This guide describes the protocols and features supported by the Dell Networking OS and provides
configuration instructions and examples for implementing them. It supports the system platforms E-Series,
C-Series, and S-Series.
The E-Series ExaScale platform is supported with Dell Networking OS version 8.1.1.0. and later.
Though this guide contains information on protocols, it is not intended to be a complete reference. This
guide is a reference for configuring protocols on Dell Networking systems. For complete information on
protocols, refer to other documentation including IETF Requests for Comment (RFCs). The instructions in
this guide cite relevant RFCs, and Appendix A, Standards Compliance contains a complete list of the
supported RFCs and Management Information Base files (MIBs).
1
Audience
This document is intended for system administrators who are responsible for configuring and maintaining
networks and assumes you are knowledgeable in Layer 2 and Layer 3 networking technologies.
About this Guide | 33
Conventions
This document uses the following conventions to describe command syntax:
ConventionDescription
keyword
parameter
{X}Keywords and parameters within braces must be entered in the CLI.
[X]Keywords and parameters within brackets are optional.
www.dell.com | support.dell.com
x | y Keywords and parameters separated by bar require you to choose one.
Keywords are in bold and should be entered in the CLI as listed.
Parameters are in italics and require a number or word to be entered in the CLI.
Information Symbols
Table 1-1 describes symbols contained in this guide.
Table 1-1. Information Symbols
SymbolWarningDescription
Dell Networking OS
Behavior
ces
Platform Specific
Feature
This symbol informs you of an Dell Networking OS behavior. These
behaviors are inherent to the Dell Networking system or Dell Networking
OS feature and are non-configurable.
This symbol informs you of a feature that supported on one or two
platforms only: e is for E-Series, c is for C-Series, s is for S-Series.
et e
x
Related Documents
For more information about the Dell Networking E-Series, C-Series, and S-Series refer to the following
documents:
•Dell Networking OS Command Reference
•Installing and Maintaining the <Dell Networking chassis> System
•Dell Networking OS Release Notes
34|About this Guide
E-Series Specific
Feature/Command
ExceptionThis symbol is a note associated with some other text on the page that is
If a feature or command applies to only one of the E-Series platforms, a
separate symbol calls this to attention: e
the ExaScale.
marked with an asterisk.
for the TeraScale or e x for
t
Configuration Fundamentals
The Dell Networking OS Command Line Interface (CLI) is a text-based interface through which you can
configure interfaces and protocols. The CLI is largely the same for the E-Series, C-Series, and S-Series
with the exception of some commands and command outputs. The CLI is structured in modes for security
and management purposes. Different sets of commands are available in each mode, and you can limit user
access to modes using privilege levels.
In Dell Networking OS, after a command is enabled, it is entered into the running configuration file. You
can view the current configuration for the whole system or for a particular CLI mode. To save the current
configuration copy the running configuration to another location.
Note: Due to a differences in hardware architecture and the continued system development, features may
occasionally differ between the platforms. These differences are identified by the information symbols
shown on Table 1-1.
2
Access the Command Line
Access the command line through a serial console port or a Telnet session (Figure 2-1). When the system
successfully boots, you enter the command line in the EXEC mode.
Note: You must have a password configured on a virtual terminal line before you can Telnet into the
system. Therefore, you must use a console connection when connecting to the system for the first time.
Figure 2-1. Log into the System using Telnet
telnet 172.31.1.53
Trying 172.31.1.53...
Connected to 172.31.1.53.
Escape character is '^]'.
Login: username
Password:
FTOS>
EXEC mode prompt
Configuration Fundamentals | 35
CLI Modes
Different sets of commands are available in each mode. A command found in one mode cannot be
executed from another mode (with the exception of EXEC mode commands preceded by the command
see The do Command). You can set user access rights to commands and command modes using privilege
levels; for more information on privilege levels and security options, refer to Chapter 45, Security.
The Dell Networking OS CLI is divided into three major mode levels:
•EXEC mode is the default mode and has a privilege level of 1, which is the most restricted level. Only
a limited selection of commands is available, notably
system information.
www.dell.com | support.dell.com
•EXEC Privilege mode has commands to view configurations, clear counters, manage configuration
files, run diagnostics, and enable or disable debug operations. The privilege level is 15, which is
unrestricted. You can configure a password for this mode; see Configure the Enable Password.
•CONFIGURATION mode enables you to configure security features, time settings, set logging and
SNMP functions, configure static ARP and MAC addresses, and set line cards on the system.
Beneath CONFIGURATION mode are sub-modes that apply to interfaces, protocols, and features.
Figure 2-2 illustrates this sub-mode command structure. Two sub-CONFIGURATION modes are
important when configuring the chassis for the first time:
•INTERFACE sub-mode is the mode in which you configure Layer 2 and Layer 3 protocols and IP
services specific to an interface. An interface can be physical (Management interface, 1-Gigabit
Ethernet, or 10-Gigabit Ethernet, or SONET) or logical (Loopback, Null, port channel, or VLAN).
•LINE sub-mode is the mode in which you to configure the console and virtual terminal lines.
do;
show commands, which allow you to view
Note: At any time, entering a question mark (?) will display the available command options. For example,
when you are in CONFIGURATION mode, entering the question mark first will list all available commands,
including the possible sub-modes.
