3.1.1 Receive-side flow detection mode
The Switch provides receiving-side flow detection modes for network configuration and an operation mode. The receiving-side flow detection modes determine the distribution pattern of filter entries and QoS entries for the receiving-side interface. For details about how to allocate entries, see Vol.1" "3 Capacity Limits in the Configuration Guide and select the appropriate setting for the usage.
Use the flow detection mode command to specify the receiving-side flow detection mode. The selected receiving-side flow detection mode applies to both filters and QoS. To change the receive-side flow detection mode, you must remove all of the following commands configured on the receiving and sending interfaces and all of ip verify source commands in DHCP snooping.
-
mac access-group
-
ip access-group
-
ipv6 traffic-filter
-
mac qos-flow-group
-
ip qos-flow-group
-
ipv6 qos-flow-group
In addition, when changing the receive-side flow detection mode to the receive-side flow detection mode that does not support policy-based routing, you must delete the following commands in addition to these commands.
-
policy-list
-
policy-list default-aging-interval
-
policy-list default-init-interval
When IP not set VLAN suppression mode is set in the receive-side flow detection mode, ip address of the configuration command is not set in VLAN so that IP packets (including ARP) are not forwarded to IPv6 packets in VLAN where the configuration command ipv6 enable is not set. However, if any of the following functions are used, IP packets that must be controlled by the corresponding function are forwarded to CPU.
-
VXLAN PMTU function
-
IGMP snooping
-
MLD snooping
-
Layer 2 Authentication
-
DHCP snooping (However, dynamic ARP checking cannot be used with IP not set VLAN suppression.)
Note that if you do not specify the receiving-side flow detection mode, layer3-2 is set as the default mode.
The following table describes the relationship between the receiving-side flow detection modes and flow operations.
Receiving-side flow Detection mode name |
Purpose |
Flow operations |
---|---|---|
layer3-1 |
|
Frames are detected based on the MAC header, which contains a MAC address and Ethernet type. For IPv4 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. |
layer3-2 |
|
For IPv4 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. |
layer3-6 |
|
For IPv4 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. For IPv6 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. |
layer3-dhcp-1 |
|
For IPv4 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. |
layer3-mirror-1 |
|
Frames are detected based on the MAC header, which contains a MAC address and Ethernet type. For IPv4 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. |
layer3-mirror-2 |
|
For IPv4 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. |
layer3-mirror-3 |
|
Frames are detected based on the MAC header, which contains a MAC address and Ethernet type. For IPv4 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. |
layer3-mirror-4 |
|
For IPv4 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. For IPv6 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. |
layer3-mirror-5 |
|
Frames are detected based on the MAC header, which contains a MAC address and Ethernet type. For IPv4 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. For IPv6 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. |
layer3-suppress-1 |
|
Frames are detected based on the MAC header, which contains a MAC address and Ethernet type. For IPv4 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. |
layer3-suppress-2 |
|
For IPv4 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. For IPv6 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. |
layer3-suppress-dhcp-1 |
|
For IPv4 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. |
layer3-suppress-mirror-1 |
|
Frames are detected based on the MAC header, which contains a MAC address and Ethernet type. For IPv4 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. |
layer3-suppress-mirror-2 |
|
For IPv4 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. For IPv6 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. |
custom |
I want to select the following functions, assign functions to each entry block in the hardware table, and set capacity limits flexibly
|
Frames are detected based on the MAC header, which contains a MAC address and Ethernet type. For IPv4 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. For IPv6 packets, frames are detected based on the IP header, TCP/UDP header, and ICMP header. |