Dell 210-AEDM User Manual

Dell Configuration Guide for the S3048–ON System
9.9(0.0)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2015 - 09
Rev. A00
Contents
1 About this Guide................................................................................................. 34
Audience..............................................................................................................................................34
Conventions........................................................................................................................................ 34
Related Documents............................................................................................................................ 34
2 Configuration Fundamentals........................................................................... 35
Accessing the Command Line............................................................................................................35
CLI Modes............................................................................................................................................35
Navigating CLI Modes................................................................................................................... 37
The do Command...............................................................................................................................40
Undoing Commands...........................................................................................................................41
Obtaining Help.................................................................................................................................... 41
Entering and Editing Commands....................................................................................................... 42
Command History...............................................................................................................................43
Filtering show Command Outputs.....................................................................................................43
Multiple Users in Configuration Mode............................................................................................... 45
3 Getting Started....................................................................................................46
Console Access...................................................................................................................................46
Serial Console................................................................................................................................46
Accessing the CLI Interface and Running Scripts Using SSH............................................................ 47
Entering CLI commands Using an SSH Connection................................................................... 48
Executing Local CLI Scripts Using an SSH Connection...............................................................48
Default Configuration......................................................................................................................... 49
Configuring a Host Name...................................................................................................................49
Accessing the System Remotely........................................................................................................ 49
Accessing the System Remotely...................................................................................................49
Configure the Management Port IP Address............................................................................... 49
Configure a Management Route..................................................................................................50
Configuring a Username and Password.......................................................................................50
Configuring the Enable Password......................................................................................................50
Configuration File Management......................................................................................................... 51
Copy Files to and from the System...............................................................................................51
Mounting an NFS File System....................................................................................................... 52
Save the Running-Configuration..................................................................................................53
Configure the Overload Bit for a Startup Scenario......................................................................54
Viewing Files.................................................................................................................................. 54
Compressing Configuration Files................................................................................................. 55
3
Managing the File System...................................................................................................................58
Enabling Software Features on Devices Using a Command Option................................................ 59
View Command History..................................................................................................................... 60
Upgrading Dell Networking OS..........................................................................................................60
Using Hashes to Verify Software Images Before Installation............................................................60
Using HTTP for File Transfers..............................................................................................................61
4 Management....................................................................................................... 63
Configuring Privilege Levels............................................................................................................... 63
Creating a Custom Privilege Level................................................................................................63
Removing a Command from EXEC Mode................................................................................... 63
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................64
Allowing Access to CONFIGURATION Mode Commands..........................................................64
Allowing Access to Different Modes............................................................................................ 64
Applying a Privilege Level to a Username.................................................................................... 66
Applying a Privilege Level to a Terminal Line...............................................................................66
Configuring Logging...........................................................................................................................66
Audit and Security Logs.................................................................................................................67
Configuring Logging Format ...................................................................................................... 69
Display the Logging Buffer and the Logging Configuration....................................................... 69
Setting Up a Secure Connection to a Syslog Server....................................................................70
Sending System Messages to a Syslog Server.............................................................................. 71
Track Login Activity..............................................................................................................................71
Restrictions for Tracking Login Activity.........................................................................................71
Configuring Login Activity Tracking..............................................................................................71
Display Login Statistics.................................................................................................................. 72
Limit Concurrent Login Sessions........................................................................................................73
Restrictions for Limiting the Number of Concurrent Sessions....................................................73
Configuring Concurrent Session Limit......................................................................................... 73
Enabling the System to Clear Existing Sessions...........................................................................74
Log Messages in the Internal Buffer................................................................................................... 74
Configuration Task List for System Log Management.................................................................75
Disabling System Logging...................................................................................................................75
Sending System Messages to a Syslog Server....................................................................................75
Configuring a UNIX System as a Syslog Server............................................................................ 75
Changing System Logging Settings....................................................................................................76
Display the Logging Buffer and the Logging Configuration..............................................................77
Configuring a UNIX Logging Facility Level......................................................................................... 77
Synchronizing Log Messages..............................................................................................................79
Enabling Timestamp on Syslog Messages..........................................................................................79
File Transfer Services.......................................................................................................................... 80
Configuration Task List for File Transfer Services........................................................................80
4
Enabling the FTP Server................................................................................................................80
Configuring FTP Server Parameters............................................................................................. 80
Configuring FTP Client Parameters.............................................................................................. 81
Terminal Lines..................................................................................................................................... 82
Denying and Permitting Access to a Terminal Line.....................................................................82
Configuring Login Authentication for Terminal Lines................................................................. 83
Setting Timeout for EXEC Privilege Mode......................................................................................... 84
Using Telnet to get to Another Network Device............................................................................... 85
Lock CONFIGURATION Mode............................................................................................................85
Viewing the Configuration Lock Status........................................................................................86
5 802.1ag................................................................................................................. 87
Ethernet CFM.......................................................................................................................................87
Maintenance Domains........................................................................................................................88
Maintenance Points............................................................................................................................ 88
Maintenance End Points.....................................................................................................................89
Implementation Information..............................................................................................................90
Configuring the CFM.......................................................................................................................... 90
Related Configuration Tasks.........................................................................................................90
Enable Ethernet CFM.......................................................................................................................... 90
Creating a Maintenance Domain....................................................................................................... 90
Creating a Maintenance Association.................................................................................................. 91
Create Maintenance Points.................................................................................................................91
Creating a Maintenance End Point............................................................................................... 91
Creating a Maintenance Intermediate Point................................................................................ 92
Displaying the MP Databases........................................................................................................93
Continuity Check Messages............................................................................................................... 93
Enabling CCM................................................................................................................................94
Enabling Cross-Checking............................................................................................................. 95
Sending Loopback Messages and Responses....................................................................................95
Sending Linktrace Messages and Responses.....................................................................................95
Caching Link Trace....................................................................................................................... 96
Enabling CFM SNMP Traps................................................................................................................. 97
Displaying Ethernet CFM Statistics.....................................................................................................98
6 802.1X.................................................................................................................100
Port-Authentication Process.............................................................................................................101
EAP over RADIUS.........................................................................................................................103
Configuring 802.1X........................................................................................................................... 103
Related Configuration Tasks.......................................................................................................103
Important Points to Remember....................................................................................................... 104
Enabling 802.1X.................................................................................................................................104
5
Configuring Request Identity Re-Transmissions.............................................................................106
Configuring a Quiet Period after a Failed Authentication......................................................... 106
Forcibly Authorizing or Unauthorizing a Port.................................................................................. 107
Re-Authenticating a Port..................................................................................................................108
Configuring Timeouts.......................................................................................................................109
Configuring Dynamic VLAN Assignment with Port Authentication................................................ 110
Guest and Authentication-Fail VLANs...............................................................................................111
Configuring a Guest VLAN...........................................................................................................112
Configuring an Authentication-Fail VLAN.................................................................................. 112
7 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)......................................................................................................114
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..........................................114
Guidelines for Configuring ACL VLAN Groups.................................................................................115
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.........................116
Configuring ACL VLAN Groups................................................................................................... 116
Configuring FP Blocks for VLAN Parameters..............................................................................117
Viewing CAM Usage...........................................................................................................................117
Allocating FP Blocks for VLAN Processes.........................................................................................119
8 Access Control Lists (ACLs)............................................................................ 120
IP Access Control Lists (ACLs).......................................................................................................... 120
CAM Usage...................................................................................................................................121