36|Configuration Fundamentals
Figure 2-2. CLI Modes in Dell Networking OS
EXEC
EXEC Privilege
CONFIGURATION
ARCHIVE
AS-PATH ACL
INTERFACE
GIGABIT ETHERNET
10 GIGABIT ETHERNET
INTERFACE RANGE
LOOPBACK
MANAGEMENT ETHERNET
NULL
PORT-CHANNEL
SONET
VLAN
VRRP
IP
IPv6
IP COMMUNITY-LIST
IP ACCESS-LIST
STANDARD ACCESS-LIST
EXTENDED ACCESS-LIST
LINE
AUXILIARY
CONSOLE
VIRTUAL TERMINAL
MAC ACCESS-LIST
MONITOR SESSION
MULTIPLE SPANNING TREE
Per-VLAN SPANNING TREE
PREFIX-LIST
RAPID SPANNING TREE
REDIRECT
ROUTE-MAP
ROUTER BGP
ROUTER ISIS
ROUTER OSPF
ROUTER RIP
SPANNING TREE
TRACE-LIST
VLT DOMAIN
Navigate CLI Modes
The Dell Networking OS prompt changes to indicate the CLI mode. Table 2-1 lists the CLI mode, its
prompt, and information on how to access and exit this CLI mode. You must move linearly through the
command modes, with the exception of the
mode; the
Note: Sub-CONFIGURATION modes all have the letters “conf” in the prompt with additional modifiers to
identify the mode and slot/port information. These are shown in Table 2-1.
exit command moves you up one command mode level.
end command which takes you directly to EXEC Privilege
Configuration Fundamentals | 37
Table 2-1. Dell Networking OS Command Modes
CLI Command Mode Prompt
EXEC
EXEC Privilege
CONFIGURATION
www.dell.com | support.dell.com
Note: Access all of the following modes from CONFIGURATION mode.
ARCHIVEFTOS(conf-archive)archive
AS-P ATH ACLFTOS(config-as-path)#ip as-path access-list
Gigabit Ethernet
Interface
10 Gigabit Ethernet
Interface
Interface Range
Loopback Interface
Management Ethernet
Interface
Access Command
FTOS>
Access the router through the console or Telnet.
FTOS#•From EXEC mode, enter the command enable.
•From any other mode, use the command end.
FTOS(conf)#•From EXEC privilege mode, enter the command
configure.
•From every mode except EXEC and EXEC
Privilege, enter the command
exit.
FTOS(conf-if-gi-0/0)#
FTOS(conf-if-te-0/0)#
FTOS(conf-if-range)#
FTOS(conf-if-lo-0)#
FTOS(conf-if-ma-0/0)#
interface
Null InterfaceFTOS(conf-if-nu-0)#
INTERFACE modes
Port-channel InterfaceFTOS(conf-if-po-0)#
SONET InterfaceFTOS(conf-if-so-0/0)#
VLAN InterfaceFTOS(conf-if-vl-0)#
ST ANDARD ACCESS-
LIST
EXTENDED ACCESS-
LIST
FTOS(config-std-nacl)#
FTOS(config-ext-nacl)#
ip access-list standard
ip access-list extended
IP ACCESS-LIST
IP COMMUNITY-LISTFTOS(config-community-list)#ip community-list
AUXILIARY FTOS(config-line-aux)#
CONSOLEFTOS(config-line-console)#
Enter an EXEC mode command from any CONFIGURATION mode (CONFIGURATION, INTERFACE,
SPANNING TREE, etc.) without returning to EXEC mode by preceding the EXEC mode command with
the command
Note: The following commands cannot be modified by the do command: enable, disable, exit, and
configure.
Figure 2-4. Using the do Command
FTOS(conf)#do show linecard all
www.dell.com | support.dell.com
-- Line cards -Slot Status NxtBoot ReqTyp CurTyp Version Ports
-------------------------------------------------------------------------- 0 not present
1 not present
2 online online E48TB E48TB 1-1-463 48
3 not present
4 not present
5 online online E48VB E48VB 1-1-463 48
do. Figure 2-4 illustrates the do command.
“do” form of show command
Undo Commands
When you enter a command, the command line is added to the running configuration file. Disable a
command and remove it from the running-config by entering the original command preceded by the
command
ip-address
Note: Use the help or ? command as discussed in Obtain Help command to help you construct the “no”
form of a command.
Figure 2-5. Undo a command with the no Command
FTOS(conf)#interface gigabitethernet 4/17
FTOS(conf-if-gi-4/17)#ip address 192.168.10.1/24
FTOS(conf-if-gi-4/17)#show config
!
interface GigabitEthernet 4/17
ip address 192.168.10.1/24
no shutdown
FTOS(conf-if-gi-4/17)#no ip address
FTOS(conf-if-gi-4/17)#show config
!
interface GigabitEthernet 4/17
no ip address
no. For example, to delete an ip address configured on an interface, use the no ip address
command, as shown in Figure 2-5.
IP address assigned
“no” form of IP address command
IP address removed
Layer 2 protocols are disabled by default. Enable them using the no disable command. For example, in
PROTOCOL SPANNING TREE mode, enter
40|Configuration Fundamentals
no disable to enable Spanning Tree.
Obtain Help
Obtain a list of keywords and a brief functional description of those keywords at any CLI mode using the ?
or
help command:
•Enter
? at the prompt or after a keyword to list the keywords available in the current mode.
•
? after a prompt lists all of the available keywords. The output of this command is the same for the
help command.
Figure 2-6. ? Command Example
FTOS#?
calendar Manage the hardware calendar
cd Change current directory
change Change subcommands
clear Reset functions
clock Manage the system clock
configure Configuring from terminal
copy Copy from one file to another
debug Debug functions
--More--
“?” at prompt for list of commands
•? after a partial keyword lists all of the keywords that begin with the specified letters.
Figure 2-7. Keyword? Command Example
FTOS(conf)#cl?
class-map
clock
FTOS(conf)#cl
partial keyword plus “[space]?” for matching keywords
•A keyword followed by [space]? lists all of the keywords that can follow the specified keyword.
Figure 2-8. Keyword ? Command Example
FTOS(conf)#clock ?
summer-time Configure summer (daylight savings) time
timezone Configure time zone
FTOS(conf)#clock
keyword plus “[space]?” for compatible keywords
Enter and Edit Commands
When entering commands:
•The CLI is not case sensitive.
•You can enter partial CLI keywords.
•You must enter the minimum number of letters to uniquely identify a command. For example,
cannot be entered as a partial keyword because both the clock and class-map commands begin with
the letters “cl.”
begins with those three letters.
