-over Scenario............................................................................................................................................649
RPM over VLT Scenarios........................................................................................................................................649
38 Private VLANs (PVLAN)...........................................................................................................................651
Private VLAN Concepts................................................................................................................................................ 651
Using the Private VLAN Commands...........................................................................................................................652
Conguration Task List..................................................................................................................................................653
Creating PVLAN ports............................................................................................................................................ 653
Creating a Primary VLAN....................................................................................................................................... 654
Creating a Community VLAN.................................................................................................................................655
Creating an Isolated VLAN..................................................................................................................................... 655
Private VLAN Conguration Example......................................................................................................................... 657
Inspecting the Private VLAN Conguration...............................................................................................................658
Contents
21