Implementing ACLs on Dell Networking OS..............................................................................122
Important Points to Remember........................................................................................................123
Configuration Task List for Route Maps..................................................................................... 124
Configuring Match Routes..........................................................................................................126
Configuring Set Conditions.........................................................................................................127
Configure a Route Map for Route Redistribution...................................................................... 128
Configure a Route Map for Route Tagging................................................................................129
Continue Clause..........................................................................................................................129
IP Fragment Handling....................................................................................................................... 130
IP Fragments ACL Examples....................................................................................................... 130
Layer 4 ACL Rules Examples........................................................................................................131
Configure a Standard IP ACL............................................................................................................ 132
Configuring a Standard IP ACL Filter.......................................................................................... 133
Configure an Extended IP ACL......................................................................................................... 134
Configuring Filters with a Sequence Number............................................................................134
Configuring Filters Without a Sequence Number......................................................................135
Configure Layer 2 and Layer 3 ACLs................................................................................................ 136
Assign an IP ACL to an Interface.......................................................................................................137
Applying an IP ACL............................................................................................................................ 137
6
Counting ACL Hits.......................................................................................................................138
Configure Ingress ACLs.....................................................................................................................138
Configure Egress ACLs......................................................................................................................139
Applying Egress Layer 3 ACLs (Control-Plane).......................................................................... 140
IP Prefix Lists......................................................................................................................................140
Implementation Information.......................................................................................................141
Configuration Task List for Prefix Lists........................................................................................141
ACL Resequencing............................................................................................................................ 145
Resequencing an ACL or Prefix List............................................................................................145
Route Maps........................................................................................................................................147
Implementation Information.......................................................................................................147
Logging of ACL Processes................................................................................................................ 147
Guidelines for Configuring ACL Logging................................................................................... 148
Configuring ACL Logging........................................................................................................... 149
Flow-Based Monitoring Support for ACLs.......................................................................................149
Behavior of Flow-Based Monitoring...........................................................................................150
Enabling Flow-Based Monitoring................................................................................................151
9 Bidirectional Forwarding Detection (BFD)...................................................153
How BFD Works................................................................................................................................ 153
BFD Packet Format......................................................................................................................154
BFD Sessions................................................................................................................................156
BFD Three-Way Handshake........................................................................................................156
Session State Changes.................................................................................................................157
Important Points to Remember........................................................................................................158
Configure BFD...................................................................................................................................158
Configure BFD for Physical Ports............................................................................................... 159
Configure BFD for Static Routes.................................................................................................162
Configure BFD for OSPF............................................................................................................. 164
Configure BFD for OSPFv3..........................................................................................................167
Configure BFD for IS-IS...............................................................................................................168
Configure BFD for BGP................................................................................................................171
Configure BFD for VRRP..............................................................................................................177
Configuring Protocol Liveness................................................................................................... 180
Troubleshooting BFD...................................................................................................................181
10 Border Gateway Protocol IPv4 (BGPv4).....................................................183
Autonomous Systems (AS)................................................................................................................183
Sessions and Peers............................................................................................................................185
Establish a Session.......................................................................................................................186
Route Reflectors................................................................................................................................186
BGP Attributes................................................................................................................................... 187
7
Best Path Selection Criteria........................................................................................................ 188
Weight..........................................................................................................................................190
Local Preference......................................................................................................................... 190
Multi-Exit Discriminators (MEDs)................................................................................................ 191
Origin........................................................................................................................................... 192
AS Path.........................................................................................................................................193
Next Hop......................................................................................................................................193
Multiprotocol BGP............................................................................................................................ 194
Implement BGP with Dell Networking OS.......................................................................................194
Additional Path (Add-Path) Support........................................................................................... 194
Advertise IGP Cost as MED for Redistributed Routes................................................................ 194
Ignore Router-ID in Best-Path Calculation................................................................................195
Four-Byte AS Numbers............................................................................................................... 195
AS4 Number Representation...................................................................................................... 196
AS Number Migration.................................................................................................................. 197
BGP4 Management Information Base (MIB).............................................................................. 199
Important Points to Remember..................................................................................................199
Configuration Information...............................................................................................................200
BGP Configuration........................................................................................................................... 200
Enabling BGP...............................................................................................................................201
Configuring AS4 Number Representations............................................................................... 205
Configuring Peer Groups............................................................................................................207
Configuring BGP Fast Fall-Over.................................................................................................209
Configuring Passive Peering........................................................................................................211
Maintaining Existing AS Numbers During an AS Migration........................................................ 212
Allowing an AS Number to Appear in its Own AS Path..............................................................213
Enabling Graceful Restart............................................................................................................214
Enabling Neighbor Graceful Restart........................................................................................... 215
Filtering on an AS-Path Attribute................................................................................................ 215
Regular Expressions as Filters......................................................................................................217
Redistributing Routes.................................................................................................................. 218
Enabling Additional Paths............................................................................................................219
Configuring IP Community Lists.................................................................................................219
Configuring an IP Extended Community List.............................................................................221
Filtering Routes with Community Lists...................................................................................... 222
Manipulating the COMMUNITY Attribute...................................................................................222
Changing MED Attributes........................................................................................................... 224
Changing the LOCAL_PREFERENCE Attribute.......................................................................... 224
Changing the NEXT_HOP Attribute........................................................................................... 225
Changing the WEIGHT Attribute................................................................................................ 226
Enabling Multipath...................................................................................................................... 226
Filtering BGP Routes................................................................................................................... 226
8
Filtering BGP Routes Using Route Maps.................................................................................... 228
Filtering BGP Routes Using AS-PATH Information....................................................................229
Configuring BGP Route Reflectors............................................................................................ 229
Aggregating Routes.................................................................................................................... 230
Configuring BGP Confederations...............................................................................................231
Enabling Route Flap Dampening................................................................................................ 231
Changing BGP Timers.................................................................................................................234
Enabling BGP Neighbor Soft-Reconfiguration..........................................................................234
Route Map Continue...................................................................................................................236
Enabling MBGP Configurations........................................................................................................236
BGP Regular Expression Optimization.............................................................................................237
Debugging BGP.................................................................................................................................237
Storing Last and Bad PDUs......................................................................................................... 238
Capturing PDUs...........................................................................................................................239
PDU Counters.............................................................................................................................240
Sample Configurations.....................................................................................................................240
11 Content Addressable Memory (CAM)......................................................... 247
CAM Allocation................................................................................................................................. 247
Test CAM Usage................................................................................................................................249
View CAM-ACL Settings................................................................................................................... 249
View CAM Usage............................................................................................................................... 251
CAM Optimization............................................................................................................................ 252
Troubleshoot CAM Profiling.............................................................................................................252
CAM Profile Mismatches.............................................................................................................252
QoS CAM Region Limitation.......................................................................................................252
12 Control Plane Policing (CoPP).....................................................................254
Configure Control Plane Policing.................................................................................................... 255
Configuring CoPP for Protocols................................................................................................ 256
Configuring CoPP for CPU Queues...........................................................................................258
CoPP for OSPFv3 Packets...........................................................................................................259
Configuring CoPP for OSPFv3....................................................................................................263
Displaying CoPP Configuration .................................................................................................264
13 Dynamic Host Configuration Protocol (DHCP)........................................266
DHCP Packet Format and Options.................................................................................................. 266
Assign an IP Address using DHCP....................................................................................................268
Implementation Information............................................................................................................269
Configure the System to be a DHCP Server....................................................................................269