•The TAB key auto-completes keywords in commands. You must enter the minimum number of letters
to uniquely identify a command.
clo, however, can be entered as a partial keyword because only one command
cl
Configuration Fundamentals | 41
•The UP and DOWN arrow keys display previously entered commands (see Command History).
•The BACKSPACE and DELETE keys erase the previous letter.
•Key combinations are available to move quickly across the command line, as described in Table 2-2.
Table 2-2. Short-Cut Keys and their Actions
Key CombinationAction
CNTL-AMoves the cursor to the beginning of the command line.
CNTL-BMoves the cursor back one character.
CNTL-DDeletes character at cursor.
CNTL-EMoves the cursor to the end of the line.
CNTL-FMoves the cursor forward one character.
www.dell.com | support.dell.com
CNTL-ICompletes a keyword.
CNTL-KDeletes all characters from the cursor to the end of the command line.
CNTL-LRe-enters the previous command.
CNTL-NReturn to more recent commands in the history buffer after recalling commands with CTRL-P or the
UP arrow key.
CNTL-PRecalls commands, beginning with the last command
CNTL-RRe-enters the previous command.
CNTL-UDeletes the line.
CNTL-WDeletes the previous word.
CNTL-XDeletes the line.
CNTL-ZEnds continuous scrolling of command outputs.
Esc BMoves the cursor back one word.
Esc FMoves the cursor forward one word.
Esc DDeletes all characters from the cursor to the end of the word.
Command History
Dell Networking OS maintains a history of previously-entered commands for each mode. For example:
•When you are in EXEC mode, the UP and DOWN arrow keys display the previously-entered EXEC
mode commands.
•When you are in CONFIGURATION mode, the UP or DOWN arrows keys recall the
previously-entered CONFIGURATION mode commands.
42|Configuration Fundamentals
Filter show Command Outputs
Filter the output of a show command to display specific information by adding | [except | find | grep |
no-more | save
filtering and it IS case sensitive unless the
] specified_text after the command. The variable specified_text is the text for which you are
ignore-casesub-option is implemented.
Starting with Dell Networking OS 7.8.1.0, the
grep command accepts an ignore-casesub-option that forces
the search to case-insensitive. For example, the commands:
•show run | grep Ethernet returns a search result with instances containing a capitalized “Ethernet,”
such as interface GigabitEthernet 0/0.
•
show run | grep ethernet would not return that search result because it only searches for instances
containing a non-capitalized “ethernet.”
Executing the command
show run | grep Ethernet ignore-case would return instances containing both
“Ethernet” and “ethernet.”
•
grep displays only the lines containing specified text. Figure 2-9 shows this command used in
combination with the command
show linecard all.
Figure 2-9. Filter Command Outputs with the grep Command
FTOS(conf)#do show linecard all | grep 0
0 not present
Note: Dell Networking OS accepts a space or no space before and after the pipe. To filter on a phrase
with spaces, underscores, or ranges, enclose the phrase with double quotation marks.
•except displays text that does not match the specified text. Figure 2-10 shows this command used in
combination with the command
show linecard all.
Figure 2-10. Filter Command Outputs with the except Command
FTOS#show linecard all | except 0
-- Line cards -Slot Status NxtBoot ReqTyp CurTyp Version Ports
-------------------------------------------------------------------------- 2 not present
3 not present
4 not present
5 not present
6 not present
Configuration Fundamentals | 43
•find displays the output of the show command beginning from the first occurrence of specified text
Figure 2-11 shows this command used in combination with the command
Figure 2-11. Filtering Command Outputs with the find Command
FTOS(conf)#do show linecard all | find 0
0 not present
1 not present
2 online online E48TB E48TB 1-1-463 48
3 not present
4 not present
5 online online E48VB E48VB 1-1-463 48
6 not present
7 not present
no-more displays the output all at once rather than one screen at a time. This is similar to the command
terminal length except that the no-more option affects the output of the specified command only.
•
save copies the output to a file for future reference.
Note: You can filter a single command output multiple times. The save option should be the last option
| grepother-regular-expression | findregular-expression | save
Multiple Users in Configuration mode
Dell Networking OS notifies all users in the event that there are multiple users logged into
CONFIGURATION mode. A warning message indicates the username, type of connection (console or
vty), and in the case of a vty connection, the IP address of the terminal on which the connection was
established. For example:
•On the system that telnets into the switch, Message 1 appears:
Message 1 Multiple Users in Configuration mode Telnet Message
% Warning: The following users are currently configuring the system:
User "<username>" on line console0
•On the system that is connected over the console, Message 2 appears:
Message 2 Multiple Users in Configuration mode Telnet Message
% Warning: User "<username>" on line vty0 "10.11.130.2" is in configuration mode
If either of these messages appears, Dell Networking recommends that you coordinate with the users listed
in the message so that you do not unintentionally overwrite each other’s configuration changes.
44|Configuration Fundamentals
Getting Started
This chapter contains the following major sections:
•Default Configuration
•Configure a Host Name
•Access the System Remotely
•Configure the Enable Password
•Configuration File Management
•File System Management
When you power up the chassis, the system performs a Power-On Self Test (POST) during which Route
Processor Module (RPM), Switch Fabric Module (SFM), and line card status LEDs blink green.The
system then loads Dell Networking OS and boot messages scroll up the terminal window during this
process. No user interaction is required if the boot process proceeds without interruption.
3
When the boot process is complete, the RPM and line card status LEDs remain online (green), and the
console monitor displays EXEC mode prompt.
For details on using the Command Line Interface (CLI), see the Access the Command Line section in
Chapter 2, Configuration Fundamentals.
Default Configuration
A version of Dell Networking OS is pre-loaded onto the chassis, however the system is not configured
when you power up for the first time (except for the default hostname, which is Dell Networking OS). You
must configure the system using the CLI.
Configure a Host Name
The host name appears in the prompt. The default host name is Dell Networking OS.
•Host names must start with a letter and end with a letter or digit.
Getting Started | 45
•Characters within the string can be letters, digits, and hyphens.
