Release Notes

413 | interface port-channel Dell Networking W-Series ArubaOS 6.4.x| Reference Guide
Parameter Description Range Default
access vlan
Sets the interface as an access port for the specified
VLAN. The interface carries traffic only for the specified
VLAN.
mode
Sets the mode of the interface to access or trunk mode
only.
trunk
Sets the interface as a trunk port for the specified VLANs.
A trunk port carries traffic for multiple VLANs using
802.1q tagging to mark frames for specific VLANs. You
can include all VLANs configured on the controller, or add
or remove specified VLANs.
native
Specifies the native VLAN for the trunk mode interface.
Frames on the native VLAN are not 802.1q tagged.
trusted
Set this interface and range of VLANs to be trusted.
VLANs not included in the trusted range of VLANs will be,
by default, untrusted.
Trusted ports and VLANs are typically connected to
internal controlled networks, while untrusted ports
connect to third-party APs, public areas, or other
networks to which access controls should be applied.
When Dell APs are attached directly to the controller, set
the port to be trusted.
disabled
vlan <word>
Sets the supplied range of VLANs as trusted. All
remaining become untrusted automatically.
For example, if you set a VLAN range as:
vlan 1-10, 100-300, 301, 305-400, 501-4094
Then all VLANs in this range are trusted and all others
become untrusted by default. You can also use the no
trusted vlan command to explicitly make an individual
VLAN untrusted. The no trusted vlan command is additive
and adds given vlans to the existing untrusted vlan set.
However, if you execute the trusted vlan
<word>command, it overrides any earlier untrusted
VLANs or a range of untrusted VLANs and creates a new
set of trusted VLANs.
NOTE: A port supports a user VLAN range from 1-4094. If
you want to set all VLANs (1-4094) on a port as untrusted
then mark the port itself as untrusted. By default the port
and all its associated VLANs are trusted.
1-4094
xsec
Enables and configures the Extreme Security (xSec)
protocol.
NOTE: You must purchase and install the xSec software
module license in the controller.
point-to-point
MAC address of the controller that is the xSec tunnel
termination point, and the 16-byte shared key used to
authenticate the controllers to each other. The key must
be the same on both controllers.
allowed vlan
VLANs that are allowed on the xSec tunnel.
mtu
(Optional) MTU size for the xSec tunnel.
vlan
xSec VLAN ID. For controller-to-controller
communications, both controllers must belong to the
same VLAN.
1-4094