Configuring the Server for Automatic Address Allocation........................................................ 270
Specifying a Default Gateway.....................................................................................................272
9
Configure a Method of Hostname Resolution...........................................................................272
Using DNS for Address Resolution............................................................................................. 272
Using NetBIOS WINS for Address Resolution............................................................................ 272
Creating Manual Binding Entries................................................................................................ 272
Debugging the DHCP Server...................................................................................................... 273
Using DHCP Clear Commands...................................................................................................273
Configure the System to be a Relay Agent...................................................................................... 273
Configure the System to be a DHCP Client.....................................................................................275
Configuring the DHCP Client System........................................................................................ 276
DHCP Client on a Management Interface..................................................................................277
DHCP Client Operation with Other Features.............................................................................278
Configure the System for User Port Stacking (Option 230)............................................................279
Configure Secure DHCP...................................................................................................................279
Option 82.................................................................................................................................... 279
DHCP Snooping..........................................................................................................................280
Drop DHCP Packets on Snooped VLANs Only..........................................................................283
Dynamic ARP Inspection............................................................................................................ 284
Configuring Dynamic ARP Inspection........................................................................................285
Source Address Validation................................................................................................................286
Enabling IP Source Address Validation...................................................................................... 286
DHCP MAC Source Address Validation......................................................................................287
Enabling IP+MAC Source Address Validation............................................................................ 287
Viewing the Number of SAV Dropped Packets......................................................................... 288
Clearing the Number of SAV Dropped Packets.........................................................................288
14 Equal Cost Multi-Path (ECMP).....................................................................289
ECMP for Flow-Based Affinity..........................................................................................................289
Configuring the Hash Algorithm................................................................................................ 289
Enabling Deterministic ECMP Next Hop....................................................................................289
Configuring the Hash Algorithm Seed.......................................................................................290
Link Bundle Monitoring.................................................................................................................... 290
Managing ECMP Group Paths.....................................................................................................291
Creating an ECMP Group Bundle............................................................................................... 291
Modifying the ECMP Group Threshold......................................................................................292
15 FIPS Cryptography......................................................................................... 293
Configuration Tasks..........................................................................................................................293
Preparing the System........................................................................................................................293
Enabling FIPS Mode..........................................................................................................................294
Generating Host-Keys...................................................................................................................... 294
Monitoring FIPS Mode Status........................................................................................................... 295
Disabling FIPS Mode......................................................................................................................... 298
10
16 Force10 Resilient Ring Protocol (FRRP).....................................................299
Protocol Overview............................................................................................................................299
Ring Status.................................................................................................................................. 300
Multiple FRRP Rings.....................................................................................................................301
Important FRRP Points................................................................................................................302
Important FRRP Concepts..........................................................................................................303
Implementing FRRP..........................................................................................................................304
FRRP Configuration.......................................................................................................................... 304
Creating the FRRP Group........................................................................................................... 305
Configuring the Control VLAN................................................................................................... 305
Configuring and Adding the Member VLANs............................................................................ 306
Setting the FRRP Timers............................................................................................................. 307
Clearing the FRRP Counters.......................................................................................................308
Viewing the FRRP Configuration................................................................................................308
Viewing the FRRP Information................................................................................................... 308
Troubleshooting FRRP......................................................................................................................308
Configuration Checks.................................................................................................................308
Sample Configuration and Topology.............................................................................................. 309
17 GARP VLAN Registration Protocol (GVRP).................................................311
Important Points to Remember........................................................................................................ 311
Configure GVRP................................................................................................................................ 312
Related Configuration Tasks....................................................................................................... 312
Enabling GVRP Globally.................................................................................................................... 313
Enabling GVRP on a Layer 2 Interface..............................................................................................313
Configure GVRP Registration............................................................................................................313
Configure a GARP Timer...................................................................................................................314
RPM Redundancy.............................................................................................................................. 315
18 High Availability (HA)..................................................................................... 316
Component Redundancy................................................................................................................. 316
Automatic and Manual Stack Unit Failover.................................................................................316
Synchronization between Management and Standby Units......................................................317
Forcing an Stack Unit Failover.....................................................................................................317
Specifying an Auto-Failover Limit...............................................................................................318
Disabling Auto-Reboot............................................................................................................... 318
Manually Synchronizing Management and Standby Units........................................................ 318
Pre-Configuring a Stack Unit Slot.................................................................................................... 318
Removing a Provisioned Logical Stack Unit.....................................................................................319
Hitless Behavior.................................................................................................................................319
Graceful Restart.................................................................................................................................319
11
Software Resiliency...........................................................................................................................320
Software Component Health Monitoring..................................................................................320
System Health Monitoring..........................................................................................................320
Failure and Event Logging.......................................................................................................... 320
Hot-Lock Behavior............................................................................................................................321
19 Internet Group Management Protocol (IGMP).........................................322
IGMP Implementation Information..................................................................................................322
IGMP Protocol Overview.................................................................................................................. 322
IGMP Version 2............................................................................................................................322
IGMP Version 3............................................................................................................................324
Configure IGMP.................................................................................................................................327
Related Configuration Tasks.......................................................................................................327
Viewing IGMP Enabled Interfaces.................................................................................................... 328
Selecting an IGMP Version............................................................................................................... 328
Viewing IGMP Groups.......................................................................................................................329
Adjusting Timers............................................................................................................................... 329
Adjusting Query and Response Timers......................................................................................329
Preventing a Host from Joining a Group.........................................................................................330
Enabling IGMP Immediate-Leave.....................................................................................................333
IGMP Snooping................................................................................................................................. 333
IGMP Snooping Implementation Information........................................................................... 333
Configuring IGMP Snooping.......................................................................................................333
Removing a Group-Port Association......................................................................................... 334
Disabling Multicast Flooding...................................................................................................... 334
Specifying a Port as Connected to a Multicast Router..............................................................335
Configuring the Switch as Querier.............................................................................................335
Fast Convergence after MSTP Topology Changes......................................................................... 336
Egress Interface Selection (EIS) for HTTP and IGMP Applications..................................................336
Protocol Separation.................................................................................................................... 337
Enabling and Disabling Management Egress Interface Selection.............................................338
Handling of Management Route Configuration........................................................................339
Handling of Switch-Initiated Traffic........................................................................................... 339
Handling of Switch-Destined Traffic......................................................................................... 340
Handling of Transit Traffic (Traffic Separation).......................................................................... 341
Mapping of Management Applications and Traffic Type...........................................................341
Behavior of Various Applications for Switch-Initiated Traffic .................................................. 342
Behavior of Various Applications for Switch-Destined Traffic .................................................343
Interworking of EIS With Various Applications.......................................................................... 344
Designating a Multicast Router Interface.........................................................................................345
20 Interfaces.........................................................................................................346
12
Basic Interface Configuration.......................................................................................................... 346
Advanced Interface Configuration...................................................................................................346
Interface Types..................................................................................................................................347
View Basic Interface Information..................................................................................................... 347
Resetting an Interface to its Factory Default State..........................................................................349
Enabling a Physical Interface............................................................................................................349
Physical Interfaces............................................................................................................................ 350
Configuration Task List for Physical Interfaces..........................................................................350
Overview of Layer Modes...........................................................................................................350
Configuring Layer 2 (Data Link) Mode........................................................................................351
Configuring Layer 2 (Interface) Mode.........................................................................................351
Configuring Layer 3 (Network) Mode.........................................................................................352
Configuring Layer 3 (Interface) Mode........................................................................................ 352
Egress Interface Selection (EIS)........................................................................................................ 353
Important Points to Remember..................................................................................................353
Configuring EIS............................................................................................................................353
Management Interfaces....................................................................................................................354
Configuring Management Interfaces......................................................................................... 354
Configuring a Management Interface on an Ethernet Port...................................................... 356