To configure a host name:
StepTaskCommand SyntaxCommand Mode
1Create a new host name.
Figure 3-1 illustrates the
Figure 3-1. Configuring a Hostname
hostname command.
Default Hostname
www.dell.com | support.dell.com
FTOS(conf)#hostname R1
R1(conf)#
New Hostname
Access the System Remotely
You can configure the system to access it remotely by Telnet. The method for configuring the C-Series and
E-Series for Telnet access is different from S-Series.
•The C-Series and E-Series have a dedicated management port and a management routing table that is
separate from the IP routing table.
•The S-Series does not have a dedicated management port, but is managed from any port. It does not
have a separate management routing table.
hostname name
CONFIGURATION
Access the C-Series and E-Series Remotely
Note: Use this process for the S60 system.
Configuring the system for Telnet is a three-step process:
1. Configure an IP address for the management port. See Configure the Management Port IP Address.
2. Configure a management route with a default gateway. See Configure a Management Route.
3. Configure a username and password. See Configure a Username and Password.
Configure the Management Port IP Address
Assign IP addresses to the management ports in order to access the system remotely.
46|Getting Started
Note: Assign different IP addresses to each RPM’s management port.
To configure the management port IP address:
StepTaskCommand SyntaxCommand Mode
1Enter INTERFACE mode for the
Management port.
2
3
Assign an IPv4 or IPv6 address to
the interface.
Enable the interface.
Configure a Management Route
Define a path from the system to the network from which you are accessing the system remotely.
Management routes are separate from IP routes and are only used to manage the system through the
management port.
To configure a management route:
interface ManagementEthernet slot/port
•slot range: 0 to 1
•port range: 0
ip address {ipv4-address | ipv6-address}/mask
•ipv4-address: an address in dotted-decimal
format (A.B.C.D).
•ipv6-address: an address in hexadecimal format
(X:X:X:X::X).
•mask: a subnet mask in /prefix-length format (/
xx).
no shutdown
CONFIGURATION
INTERFACE
INTERFACE
StepTaskCommand SyntaxCommand Mode
Configure an IPv4 or IPv6
1
management route to the network
from which you are accessing the
system.
•ip-address: the network address in
dotted-decimal format (A.B.C.D).
•mask: a subnet mask in /prefix-length format (/
xx).
•gateway: the next hop for network traffic
originating from the management port.
CONFIGURATION
Configure a Username and Password
Configure a system username and password to access the system remotely.
Getting Started | 47
To configure a username and password:
StepTaskCommand SyntaxCommand Mode
Configure a username and
1
password to access the system
remotely.
www.dell.com | support.dell.com
Access the S-Series Remotely
The S-Series does not have a dedicated management port nor a separate management routing table.
Configure any port on the S-Series to be the port through which you manage the system and configure an
IP route to that gateway.
Note: The S60 system uses management ports and should be configured similar to the C-Series and
E-Series systems. Refer to Access the C-Series and E-Series Remotely
Configuring the system for Telnet access is a three-step process:
1. Configure an IP address for the port through which you will manage the system using the command
•7 is for inputting a password that is already
encrypted using a Type 7 hash. Obtaining the
encrypted password from the configuration of
another Dell Networking system.
CONFIGURATION
ip
2. Configure a IP route with a default gateway using the command
mode, as shown in Figure 3-2.
3. Configure a username and password using the command
username from CONFIGURATION mode, as
shown in Figure 3-2.
Figure 3-2. Configure the S-Series for Remote Access
The EXEC Privilege mode is accessed by the enable command. Configure a password as a basic security
measure. When using a console connection, EXEC Privilege mode is unrestricted by default; it cannot be
reached by a VTY connection if no password is configured. There are two types of
•
enable password stores the password in the running/startup configuration using a DES encryption
method.
•
enable secret is stored in the running/startup configuration in using a stronger, MD5 encryption
is the privilege level, is 15 by default, and is not required.
encryption-type specifies how you are inputting the password, is 0 by
default, and is not required.
•0 is for inputting the password in clear text.
•7 is for inputting a password that is already encrypted using a
DES hash. Obtain the encrypted password from the configuration
file of another Dell Networking system.
•5 is for inputting a password that is already encrypted using an
MD5 hash. Obtain the encrypted password from the configuration
file of another Dell Networking system.
CONFIGURATION
Configuration File Management
Files can be stored on and accessed from various storage media. Rename, delete, and copy files on the
system from the EXEC Privilege mode.
The E-Series TeraScale and ExaScale platforms architecture use Compact Flash for the internal and
external Flash memory. It has a space limitation but does not limit the number of files it can contain.
Note: Using flash memory cards in the system that have not been approved by Dell Networking can
cause unexpected system behavior, including a reboot.
Getting Started | 49
Copy Files to and from the System
The command syntax for copying files is similar to UNIX. The copy command uses the format copy
source-file-url destination-file-url.
Note: See the Dell Networking OS Command Reference for a detailed description of the copy command.
•To copy a local file to a remote system, combine the file-origin syntax for a local file location with the
file-destination syntax for a remote file location shown in Table 3-1.
•To copy a remote file to Dell Networking system, combine the
location with the
www.dell.com | support.dell.com
Table 3-1. Form a copy Command
Local File Location
Internal flash:
file-destination syntax for a local file location shown in Table 3-1.
•You may not copy a file from one remote system to another.
•You may not copy a file from one location to the same location.
•The internal flash memories on the RPMs are synchronized whenever there is a change, but only if
both RPMs are running the same version of Dell Networking OS.
•When copying to a server, a hostname can only be used if a DNS server is configured.
50|Getting Started
•The usbflash and rpm0usbflash commands are supported on E-Series ExaScale platform only. Refer
to the Dell Networking OS Release Notes for a list of approved USB vendors.
The running-configuration contains the current system configuration. Dell Networking recommends that
you copy your running-configuration to the startup-configuration. The system uses the
startup-configuration during boot-up to configure the system. The startup-configuration is stored in the
internal flash on the primary RPM by default, but it can be saved onto an external flash (on an RPM) or a
remote server.
