Web Management Guide-R07
Table Of Contents
- How to Use This Guide
- Contents
- Figures
- Tables
- Getting Started
- Introduction
- Key Features
- Description of Software Features
- Configuration Backup and Restore
- Authentication
- Access Control Lists
- Port Configuration
- Rate Limiting
- Port Mirroring
- Port Trunking
- Storm Control
- Static MAC Addresses
- IP Address Filtering
- IEEE 802.1D Bridge
- Store-and-Forward Switching
- Spanning Tree Algorithm
- Virtual LANs
- IEEE 802.1Q Tunneling (QinQ)
- Traffic Prioritization
- Quality of Service
- IP Routing
- Address Resolution Protocol
- Multicast Filtering
- Link Layer Discovery Protocol
- System Defaults
- Introduction
- Web Configuration
- Using the Web Interface
- Basic Management Tasks
- Displaying System Information
- Displaying Hardware/Software Versions
- Configuring Support for Jumbo Frames
- Displaying Bridge Extension Capabilities
- Managing System Files
- Setting the System Clock
- Configuring the Console Port
- Configuring Telnet Settings
- Displaying CPU Utilization
- Configuring CPU Guard
- Displaying Memory Utilization
- Resetting the System
- Using Cloud Management
- Interface Configuration
- VLAN Configuration
- Address Table Settings
- Spanning Tree Algorithm
- Congestion Control
- Class of Service
- Quality of Service
- VoIP Traffic Configuration
- Security Measures
- AAA (Authentication, Authorization and Accounting)
- Configuring User Accounts
- Web Authentication
- Network Access (MAC Address Authentication)
- Configuring HTTPS
- Configuring the Secure Shell
- Access Control Lists
- Filtering IP Addresses for Management Access
- Configuring Port Security
- Configuring 802.1X Port Authentication
- DoS Protection
- DHCP Snooping
- IPv4 Source Guard
- ARP Inspection
- Basic Administration Protocols
- Configuring Event Logging
- Link Layer Discovery Protocol
- Power over Ethernet
- Simple Network Management Protocol
- Configuring Global Settings for SNMP
- Setting the Local Engine ID
- Specifying a Remote Engine ID
- Setting SNMPv3 Views
- Configuring SNMPv3 Groups
- Setting Community Access Strings
- Configuring Local SNMPv3 Users
- Configuring Remote SNMPv3 Users
- Specifying Trap Managers
- Creating SNMP Notification Logs
- Showing SNMP Statistics
- Remote Monitoring
- Switch Clustering
- Setting a Time Range
- LBD Configuration
- Smart Pair Configuration
- Multicast Filtering
- Overview
- Layer 2 IGMP (Snooping and Query for IPv4)
- Configuring IGMP Snooping and Query Parameters
- Specifying Static Interfaces for a Multicast Router
- Assigning Interfaces to Multicast Services
- Setting IGMP Snooping Status per Interface
- Filtering IGMP Query Packets and Multicast Data
- Displaying Multicast Groups Discovered by IGMP Snooping
- Displaying IGMP Snooping Statistics
- Filtering and Throttling IGMP Groups
- MLD Snooping (Snooping and Query for IPv6)
- Filtering and Throttling MLD Groups
- Filtering MLD Query Packets on an Interface
- IP Tools
- IP Configuration
- General IP Routing
- Unicast Routing
- Overview
- Configuring the Routing Information Protocol
- Configuring General Protocol Settings
- Clearing Entries from the Routing Table
- Specifying Network Interfaces
- Specifying Passive Interfaces
- Specifying Static Neighbors
- Configuring Route Redistribution
- Specifying an Administrative Distance
- Configuring Network Interfaces for RIP
- Displaying RIP Interface Settings
- Displaying Peer Router Information
- Resetting RIP Statistics
- IP Services
- Appendices
- Glossary
Chapter 16
| IP Configuration
Setting the Switch’s IP Address (IP Version 6)
– 484 –
Disabling this parameter does not disable IPv6 for an interface that has been
explicitly configured with an IPv6 address.
◆ MTU – Sets the size of the maximum transmission unit (MTU) for IPv6 packets
sent on an interface. (Range: 1280-65535 bytes; Default: 1500 bytes)
■
The maximum value set in this field cannot exceed the MTU of the physical
interface, which is currently fixed at 1500 bytes.
■
If a non-default value is configured, an MTU option is included in the router
advertisements sent from this device. This option is provided to ensure that
all nodes on a link use the same MTU value in cases where the link MTU is
not otherwise well known.
■
IPv6 routers do not fragment IPv6 packets forwarded from other routers.
However, traffic originating from an end-station connected to an IPv6
router may be fragmented.
■
All devices on the same physical medium must use the same MTU in order
to operate correctly.
■
IPv6 must be enabled on an interface before the MTU can be set. If an IPv6
address has not been assigned to the switch, “N/A” is displayed in the MTU
field.
◆ ND DAD Attempts – The number of consecutive neighbor solicitation
messages sent on an interface during duplicate address detection.
(Range: 0-600, Default: 3)
■
Configuring a value of 0 disables duplicate address detection.
■
Duplicate address detection determines if a new unicast IPv6 address
already exists on the network before it is assigned to an interface.
■
Duplicate address detection is stopped on any interface that has been
suspended (see “Configuring VLAN Groups” on page 153). While an
interface is suspended, all unicast IPv6 addresses assigned to that interface
are placed in a “pending” state. Duplicate address detection is
automatically restarted when the interface is administratively re-activated.
■
An interface that is re-activated restarts duplicate address detection for all
unicast IPv6 addresses on the interface. While duplicate address detection
is performed on the interface’s link-local address, the other IPv6 addresses
remain in a “tentative” state. If no duplicate link-local address is found,
duplicate address detection is started for the remaining IPv6 addresses.
■
If a duplicate address is detected, it is set to “duplicate” state, and a warning
message is sent to the console. If a duplicate link-local address is detected,
IPv6 processes are disabled on the interface. If a duplicate global unicast
address is detected, it is not used. All configuration commands associated
with a duplicate address remain configured while the address is in
“duplicate” state.
■
If the link-local address for an interface is changed, duplicate address
detection is performed on the new link-local address, but not for any of the
IPv6 global unicast addresses already associated with the interface.