VLAN Interfaces.................................................................................................................................357
Loopback Interfaces..........................................................................................................................357
Null Interfaces...................................................................................................................................358
Port Channel Interfaces....................................................................................................................358
Port Channel Definition and Standards......................................................................................358
Port Channel Benefits.................................................................................................................359
Port Channel Implementation....................................................................................................359
Interfaces in Port Channels........................................................................................................ 359
Configuration Tasks for Port Channel Interfaces......................................................................360
Creating a Port Channel.............................................................................................................360
Adding a Physical Interface to a Port Channel..........................................................................360
Reassigning an Interface to a New Port Channel......................................................................362
Configuring the Minimum Oper Up Links in a Port Channel....................................................363
Adding or Removing a Port Channel from a VLAN................................................................... 363
Assigning an IP Address to a Port Channel................................................................................365
Deleting or Disabling a Port Channel.........................................................................................365
Load Balancing Through Port Channels....................................................................................365
Changing the Hash Algorithm....................................................................................................365
Bulk Configuration............................................................................................................................367
Interface Range........................................................................................................................... 367
Bulk Configuration Examples..................................................................................................... 367
Defining Interface Range Macros.................................................................................................... 369
Define the Interface Range.........................................................................................................369
13
Choosing an Interface-Range Macro........................................................................................ 369
Monitoring and Maintaining Interfaces............................................................................................369
Maintenance Using TDR..............................................................................................................371
Splitting QSFP Ports to SFP+ Ports................................................................................................... 371
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................ 372
Important Points to Remember..................................................................................................372
Example Scenarios...................................................................................................................... 373
Link Dampening................................................................................................................................ 373
Important Points to Remember..................................................................................................374
Enabling Link Dampening...........................................................................................................374
Link Bundle Monitoring.....................................................................................................................375
Using Ethernet Pause Frames for Flow Control.............................................................................. 376
Enabling Pause Frames............................................................................................................... 376
Configure the MTU Size on an Interface..........................................................................................377
Port-Pipes..........................................................................................................................................378
Auto-Negotiation on Ethernet Interfaces........................................................................................378
Setting the Speed and Duplex Mode of Ethernet Interfaces.....................................................379
Set Auto-Negotiation Options................................................................................................... 380
View Advanced Interface Information..............................................................................................381
Configuring the Interface Sampling Size................................................................................... 382
Dynamic Counters............................................................................................................................383
Clearing Interface Counters....................................................................................................... 383
21 Internet Protocol Security (IPSec)...............................................................385
Configuring IPSec ............................................................................................................................386
22 IPv4 Routing....................................................................................................387
IP Addresses...................................................................................................................................... 387
Implementation Information...................................................................................................... 387
Configuration Tasks for IP Addresses.............................................................................................. 388
Assigning IP Addresses to an Interface............................................................................................388
Configuring Static Routes................................................................................................................ 389
Configure Static Routes for the Management Interface.................................................................390
IPv4 Path MTU Discovery Overview................................................................................................ 390
Using the Configured Source IP Address in ICMP Messages.......................................................... 391
Configuring the ICMP Source Interface..................................................................................... 391
Configuring the Duration to Establish a TCP Connection..............................................................392
Enabling Directed Broadcast............................................................................................................392
Resolution of Host Names............................................................................................................... 393
Enabling Dynamic Resolution of Host Names................................................................................ 393
Specifying the Local System Domain and a List of Domains..........................................................394
Configuring DNS with Traceroute................................................................................................... 394
14
ARP.................................................................................................................................................... 395
Configuration Tasks for ARP.............................................................................................................395
Configuring Static ARP Entries......................................................................................................... 396
Enabling Proxy ARP...........................................................................................................................396
Clearing ARP Cache..........................................................................................................................396
ARP Learning via Gratuitous ARP......................................................................................................397
Enabling ARP Learning via Gratuitous ARP...................................................................................... 397
ARP Learning via ARP Request......................................................................................................... 397
Configuring ARP Retries................................................................................................................... 398
ICMP..................................................................................................................................................399
Configuration Tasks for ICMP.......................................................................................................... 399
Enabling ICMP Unreachable Messages............................................................................................399
UDP Helper.......................................................................................................................................400
Configure UDP Helper............................................................................................................... 400
Important Points to Remember.................................................................................................400
Enabling UDP Helper........................................................................................................................400
Configuring a Broadcast Address.................................................................................................... 400
Configurations Using UDP Helper....................................................................................................401
UDP Helper with Broadcast-All Addresses...................................................................................... 401
UDP Helper with Subnet Broadcast Addresses............................................................................... 402
UDP Helper with Configured Broadcast Addresses........................................................................403
UDP Helper with No Configured Broadcast Addresses..................................................................403
Troubleshooting UDP Helper...........................................................................................................403
23 IPv6 Routing................................................................................................... 405
Protocol Overview............................................................................................................................405
Extended Address Space............................................................................................................ 405
Stateless Autoconfiguration....................................................................................................... 405
IPv6 Headers...............................................................................................................................406
IPv6 Header Fields.......................................................................................................................407
Extension Header Fields............................................................................................................. 408
Addressing...................................................................................................................................409
Implementing IPv6 with Dell Networking OS..................................................................................410
ICMPv6...............................................................................................................................................413
Path MTU Discovery..........................................................................................................................413
IPv6 Neighbor Discovery.................................................................................................................. 414
IPv6 Neighbor Discovery of MTU Packets..................................................................................415
Configuration Task List for IPv6 RDNSS...........................................................................................415
Configuring the IPv6 Recursive DNS Server...............................................................................415
Debugging IPv6 RDNSS Information Sent to the Host .............................................................416
Displaying IPv6 RDNSS Information........................................................................................... 417
Secure Shell (SSH) Over an IPv6 Transport...................................................................................... 417
15
Configuration Tasks for IPv6............................................................................................................ 418
Adjusting Your CAM-Profile........................................................................................................418
Assigning an IPv6 Address to an Interface................................................................................. 419
Assigning a Static IPv6 Route......................................................................................................419
Configuring Telnet with IPv6..................................................................................................... 420
SNMP over IPv6.......................................................................................................................... 420
Displaying IPv6 Information....................................................................................................... 420
Displaying an IPv6 Interface Information...................................................................................421
Showing IPv6 Routes.................................................................................................................. 422
Showing the Running-Configuration for an Interface.............................................................. 423
Clearing IPv6 Routes...................................................................................................................423
Configuring IPv6 RA Guard.............................................................................................................. 424
Configuring IPv6 RA Guard on an Interface.............................................................................. 426
Monitoring IPv6 RA Guard..........................................................................................................426
24 Intermediate System to Intermediate System..........................................427
IS-IS Protocol Overview................................................................................................................... 427
IS-IS Addressing................................................................................................................................ 427
Multi-Topology IS-IS........................................................................................................................ 428
Transition Mode..........................................................................................................................428
Interface Support........................................................................................................................ 429
Adjacencies................................................................................................................................. 429
Graceful Restart................................................................................................................................ 429
Timers..........................................................................................................................................429
Implementation Information............................................................................................................430
Configuration Information................................................................................................................431
Configuration Tasks for IS-IS......................................................................................................431
Configuring the Distance of a Route.........................................................................................440
Changing the IS-Type................................................................................................................ 440
Redistributing IPv4 Routes......................................................................................................... 443
Redistributing IPv6 Routes......................................................................................................... 443
Configuring Authentication Passwords..................................................................................... 444
Setting the Overload Bit..............................................................................................................445
Debugging IS-IS..........................................................................................................................445