To save the running-configuration:
Note: The commands in this section follow the same format as those in Copy Files to and from the
System but use the filenames startup-configuration and running-configuration. These commands assume
that current directory is the internal flash, which is the system default.
Getting Started | 51
TaskCommand SyntaxCommand Mode
Save the running-configuration to:
the startup-configuration on the
internal flash of the primary RPM
the internal flash on an RPMcopy running-configrpm{0|1}flash://filename
Note: The internal flash memories on the RPMs are synchronized whenever there
is a change, but only if the RPMs are running the same version of Dell Networking
OS.
Note: Dell Networking OS supports IPv4 and IPv6 addressing for FTP, TFTP, and
www.dell.com | support.dell.com
SCP (in the hostip field).
the external flash of an RPMcopy running-config rpm{0|1}slot0://filename
an FTP server
a TFTP servercopy running-config tftp://{hostip | hostname}/
an SCP servercopy running-config scp://{hostip | hostname}/
Note: When copying to a server, a hostname can only be used if a DNS server is configured.
Save the running-configuration to the
startup-configuration on the internal flash
of the primary RPM. Then copy the new
startup-config file to the external flash of
the primary RPM.
copy running-config startup-config
copy running-config ftp://
username:password
filename
filepath/filename
filepath/filename
copy running-config startup-config duplicate
@{hostip | hostname}/filepath/
EXEC Privilege
EXEC Privilege
Dell Networking OS Behavior: If you create a startup-configuration on an RPM and then move the
RPM to another chassis, the startup-configuration is stored as a backup file (with the extension .bak),
and a new, empty startup-configuration file is created. To restore your original startup-configuration in
this situation, overwrite the new startup-configuration with the original one using the command copy
startup-config.bakstartup-config.
View Files
File information and content can only be viewed on local file systems.
52|Getting Started
To view a list of files on the internal or external Flash:
StepTaskCommand SyntaxCommand Mode
1View a list of files on:
the external flash of an RPM
The output of the command
dir flash:
dir slot:
dir also shows the read/write privileges, size (in bytes), and date of
EXEC Privilegethe internal flash of an RPM
modification for each file, as shown in Figure 3-5.
Figure 3-5. Viewing a List of Files in the Internal Flash
To view the contents of a file:
StepTaskCommand SyntaxCommand Mode
1View the:
contents of a file in the internal flash of
an RPM
contents of a file in the external flash
of an RPM
running-configuration
startup-configuration
show file rpm{0|1}flash://filename
show file rpm{0|1}slot0://filename
show running-config
show startup-config
EXEC Privilege
View Configuration Files
Configuration files have three commented lines at the beginning of the file, as shown in Figure 3-6, to help
you track the last time any user made a change to the file, which user made the changes, and when the file
was last saved to the startup-configuration.
In the running-configuration file, if there is a difference between the timestamp on the “Last configuration
change,” and “Startup-config last updated,” then you have made changes that have not been saved and will
not be preserved upon a system reboot.
Getting Started | 53
Figure 3-6. Track Changes with Configuration Comments
FTOS#show running-config
Current Configuration ...
! Version 8.2.1.0
! Last configuration change at Thu Apr 3 23:06:28 2008 by admin
! Startup-config last updated at Thu Apr 3 23:06:55 2008 by admin
!
boot system rpm0 primary flash://FTOS-EF-8.2.1.0.bin
boot system rpm0 secondary flash://FTOS-EF-7.8.1.0.bin
boot system rpm0 default flash://FTOS-EF-7.7.1.1.bin
boot system rpm1 primary flash://FTOS-EF-7.8.1.0.bin
boot system gateway 10.10.10.100
--More--
www.dell.com | support.dell.com
File System Management
The Dell Networking system can use the internal Flash, external Flash, or remote devices to store files. It
stores files on the internal Flash by default but can be configured to store files elsewhere.
To view file system information:
TaskCommand SyntaxCommand Mode
View information about each file system.
The output of the command
show file-systems (Figure 3-7) shows the total capacity, amount of free
show file-systems
EXEC Privilege
memory, file structure, media type, read/write privileges for each storage device in use.
You can change the default file system so that file management commands apply to a particular device or
memory.
To change the default storage location:
TaskCommand SyntaxCommand Mode
Change the default directory.
cd directory
EXEC Privilege
In Figure 3-8, the default storage location is changed to the external Flash of the primary RPM. File
management commands then apply to the external Flash rather than the internal Flash.
54|Getting Started
Figure 3-8. Alternative Storage Location
FTOS#cd slot0:
FTOS#copy running-config test
FTOS#copy run test
!
7419 bytes successfully copied
FTOS#dir
Directory of slot0:
1 drw- 32768 Jan 01 1980 00:00:00 .
2 drwx 512 Jul 23 2007 00:38:44 ..
3 ---- 0 Jan 01 1970 00:00:00 DCIM
4 -rw- 7419 Jul 23 2007 20:44:40 test
5 ---- 0 Jan 01 1970 00:00:00 BT
6 ---- 0 Jan 01 1970 00:00:00 200702~1VSN
7 ---- 0 Jan 01 1970 00:00:00 G
8 ---- 0 Jan 01 1970 00:00:00 F
9 ---- 0 Jan 01 1970 00:00:00 F
slot0: 127772672 bytes total (21927936 bytes free)
View command history
The command-history trace feature captures all commands entered by all users of the system with a time
stamp and writes these messages to a dedicated trace log buffer. The system generates a trace message for
each executed command. No password information is saved to the file.
No File System Specified
File Saved to External Flash
To view the command-history trace, use the
show command-history command, as shown in Figure 3-9.
Note: To upgrade or downgrade Dell Networking OS, see the release notes for the version you want to
load on the system.
