Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

close
keyboard_arrow_left
Junos CLI Reference
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

ethernet-switching

date_range 19-Nov-23

Syntax (EX Series and QFX Series)

content_copy zoom_out_map
ethernet-switching {
     filter input filter-name; 
     filter output filter-name; 
     native-vlan-id vlan-id;
     port-mode mode;
    reflective-relay;
     vlan {
         members [ (all | names | vlan-ids) ];
    }
}

Syntax (SRX Series)

content_copy zoom_out_map
ethernet-switching {
    block-non-ip-all;
    bpdu-vlan-flooding;
    bypass-non-ip-unicast;
    no-packet-flooding {
        no-trace-route;
    }
}

Hierarchy Level

For EX Series and QFX Series switches:

content_copy zoom_out_map
[edit interfaces ge-chassis/slot/port unit logical-unit-number] family

For SRX Series Firewalls:

content_copy zoom_out_map
[edit security flow]

Description

Configure Ethernet switching protocol family information for the logical interface. Changes default Layer 2 forwarding behavior.

The remaining statements are explained separately. See CLI Explorer.

Default

You must configure a logical interface to be able to use the physical device.

Options

  • block-non-ip-all—Block all Layer 2 non-IP and non-ARP traffic, including multicast and broadcast traffic.

  • bpdu-vlan-flooding—Set 802.1D bridge protocol data unit (BPDU) flooding based on VLAN on which BPDU originate. The default behavior is to receive BPDUs and then flood BPDUs out to all active ports on the SRX Series Firewalls.

  • bypass-non-ip-unicast—Allow all Layer 2 non-IP traffic to pass through the device.

  • no-packet-flooding—Stop IP flooding and send ARP or ICMP requests to discover the destination MAC address for a unicast packet.

    Note:

    On all SRX Series Firewalls in transparent mode, packet flooding is enabled by default. If you have manually disabled packet flooding with the set security flow ethernet-switching no-packet-flooding command, then multicast packets such as OSPFv3 hello packets are dropped.

    • no-trace-route—Do not send ICMP requests to discover the destination MAC address for a unicast packet. Only ARP requests are sent. This option only allows the device to discover the destination MAC address for a unicast packet if the destination IP address is in the same subnetwork as the ingress IP address.

Note:

The block-non-ip-all and bypass-non-ip-unicast options cannot be configured at the same time.

Required Privilege Level

interface—To view this statement in the configuration.interface-control—To add this statement to the configuration.

security—To view this in the configuration.

security-control—To add this to the configuration.

Release Information

Statement introduced in Junos OS Release 9.5.

external-footer-nav