IS-IS Metric Styles............................................................................................................................. 447
Configure Metric Values................................................................................................................... 447
Maximum Values in the Routing Table...................................................................................... 447
Change the IS-IS Metric Style in One Level Only...................................................................... 447
Leaks from One Level to Another.............................................................................................. 449
Sample Configurations.....................................................................................................................450
25 Link Aggregation Control Protocol (LACP)...............................................453
16
Introduction to Dynamic LAGs and LACP....................................................................................... 453
Important Points to Remember................................................................................................. 453
LACP Modes................................................................................................................................454
Configuring LACP Commands...................................................................................................454
LACP Configuration Tasks................................................................................................................455
Creating a LAG............................................................................................................................ 455
Configuring the LAG Interfaces as Dynamic............................................................................. 456
Setting the LACP Long Timeout.................................................................................................456
Monitoring and Debugging LACP...............................................................................................457
Shared LAG State Tracking............................................................................................................... 457
Configuring Shared LAG State Tracking.................................................................................... 458
Important Points about Shared LAG State Tracking..................................................................459
LACP Basic Configuration Example.................................................................................................460
Configure a LAG on ALPHA........................................................................................................460
26 Layer 2..............................................................................................................468
Manage the MAC Address Table......................................................................................................468
Clearing the MAC Address Table............................................................................................... 468
Setting the Aging Time for Dynamic Entries............................................................................. 468
Configuring a Static MAC Address............................................................................................. 469
Displaying the MAC Address Table............................................................................................ 469
MAC Learning Limit.......................................................................................................................... 469
Setting the MAC Learning Limit..................................................................................................470
mac learning-limit Dynamic.......................................................................................................470
mac learning-limit mac-address-sticky..................................................................................... 471
mac learning-limit station-move................................................................................................471
mac learning-limit no-station-move..........................................................................................471
Learning Limit Violation Actions.................................................................................................472
Setting Station Move Violation Actions...................................................................................... 472
Recovering from Learning Limit and Station Move Violations..................................................473
NIC Teaming..................................................................................................................................... 473
Configure Redundant Pairs.............................................................................................................. 474
Important Points about Configuring Redundant Pairs..............................................................476
Far-End Failure Detection.................................................................................................................477
FEFD State Changes....................................................................................................................478
Configuring FEFD........................................................................................................................479
Enabling FEFD on an Interface...................................................................................................480
Debugging FEFD..........................................................................................................................481
27 Link Layer Discovery Protocol (LLDP)........................................................483
802.1AB (LLDP) Overview.................................................................................................................483
Protocol Data Units.................................................................................................................... 483
17
Optional TLVs................................................................................................................................... 484
Management TLVs......................................................................................................................484
TIA-1057 (LLDP-MED) Overview......................................................................................................486
TIA Organizationally Specific TLVs.............................................................................................487
Configure LLDP.................................................................................................................................491
Related Configuration Tasks.......................................................................................................491
Important Points to Remember..................................................................................................491
LLDP Compatibility..................................................................................................................... 492
CONFIGURATION versus INTERFACE Configurations....................................................................492
Enabling LLDP...................................................................................................................................493
Disabling and Undoing LLDP......................................................................................................493
Enabling LLDP on Management Ports.............................................................................................493
Disabling and Undoing LLDP on Management Ports................................................................493
Advertising TLVs................................................................................................................................494
Viewing the LLDP Configuration......................................................................................................495
Viewing Information Advertised by Adjacent LLDP Agents............................................................ 496
Configuring LLDPDU Intervals......................................................................................................... 497
Configuring Transmit and Receive Mode........................................................................................ 497
Configuring the Time to Live Value................................................................................................. 498
Debugging LLDP...............................................................................................................................499
Relevant Management Objects........................................................................................................500
28 Microsoft Network Load Balancing............................................................506
NLB Unicast Mode Scenario.............................................................................................................506
NLB Multicast Mode Scenario.......................................................................................................... 507
Limitations of the NLB Feature.........................................................................................................507
Microsoft Clustering......................................................................................................................... 507
Enable and Disable VLAN Flooding .................................................................................................508
Configuring a Switch for NLB ......................................................................................................... 508
Enabling a Switch for Multicast NLB.......................................................................................... 508
29 Multicast Source Discovery Protocol (MSDP)...........................................510
Protocol Overview............................................................................................................................ 510
Anycast RP......................................................................................................................................... 512
Implementation Information............................................................................................................ 512
Configure Multicast Source Discovery Protocol..............................................................................512
Related Configuration Tasks....................................................................................................... 512
Enable MSDP..................................................................................................................................... 516
Manage the Source-Active Cache....................................................................................................517
Viewing the Source-Active Cache.............................................................................................. 517
Limiting the Source-Active Cache..............................................................................................518
Clearing the Source-Active Cache.............................................................................................518
18
Enabling the Rejected Source-Active Cache............................................................................. 518
Accept Source-Active Messages that Fail the RFP Check...............................................................518
Specifying Source-Active Messages.................................................................................................522
Limiting the Source-Active Messages from a Peer..........................................................................523
Preventing MSDP from Caching a Local Source............................................................................. 523
Preventing MSDP from Caching a Remote Source.........................................................................524
Preventing MSDP from Advertising a Local Source.........................................................................525
Logging Changes in Peership States................................................................................................525
Terminating a Peership.....................................................................................................................526
Clearing Peer Statistics..................................................................................................................... 526
Debugging MSDP..............................................................................................................................527
MSDP with Anycast RP......................................................................................................................527
Configuring Anycast RP....................................................................................................................528
Reducing Source-Active Message Flooding..............................................................................529
Specifying the RP Address Used in SA Messages.......................................................................529
MSDP Sample Configurations...........................................................................................................531
30 Multiple Spanning Tree Protocol (MSTP).................................................. 534
Protocol Overview............................................................................................................................534
Spanning Tree Variations..................................................................................................................535
Implementation Information...................................................................................................... 535
Configure Multiple Spanning Tree Protocol....................................................................................535
Related Configuration Tasks.......................................................................................................535
Enable Multiple Spanning Tree Globally.......................................................................................... 536
Adding and Removing Interfaces.....................................................................................................536
Creating Multiple Spanning Tree Instances.....................................................................................536
Influencing MSTP Root Selection.....................................................................................................538
Interoperate with Non-Dell Bridges.................................................................................................538
Changing the Region Name or Revision..........................................................................................539
Modifying Global Parameters...........................................................................................................539
Modifying the Interface Parameters................................................................................................ 540
Configuring an EdgePort.................................................................................................................. 541
Flush MAC Addresses after a Topology Change............................................................................. 542
MSTP Sample Configurations...........................................................................................................542
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration............................................................ 543
Debugging and Verifying MSTP Configurations..............................................................................546
31 Multicast Features..........................................................................................549
Enabling IP Multicast........................................................................................................................ 549
Implementation Information............................................................................................................549
Multicast Policies.............................................................................................................................. 550
19
IPv4 Multicast Policies................................................................................................................ 550
32 Object Tracking..............................................................................................558
Object Tracking Overview................................................................................................................558
Track Layer 2 Interfaces..............................................................................................................559
Track Layer 3 Interfaces..............................................................................................................559
Track IPv4 and IPv6 Routes........................................................................................................560
Set Tracking Delays..................................................................................................................... 561
VRRP Object Tracking................................................................................................................. 561
Object Tracking Configuration.........................................................................................................561
Tracking a Layer 2 Interface........................................................................................................561
Tracking a Layer 3 Interface....................................................................................................... 562
Track an IPv4/IPv6 Route........................................................................................................... 564