Getting Started | 55
www.dell.com | support.dell.com
56|Getting Started
System Management
System Management is supported on platforms: c e s
This chapter explains the different protocols or services used to manage the Dell Networking system
including:
•Configure Privilege Levels
•Configure Logging
•File Transfer Services
•Terminal Lines
•Lock CONFIGURATION mode
•Recovering from a Forgotten Password
•Recovering from a Forgotten Password on S-Series
•Recovering from a Failed Start
4
Configure Privilege Levels
Privilege levels restrict access to commands based on user or terminal line. There are 16 privilege levels, of
which three are pre-defined. The default privilege level is 1.
•Level 0—Access to the system begins at EXEC mode, and EXEC mode commands are limited to
enable, disable, and exit.
•Level 1—Access to the system begins at EXEC mode, and all commands are available.
•Level 15—Access to the system begins at EXEC Privilege mode, and all commands are available.
Create a Custom Privilege Level
Custom privilege levels start with the default EXEC mode command set. You can then customize privilege
levels 2-14 by:
•restricting access to an EXEC mode command
•moving commands from EXEC Privilege to EXEC mode
•restricting access
System Management | 57
A user can access all commands at his privilege level and below.
Remove a command from EXEC mode
Remove a command from the list of available commands in EXEC mode for a specific privilege level
using the command
privilege exec from CONFIGURATION mode. In the command, specify a level greater
than the level given to a user or terminal line, followed by the first keyword of each command to be
restricted.
Move a command from EXEC Privilege mode to EXEC mode
Move a command from EXEC Privilege to EXEC mode for a privilege level using the command privilege
www.dell.com | support.dell.com
from CONFIGURATION mode. In the command, specify the privilege level of the user or terminal
exec
line, and specify all keywords in the command to which you want to allow access.
Allow Access to CONFIGURATION mode commands
Allow access to CONFIGURATION mode using the command privilege exec level levelconfigure from
CONFIGURATION mode. A user that enters CONFIGURATION mode remains at his privilege level, and
has access to only two commands,
mode command to which you want to allow access using the command
command, specify the privilege level of the user or terminal line, and specify all keywords in the command
to which you want to allow access.
end and exit. You must individually specify each CONFIGURATION
privilege configure level level. In the
Allow Access to INTERFACE, LINE, ROUTE-MAP, and ROUTER mode
1. Similar to allowing access to CONFIGURATION mode, to allow access to INTERFACE, LINE,
ROUTE-MAP, and ROUTER modes, you must first allow access to the command that enters you into
the mode. For example, allow a user to enter INTERFACE mode using the command
configure level level interface
gigabitethernet
2. Then, individually identify the INTERFACE, LINE, ROUTE-MAP or ROUTER commands to which
you want to allow access using the command
privilege {interface | line | route-map | router} level level.
In the command, specify the privilege level of the user or terminal line, and specify all keywords in the
command to which you want to allow access.
The following table lists the configuration tasks you can use to customize a privilege level:
TaskCommand SyntaxCommand Mode
Remove a command from the list of available commands
in EXEC mode.
Move a command from EXEC Privilege to EXEC mode.privilegeexeclevellevel
Allow access to CONFIGURATION mode.privilegeexeclevellevel
privilege exec level level
{command ||...|| command}
{command ||...|| command}
configure
privilege
CONFIGURATION
CONFIGURATION
CONFIGURATION
58|System Management
TaskCommand SyntaxCommand Mode
Allow access to INTERFACE, LINE, ROUTE-MAP,
and/or ROUTER mode. Specify all keywords in the
command.
Allow access to a CONFIGURATION, INTERFACE,
LINE, ROUTE-MAP, and/or ROUTER mode command.
The configuration in Figure 4-1 creates privilege level 3. This level:
•removes the
•moves the command
resequence command from EXEC mode by requiring a minimum of privilege level 4,
capture bgp-pdu max-buffer-size from EXEC Privilege to EXEC mode by,
requiring a minimum privilege level 3, which is the configured level for VTY 0,
•allows access to CONFIGURATION mode with the
•allows access to INTERFACE and LINE modes are allowed with no commands.
privilege configure level level
{interface | line | route-map |
router} {command-keyword ||...||
command-keyword}
privilege {configure |interface |
line | route-map | router} level
configure Configuring from terminal
disable Turn off privileged commands
enable Turn on privileged commands
exit Exit from the EXEC
ip Global IP subcommands
monitor Monitoring feature
mtrace Trace reverse multicast path from destination to source
ping Send echo messages
quit Exit from the EXEC
show Show running system information
[output omitted]
FTOS#config
[output omitted]
FTOS(conf)#do show priv
Current privilege level is 3.
FTOS(conf)#?
end Exit from configuration mode
exit Exit from configuration mode
interface Select an interface to configure
line Configure a terminal line
linecard Set line card type
FTOS(conf)#interface ?
fastethernet Fast Ethernet interface
gigabitethernet Gigabit Ethernet interface
loopback Loopback interface
managementethernet Management Ethernet interface
null Null interface
port-channel Port-channel interface
range Configure interface range
sonet SONET interface
tengigabitethernet TenGigabit Ethernet interface
vlan VLAN interface
FTOS(conf)#interface gigabitethernet 1/1
FTOS(conf-if-gi-1/1)#?
end Exit from configuration mode
exit Exit from interface configuration mode
FTOS(conf-if-gi-1/1)#exit
FTOS(conf)#line ?
aux Auxiliary line
console Primary terminal line
vty Virtual terminal
FTOS(conf)#line vty 0
FTOS(config-line-vty)#?
exit Exit from line configuration mode
FTOS(config-line-vty)#
60|System Management
Apply a Privilege Level to a Username
To set a privilege level for a user:
TaskCommand SyntaxCommand Mode
Configure a privilege level for a user.
username username privilege level
CONFIGURATION
Apply a Privilege Level to a Terminal Line
To set a privilege level for a terminal line:
TaskCommand SyntaxCommand Mode
Configure a privilege level for a terminal line.