Displaying Tracked Objects..............................................................................................................568
33 Open Shortest Path First (OSPFv2 and OSPFv3).......................................570
Protocol Overview............................................................................................................................ 570
Autonomous System (AS) Areas................................................................................................. 570
Area Types....................................................................................................................................571
Networks and Neighbors............................................................................................................ 572
Router Types................................................................................................................................572
Designated and Backup Designated Routers.............................................................................574
Link-State Advertisements (LSAs)............................................................................................... 574
Router Priority and Cost............................................................................................................. 576
OSPF with Dell Networking OS........................................................................................................ 576
Graceful Restart...........................................................................................................................577
Fast Convergence (OSPFv2, IPv4 Only)..................................................................................... 578
Multi-Process OSPFv2 with VRF.................................................................................................578
OSPF ACK Packing...................................................................................................................... 579
Setting OSPF Adjacency with Cisco Routers............................................................................. 579
Configuration Information............................................................................................................... 580
Configuration Task List for OSPFv2 (OSPF for IPv4)................................................................. 580
Configuration Task List for OSPFv3 (OSPF for IPv6)........................................................................595
Enabling IPv6 Unicast Routing................................................................................................... 596
Applying cost for OSPFv3........................................................................................................... 596
Assigning IPv6 Addresses on an Interface..................................................................................597
Assigning Area ID on an Interface.............................................................................................. 597
Assigning OSPFv3 Process ID and Router ID Globally...............................................................597
Assigning OSPFv3 Process ID and Router ID to a VRF.............................................................. 598
Configuring Stub Areas...............................................................................................................599
Configuring Passive-Interface....................................................................................................599
Redistributing Routes..................................................................................................................599
20
Configuring a Default Route...................................................................................................... 600
Enabling OSPFv3 Graceful Restart.............................................................................................600
OSPFv3 Authentication Using IPsec...........................................................................................602
Troubleshooting OSPFv3............................................................................................................610
34 Policy-based Routing (PBR)......................................................................... 612
Overview............................................................................................................................................612
Implementing Policy-based Routing with Dell Networking OS......................................................613
Configuration Task List for Policy-based Routing...........................................................................614
PBR Exceptions (Permit)..............................................................................................................614
Create a Redirect List.................................................................................................................. 614
Create a Rule for a Redirect-list..................................................................................................615
Apply a Redirect-list to an Interface using a Redirect-group....................................................617
Sample Configuration.......................................................................................................................619
35 PIM Sparse-Mode (PIM-SM)......................................................................... 620
Implementation Information............................................................................................................620
Protocol Overview............................................................................................................................620
Requesting Multicast Traffic.......................................................................................................620
Refuse Multicast Traffic...............................................................................................................621
Send Multicast Traffic..................................................................................................................621
Configuring PIM-SM......................................................................................................................... 622
Related Configuration Tasks.......................................................................................................622
Enable PIM-SM..................................................................................................................................622
Configuring S,G Expiry Timers......................................................................................................... 623
Configuring a Static Rendezvous Point........................................................................................... 624
Overriding Bootstrap Router Updates....................................................................................... 624
Configuring a Designated Router.................................................................................................... 625
Creating Multicast Boundaries and Domains.................................................................................. 625
36 PIM Source-Specific Mode (PIM-SSM)....................................................... 627
Implementation Information............................................................................................................ 627
Important Points to Remember..................................................................................................627
Configure PIM-SSM.......................................................................................................................... 628
Related Configuration Tasks...................................................................................................... 628
Enabling PIM-SSM............................................................................................................................ 628
Use PIM-SSM with IGMP Version 2 Hosts....................................................................................... 628
Configuring PIM-SSM with IGMPv2........................................................................................... 629
37 Port Monitoring.............................................................................................. 631
Important Points to Remember........................................................................................................631
Port Monitoring.................................................................................................................................632
21
Configuring Port Monitoring............................................................................................................633
Configuring Monitor Multicast Queue.............................................................................................635
Enabling Flow-Based Monitoring.....................................................................................................636
Remote Port Mirroring......................................................................................................................637
Remote Port Mirroring Example.................................................................................................637
Configuring Remote Port Mirroring...........................................................................................638
Displaying Remote-Port Mirroring Configurations...................................................................640
Configuring the Sample Remote Port Mirroring....................................................................... 640
Encapsulated Remote Port Monitoring........................................................................................... 644
Changes to Default BehaviorConfiguration steps for ERPM ................................................... 644
ERPM Behavior on a typical Dell Networking OS ...........................................................................646
Decapsulation of ERPM packets at the Destination IP/ Analyzer............................................. 646
38 Private VLANs (PVLAN)..................................................................................648
Private VLAN Concepts.................................................................................................................... 648
Using the Private VLAN Commands................................................................................................ 649
Configuration Task List.....................................................................................................................650
Creating PVLAN ports.................................................................................................................650
Creating a Primary VLAN.............................................................................................................651
Creating a Community VLAN..................................................................................................... 652
Creating an Isolated VLAN..........................................................................................................653
Private VLAN Configuration Example.............................................................................................. 654
Inspecting the Private VLAN Configuration.....................................................................................655
39 Per-VLAN Spanning Tree Plus (PVST+)...................................................... 658
Protocol Overview............................................................................................................................658
Implementation Information............................................................................................................659
Configure Per-VLAN Spanning Tree Plus........................................................................................ 659
Related Configuration Tasks...................................................................................................... 659
Enabling PVST+.................................................................................................................................659
Disabling PVST+............................................................................................................................... 660
Influencing PVST+ Root Selection...................................................................................................660
Modifying Global PVST+ Parameters...............................................................................................662
Modifying Interface PVST+ Parameters...........................................................................................663
Configuring an EdgePort..................................................................................................................664
PVST+ in Multi-Vendor Networks....................................................................................................664
Enabling PVST+ Extend System ID...................................................................................................665
PVST+ Sample Configurations.........................................................................................................666
40 Quality of Service (QoS)............................................................................... 668
Implementation Information............................................................................................................670
Port-Based QoS Configurations...................................................................................................... 670
22
Setting dot1p Priorities for Incoming Traffic.............................................................................. 671
Honoring dot1p Priorities on Ingress Traffic.............................................................................. 671
Configuring Port-Based Rate Policing....................................................................................... 672
Configuring Port-Based Rate Shaping....................................................................................... 673
Policy-Based QoS Configurations................................................................................................... 674
Classify Traffic............................................................................................................................. 674
Create a QoS Policy....................................................................................................................678
Create Policy Maps.....................................................................................................................680
DSCP Color Maps............................................................................................................................. 684
Creating a DSCP Color Map.......................................................................................................684
Displaying DSCP Color Maps..................................................................................................... 685
Displaying a DSCP Color Policy Configuration ........................................................................ 686
Enabling QoS Rate Adjustment........................................................................................................686
Enabling Strict-Priority Queueing.................................................................................................... 687
Weighted Random Early Detection..................................................................................................687
Creating WRED Profiles..............................................................................................................688
Applying a WRED Profile to Traffic.............................................................................................689
Displaying Default and Configured WRED Profiles................................................................... 689
Displaying WRED Drop Statistics................................................................................................689
Displaying egress-queue Statistics............................................................................................ 690
Pre-Calculating Available QoS CAM Space.....................................................................................690
Configuring Weights and ECN for WRED ....................................................................................... 691
Global Service Pools With WRED and ECN Settings................................................................. 692
Configuring WRED and ECN Attributes...........................................................................................694
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................694
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class..........695
Classifying Incoming Packets Using ECN and Color-Marking................................................. 695
Sample configuration to mark non-ecn packets as “yellow” with single traffic class............. 698
Applying Layer 2 Match Criteria on a Layer 3 Interface.................................................................. 699
Applying DSCP and VLAN Match Criteria on a Service Queue.......................................................699
Classifying Incoming Packets Using ECN and Color-Marking....................................................... 700
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................703
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class................703
Sample configuration to mark non-ecn packets as “yellow” with single traffic class................... 704
41 Routing Information Protocol (RIP)........................................................... 706
Protocol Overview............................................................................................................................706
RIPv1............................................................................................................................................ 706
RIPv2............................................................................................................................................706
Implementation Information............................................................................................................ 707
Configuration Information................................................................................................................707
Configuration Task List............................................................................................................... 707
23
RIP Configuration Example......................................................................................................... 714
42 Remote Monitoring (RMON)........................................................................720
Implementation Information............................................................................................................720
Fault Recovery...................................................................................................................................720
Setting the RMON Alarm............................................................................................................. 721
Configuring an RMON Event...................................................................................................... 722
Configuring RMON Collection Statistics....................................................................................722
Configuring the RMON Collection History................................................................................ 723
43 Rapid Spanning Tree Protocol (RSTP)........................................................724
Protocol Overview............................................................................................................................ 724
Configuring Rapid Spanning Tree.................................................................................................... 724
Related Configuration Tasks.......................................................................................................724
Important Points to Remember........................................................................................................725
RSTP and VLT.............................................................................................................................. 725
Configuring Interfaces for Layer 2 Mode.........................................................................................725
Enabling Rapid Spanning Tree Protocol Globally............................................................................726
Adding and Removing Interfaces..................................................................................................... 728
Modifying Global Parameters........................................................................................................... 729
Enabling SNMP Traps for Root Elections and Topology Changes........................................... 730
Modifying Interface Parameters....................................................................................................... 730
Enabling SNMP Traps for Root Elections and Topology Changes..................................................731
Influencing RSTP Root Selection...................................................................................................... 731
Configuring an EdgePort...................................................................................................................731
Configuring Fast Hellos for Link State Detection............................................................................ 732
44 Software-Defined Networking (SDN)........................................................ 734
45 Security............................................................................................................ 735
AAA Accounting................................................................................................................................ 735
Configuration Task List for AAA Accounting..............................................................................735
AAA Authentication........................................................................................................................... 737
Configuration Task List for AAA Authentication........................................................................ 738
Obscuring Passwords and Keys....................................................................................................... 740
AAA Authorization............................................................................................................................. 741
Privilege Levels Overview............................................................................................................741
Configuration Task List for Privilege Levels................................................................................741
RADIUS.............................................................................................................................................. 745
RADIUS Authentication...............................................................................................................746
Configuration Task List for RADIUS............................................................................................747
TACACS+...........................................................................................................................................750
24
Configuration Task List for TACACS+........................................................................................ 750
TACACS+ Remote Authentication..............................................................................................752
Command Authorization............................................................................................................ 753
Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................753
Enabling SCP and SSH...................................................................................................................... 753
Using SCP with SSH to Copy a Software Image........................................................................ 754
Removing the RSA Host Keys and Zeroizing Storage ...............................................................755
Configuring When to Re-generate an SSH Key ........................................................................756
Configuring the SSH Server Key Exchange Algorithm...............................................................756
Configuring the HMAC Algorithm for the SSH Server............................................................... 757
Configuring the SSH Server Cipher List......................................................................................757
Secure Shell Authentication........................................................................................................758
Troubleshooting SSH..................................................................................................................760
Telnet................................................................................................................................................. 761
VTY Line and Access-Class Configuration.......................................................................................761
VTY Line Local Authentication and Authorization..................................................................... 761
VTY Line Remote Authentication and Authorization.................................................................762
VTY MAC-SA Filter Support.........................................................................................................763
Role-Based Access Control..............................................................................................................763
Overview of RBAC.......................................................................................................................764
User Roles....................................................................................................................................766
AAA Authentication and Authorization for Roles.......................................................................770
Role Accounting..........................................................................................................................773
Display Information About User Roles....................................................................................... 774
46 Service Provider Bridging............................................................................. 776
VLAN Stacking................................................................................................................................... 776
Important Points to Remember.................................................................................................. 777
Configure VLAN Stacking............................................................................................................778
Creating Access and Trunk Ports................................................................................................778
Enable VLAN-Stacking for a VLAN..............................................................................................779
Configuring the Protocol Type Value for the Outer VLAN Tag.................................................779
Configuring Dell Networking OS Options for Trunk Ports........................................................779
Debugging VLAN Stacking..........................................................................................................780
VLAN Stacking in Multi-Vendor Networks..................................................................................781
VLAN Stacking Packet Drop Precedence.........................................................................................785
Enabling Drop Eligibility.............................................................................................................. 785
Honoring the Incoming DEI Value............................................................................................. 786
Marking Egress Packets with a DEI Value...................................................................................786
Dynamic Mode CoS for VLAN Stacking........................................................................................... 787
Mapping C-Tag to S-Tag dot1p Values......................................................................................788
Layer 2 Protocol Tunneling.............................................................................................................. 789
25
Implementation Information.......................................................................................................791
Enabling Layer 2 Protocol Tunneling......................................................................................... 792
Specifying a Destination MAC Address for BPDUs.................................................................... 792
Setting Rate-Limit BPDUs........................................................................................................... 792
Debugging Layer 2 Protocol Tunneling.....................................................................................793
Provider Backbone Bridging.............................................................................................................793
47 sFlow.................................................................................................................794
Overview........................................................................................................................................... 794
Implementation Information............................................................................................................794
Important Points to Remember..................................................................................................795
Enabling Extended sFlow..................................................................................................................795
Enabling and Disabling sFlow on an Interface.................................................................................796
Enabling sFlow Max-Header Size Extended.................................................................................... 796
sFlow Show Commands...................................................................................................................798
Displaying Show sFlow Global................................................................................................... 798
Displaying Show sFlow on an Interface..................................................................................... 798
Displaying Show sFlow on a Stack-unit.....................................................................................799
Configuring Specify Collectors........................................................................................................ 799
Changing the Polling Intervals......................................................................................................... 799
Back-Off Mechanism....................................................................................................................... 800
sFlow on LAG ports.......................................................................................................................... 800
Enabling Extended sFlow.................................................................................................................800
Important Points to Remember..................................................................................................801
48 Simple Network Management Protocol (SNMP)..................................... 803
Protocol Overview............................................................................................................................803
Implementation Information............................................................................................................803
SNMPv3 Compliance With FIPS....................................................................................................... 803
Configuration Task List for SNMP....................................................................................................805
Related Configuration Tasks...................................................................................................... 805
Important Points to Remember.......................................................................................................805
Set up SNMP..................................................................................................................................... 805
Creating a Community...............................................................................................................806
Setting Up User-Based Security (SNMPv3)................................................................................806
Reading Managed Object Values..................................................................................................... 807
Writing Managed Object Values...................................................................................................... 808
Configuring Contact and Location Information using SNMP........................................................ 809
Subscribing to Managed Object Value Updates using SNMP......................................................... 810
Enabling a Subset of SNMP Traps.....................................................................................................811
Enabling an SNMP Agent to Notify Syslog Server Failure................................................................813
Copy Configuration Files Using SNMP.............................................................................................814
26
Copying a Configuration File......................................................................................................816
Copying Configuration Files via SNMP.......................................................................................816
Copying the Startup-Config Files to the Running-Config.........................................................817
Copying the Startup-Config Files to the Server via FTP............................................................ 817
Copying the Startup-Config Files to the Server via TFTP..........................................................818
Copy a Binary File to the Startup-Configuration....................................................................... 818
Additional MIB Objects to View Copy Statistics.........................................................................819
Obtaining a Value for MIB Objects.............................................................................................819
MIB Support to Display the Available Memory Size on Flash..........................................................820
Viewing the Available Flash Memory Size..................................................................................820
MIB Support to Display the Software Core Files Generated by the System................................... 821
Viewing the Software Core Files Generated by the System......................................................821
Manage VLANs using SNMP............................................................................................................. 822
Creating a VLAN..........................................................................................................................822
Assigning a VLAN Alias................................................................................................................822
Displaying the Ports in a VLAN................................................................................................... 823
Add Tagged and Untagged Ports to a VLAN..............................................................................824
Managing Overload on Startup........................................................................................................ 825