Note: When you assign a privilege level between 2 and 15, access to the system begins at EXEC mode,
but the prompt is hostname#, rather than hostname>.
privilege level level
LINE
Configure Logging
Dell Networking OS tracks changes in the system using event and error messages. By default, Dell
Networking OS logs these messages on:
•the internal buffer
•console and terminal lines, and
•any configured syslog servers
Disable Logging
To disable logging:
TaskCommand SyntaxCommand Mode
Disable all logging except on the console.
Disable logging to the logging buffer.
Disable logging to terminal lines.
Disable console logging.
no logging on
no logging buffer
no logging monitor
no logging console
CONFIGURATION
CONFIGURATION
CONFIGURATION
CONFIGURATION
System Management | 61
Log Messages in the Logging Buffer
All error messages, except those beginning with %BOOTUP (Message 1), are log in the internal buffer.
The following list includes the configuration tasks for system log management:
www.dell.com | support.dell.com
•Disable System Logging
•Send System Messages to a Syslog Server
Disable System Logging
By default, logging is enabled and log messages are sent to the logging buffer, all terminal lines, console,
and syslog servers.
Enable and disable system logging using the following commands:
TaskCommand SyntaxCommand Mode
Disable all logging except on the console.
Disable logging to the logging buffer.
Disable logging to terminal lines.
Disable console logging.
no logging on
no logging buffer
no logging monitor
no logging console
CONFIGURATION
CONFIGURATION
CONFIGURATION
CONFIGURATION
62|System Management
Send System Messages to a Syslog Server
Send system messages to a syslog server by specifying a server:
TaskCommand SyntaxCommand Mode
Specify the server to which you want to send system
messages. You can configure up to eight syslog servers,
which may be IPv4 and/or IPv6 addressed.
logging {ip-address | ipv6-address
| hostname}
Configure a Unix System as a Syslog Server
Configure a UNIX system as a syslog server by adding the following lines to /etc/syslog.conf on the Unix
system and assigning write permissions to the file.
•on a 4.1 BSD UNIX system, add the line: local7.debugging /var/log/force10.log
•on a 5.7 SunOS UNIX system, add the line: local7.debugging /var/adm/force10.log
In the lines above, local7 is the logging facility level and debugging is the severity level.
Change System Logging Settings
You can change the default system logging settings (severity level and the storage location). The default is
to log all messages up to debug level.
CONFIGURATION
TaskCommand SyntaxCommand Mode
Specify the minimum severity level for logging to the
logging buffer.
Specify the minimum severity level for logging to the
console.
Specify the minimum severity level for logging to
terminal lines.
Specifying the minimum severity level for logging to a
syslog server.
Specify the minimum severity level for logging to the
syslog history table.
logging buffered levelCONFIGURATION
logging console level
logging monitor level
logging trap level
logging history level
CONFIGURATION
CONFIGURATION
CONFIGURATION
CONFIGURATION
System Management | 63
TaskCommand SyntaxCommand Mode
Specify the size of the logging buffer.
Note: When you decrease the buffer size, Dell
Networking OS deletes all messages stored in the buffer.
Increasing the buffer size does not affect messages in the
buffer.
Specify the number of messages that Dell Networking
OS saves to its logging history table.
logging buffered sizeCONFIGURATION
logging history size size
CONFIGURATION
Display the logging buffer and configuration using the show logging command from EXEC Privilege
www.dell.com | support.dell.com
mode, as shown in Figure 4-2.
Display the logging configuration using the
show running-config logging command from EXEC
Privilege mode, as shown in Figure 4-3.
Display the Logging Buffer and the Logging Configuration
Display the current contents of the logging buffer and the logging settings for the system using the show
logging
command from EXEC Privilege mode, as shown in Figure 4-2.
64|System Management
Figure 4-2. show logging Command Example
FTOS#show logging
syslog logging: enabled
Console logging: level Debugging
Monitor logging: level Debugging
Buffer logging: level Debugging, 40 Messages Logged, Size (40960 bytes)
Trap logging: level Informational
%IRC-6-IRC_COMMUP: Link to peer RPM is up
%RAM-6-RAM_TASK: RPM1 is transitioning to Primary RPM.
%RPM-2-MSG:CP1 %POLLMGR-2-MMC_STATE: External flash disk missing in 'slot0:'
%CHMGR-5-CARDDETECTED: Line card 0 present
%CHMGR-5-CARDDETECTED: Line card 2 present
%CHMGR-5-CARDDETECTED: Line card 4 present
%CHMGR-5-CARDDETECTED: Line card 5 present
%CHMGR-5-CARDDETECTED: Line card 8 present
%CHMGR-5-CARDDETECTED: Line card 10 present
%CHMGR-5-CARDDETECTED: Line card 12 present
%TSM-6-SFM_DISCOVERY: Found SFM 0
%TSM-6-SFM_DISCOVERY: Found SFM 1
%TSM-6-SFM_DISCOVERY: Found SFM 2
%TSM-6-SFM_DISCOVERY: Found SFM 3
%TSM-6-SFM_DISCOVERY: Found SFM 4
%TSM-6-SFM_DISCOVERY: Found SFM 5
%TSM-6-SFM_DISCOVERY: Found SFM 6
%TSM-6-SFM_DISCOVERY: Found SFM 7
%TSM-6-SFM_SWITCHFAB_STATE: Switch Fabric: UP
%TSM-6-SFM_DISCOVERY: Found SFM 8
%TSM-6-SFM_DISCOVERY: Found 9 SFMs
%CHMGR-5-CHECKIN: Checkin from line card 5 (type EX1YB, 1 ports)
%TSM-6-PORT_CONFIG: Port link status for LC 5 => portpipe 0: OK portpipe 1: N/A
%CHMGR-5-LINECARDUP: Line card 5 is up
%CHMGR-5-CHECKIN: Checkin from line card 12 (type S12YC12, 12 ports)
%TSM-6-PORT_CONFIG: Port link status for LC 12 => portpipe 0: OK portpipe 1: N/A
%CHMGR-5-LINECARDUP: Line card 12 is up
%IFMGR-5-CSTATE_UP: changed interface Physical state to up: So 12/8
%IFMGR-5-CSTATE_DN: changed interface Physical state to down: So 12/8
System Management | 65
Configure a UNIX Logging Facility Level
Facility is a message tag used to describe the application or process that submitted the log message. You
can save system log messages with a UNIX system logging facility:
Command SyntaxCommand ModePurpose
logging facility [facility-type]CONFIGURATION Specify one of the following parameters.
www.dell.com | support.dell.com
•auth (for authorization messages)
•cron (for system scheduler messages)
•daemon (for system daemons)
•kern (for kernel messages)
•local0 (for local use)
•local1 (for local use)
•local2 (for local use)
•local3 (for local use)
•local4 (for local use)
•local5 (for local use)
•local6 (for local use)
•local7 (for local use). This is the default.