Enabling and Disabling a Port using SNMP......................................................................................825
Fetch Dynamic MAC Entries using SNMP........................................................................................826
Deriving Interface Indices.................................................................................................................827
Monitor Port-Channels.................................................................................................................... 829
Enabling an SNMP Agent to Notify Syslog Server Failure............................................................... 830
Troubleshooting SNMP Operation...................................................................................................831
49 Stacking........................................................................................................... 832
Stacking Overview............................................................................................................................ 832
Stack Management Roles........................................................................................................... 832
Stack Master Election..................................................................................................................833
Virtual IP...................................................................................................................................... 833
Failover Roles.............................................................................................................................. 833
MAC Addressing on Stacks.........................................................................................................834
Stacking LAG............................................................................................................................... 836
Supported Stacking Topologies................................................................................................. 836
High Availability on Stacks.......................................................................................................... 837
Management Access on Stacks..................................................................................................837
Important Points to Remember....................................................................................................... 838
Stacking Installation Tasks................................................................................................................839
Create an Stack...........................................................................................................................839
Add Units to an Existing Stack....................................................................................................843
Split a Stack.................................................................................................................................846
Stacking Configuration Tasks...........................................................................................................846
27
Assigning Unit Numbers to Units in an Stack............................................................................ 846
Creating a Virtual Stack Unit on a Stack.....................................................................................847
Displaying Information about a Stack........................................................................................ 847
Influencing Management Unit Selection on a Stack.................................................................849
Managing Redundancy on a Stack.............................................................................................849
Resetting a Unit on a Stack.........................................................................................................850
Verify a Stack Configuration.............................................................................................................850
Displaying the Status of Stacking Ports..................................................................................... 850
Remove Units or Front End Ports from a Stack...............................................................................852
Removing a Unit from a Stack....................................................................................................852
Removing Front End Port Stacking............................................................................................ 853
Troubleshoot a Stack........................................................................................................................853
Recover from Stack Link Flaps................................................................................................... 854
Recover from a Card Problem State on a Stack........................................................................854
50 Storm Control.................................................................................................856
Configure Storm Control................................................................................................................. 856
Configuring Storm Control from INTERFACE Mode.................................................................856
Configuring Storm Control from CONFIGURATION Mode...................................................... 857
51 Spanning Tree Protocol (STP)......................................................................858
Protocol Overview............................................................................................................................858
Configure Spanning Tree................................................................................................................. 858
Related Configuration Tasks...................................................................................................... 858
Important Points to Remember....................................................................................................... 859
Configuring Interfaces for Layer 2 Mode.........................................................................................859
Enabling Spanning Tree Protocol Globally..................................................................................... 860
Adding an Interface to the Spanning Tree Group........................................................................... 862
Modifying Global Parameters...........................................................................................................863
Modifying Interface STP Parameters............................................................................................... 864
Enabling PortFast..............................................................................................................................864
Prevent Network Disruptions with BPDU Guard....................................................................... 865
Selecting STP Root........................................................................................................................... 867
STP Root Guard................................................................................................................................ 868
Root Guard Scenario.................................................................................................................. 868
Configuring Root Guard.............................................................................................................869
Enabling SNMP Traps for Root Elections and Topology Changes.................................................870
Configuring Spanning Trees as Hitless............................................................................................ 870
STP Loop Guard................................................................................................................................ 871
Configuring Loop Guard.............................................................................................................872
Displaying STP Guard Configuration................................................................................................873
28
52 SupportAssist.................................................................................................. 874
Configuring SupportAssist Using a Configuration Wizard.............................................................. 875
Configuring SupportAssist Manually................................................................................................ 875
Configuring SupportAssist Activity................................................................................................... 877
Configuring SupportAssist Company...............................................................................................878
Configuring SupportAssist Person................................................................................................... 879
Configuring SupportAssist Server.................................................................................................... 880
Viewing SupportAssist Configuration...............................................................................................881
53 System Time and Date...................................................................................883
Network Time Protocol....................................................................................................................883
Protocol Overview......................................................................................................................884
Configure the Network Time Protocol......................................................................................885
Enabling NTP...............................................................................................................................885
Configuring NTP Broadcasts......................................................................................................885
Disabling NTP on an Interface................................................................................................... 886
Configuring a Source IP Address for NTP Packets....................................................................886
Configuring NTP Authentication................................................................................................887
Dell Networking OS Time and Date................................................................................................ 890
Configuration Task List ..............................................................................................................890
Setting the Time and Date for the Switch Software Clock.......................................................890
Setting the Timezone................................................................................................................. 890
Set Daylight Saving Time.............................................................................................................891
Setting Daylight Saving Time Once............................................................................................891
Setting Recurring Daylight Saving Time.....................................................................................892
54 Tunneling........................................................................................................ 894
Configuring a Tunnel........................................................................................................................894
Configuring Tunnel Keepalive Settings............................................................................................895
Configuring a Tunnel Interface........................................................................................................896
Configuring Tunnel Allow-Remote Decapsulation.........................................................................896
Configuring the Tunnel Source Anylocal.........................................................................................897
55 Uplink Failure Detection (UFD)....................................................................898
Feature Description.......................................................................................................................... 898
How Uplink Failure Detection Works...............................................................................................899
UFD and NIC Teaming..................................................................................................................... 900
Important Points to Remember.......................................................................................................900
Configuring Uplink Failure Detection.............................................................................................. 901
Clearing a UFD-Disabled Interface..................................................................................................903
Displaying Uplink Failure Detection.................................................................................................904
29
Sample Configuration: Uplink Failure Detection............................................................................ 906
56 Upgrade Procedures..................................................................................... 908
Get Help with Upgrades...................................................................................................................908
57 Virtual LANs (VLANs)......................................................................................909
Default VLAN.................................................................................................................................... 909
Port-Based VLANs.............................................................................................................................910
VLANs and Port Tagging...................................................................................................................910
Configuration Task List......................................................................................................................911
Creating a Port-Based VLAN....................................................................................................... 911
Assigning Interfaces to a VLAN...................................................................................................912
Moving Untagged Interfaces.......................................................................................................913
Assigning an IP Address to a VLAN.............................................................................................914
Configuring Native VLANs................................................................................................................ 915
Enabling Null VLAN as the Default VLAN......................................................................................... 916
58 VLT Proxy Gateway........................................................................................ 917
Proxy Gateway in VLT Domains........................................................................................................917
Guidelines for Enabling the VLT Proxy Gateway....................................................................... 918
Enabling the VLT Proxy Gateway................................................................................................919
LLDP Organizational TLV for Proxy Gateway............................................................................ 920
Configuring an LLDP VLT Proxy Gateway....................................................................................... 922
Configuring a Static VLT Proxy Gateway......................................................................................... 922
59 Virtual Link Trunking (VLT).......................................................................... 924
Overview........................................................................................................................................... 924
VLT on Core Switches.................................................................................................................925
Enhanced VLT............................................................................................................................. 925
VLT Terminology.............................................................................................................................. 926
Configure Virtual Link Trunking........................................................................................................927
Important Points to Remember..................................................................................................927
Configuration Notes................................................................................................................... 928
Primary and Secondary VLT Peers............................................................................................. 932
RSTP and VLT.............................................................................................................................. 932
VLT Bandwidth Monitoring.........................................................................................................933
VLT and Stacking.........................................................................................................................933
VLT and IGMP Snooping.............................................................................................................933
VLT IPv6.......................................................................................................................................933
VLT Port Delayed Restoration.................................................................................................... 933
PIM-Sparse Mode Support on VLT.............................................................................................934
VLT Routing ................................................................................................................................936
30
Loading...
+ 1038 hidden pages