•lpr (for line printer system messages)
•mail (for mail system messages)
•news (for USENET news messages)
•sys9 (system use)
•sys10 (system use)
•sys11 (system use)
•sys12 (system use)
•sys13 (system use)
•sys14 (system use)
•syslog (for syslog messages)
•user (for user programs)
•uucp (UNIX to UNIX copy protocol)
The default is local7.
Display non-default settings using the
shown in Figure 4-3.
Figure 4-3. show running-config logging Command Example
show running-config logging command from EXEC mode, as
Synchronize Log Messages
You can configure a terminal line to hold all logs until all command inputs and outputs are complete so that
log printing does not interfere when you are performing management tasks. Log synchronization also
filters system messages for a specific line based on severity level and limits number of messages that are
printed at once.
StepTaskCommand SyntaxCommand Mode
1Enter the LINE mode. Configure the
following parameters for the virtual
terminal lines:
•number range: zero (0) to 8.
•end-number range: 1 to 8.
You can configure multiple virtual
terminals at one time by entering a
followed by an end-number.
2
Set a level and the maximum number of
messages to be printed. The following
parameters are optional:
•levelseverity-level range: 0 to 7.
Default is 2. Use the all keyword to
include all messages.
•limit range: 20 to 300. Default is 20.
Display the logging synchronous configuration using the
number
line {console 0 | vty number
[end-number] | aux 0}
logging synchronous [level
severity-level | all] [limit]
show config command from LINE mode.
Enable Timestamp on Syslog Messages
Syslog messages, by default, do not include a time/date stamp stating when the error or message was
created. To have Dell Networking OS include a timestamp with the syslog message:
CONFIGURATION
LINE
PurposeCommand SyntaxCommand Mode
Add timestamp to syslog messages. Specify
the following optional parameters:
•datetime: You can add the keyword
localtime to include the localtime, msec,
and show-timezone. If you do not add
the keyword localtime, the time is UTC.
•uptime. To view time since the last boot.
Display your configuration using the command
service timestamps [log | debug] [datetime
[
localtime] [msec] [show-timezone] |
uptime]
Default: uptime
show running-config logging from EXEC Privilege
CONFIGURATION
mode, as shown in Figure 4-3.
System Management | 67
File Transfer Services
You can configure the system to transfer files over the network using File Transfer Protocol (FTP).
Configuration Task List for File Transfer Services
The following list includes the configuration tasks for file transfer services:
•Enable FTP server
•Configure FTP server parameters
•Configure FTP client parameters
www.dell.com | support.dell.com
Enable FTP server
To make the system an FTP server:
TaskCommand SyntaxCommand Mode
Make the system an FTP server.
Display your FTP configuration using the command
ftp-server enable
show running-config ftp from EXEC Privilege mode,
CONFIGURATION
as shown in Figure 4-4.
Figure 4-4. show running-config ftp Command Example
Specify the directory for users using FTP to reach the
system. The default is the internal flash.
Specify a user name for all FTP users and configure either
a plain text or encrypted password. Configure the
following optional and required parameters:
•username: Enter a text string
•encryption-type: Enter 0 for plain text or 7 for
encrypted text.
Note: You cannot use the change directory (cd) command until ftp-server topdir is configured.
Display your FTP configuration using the command show running-config ftp from EXEC Privilege mode,
as shown in Figure 4-4.
Configure FTP client parameters
When the system will be an FTP client, configure FTP client parameters:
TaskCommand SyntaxCommand Mode
Specify a source interface.ip ftpsource-interfaceinterfaceCONFIGURATION
Configure a password.
Enter username to use on FTP client.ip ftp usernamenameCONFIGURATION
Display the FTP configuration using the command
ip ftp password password
show running-config ftp from EXEC Privilege mode,
CONFIGURATION
Figure 4-4.
Terminal Lines
You can access the system remotely and restrict access to the system by creating user profiles. The terminal
lines on the system provide different means of accessing the system. The console line (console) connects
you through the Console port in the RPMs. The virtual terminal lines (VTY) connect you through Telnet to
the system. The auxiliary line (aux) connects secondary devices such as modems.
Deny and Permit Access to a Terminal Line
Dell recommends applying only standard ACLs to deny and permit access to VTY lines.
•Layer 3 ACL deny all traf fic that is not explicitly permitted, but in the case of VTY lines, an ACL with
no rules does not deny any traffic.
•Y ou cannot use
a VTY line.
show ip accounting access-list to display the contents of an ACL that is applied only to
To apply an IP ACL to a line:
TaskCommand SyntaxCommand Mode
Apply an ACL to a VTY line.ip access-classaccess-listLINE
To view the configuration, enter the
show config command in the LINE mode, as shown in Figure 4-5.
System Management | 69
Figure 4-5. Applying an Access List to a VTY Line
FTOS(config-std-nacl)#show config
!
ip access-list standard myvtyacl
seq 5 permit host 10.11.0.1
FTOS(config-std-nacl)#line vty 0
FTOS(config-line-vty)#show config
line vty 0
access-class myvtyacl
Dell Networking OS Behavior: Prior to Dell Networking OS version 7.4.2.0, in order to deny access
on a VTY line, you must apply an ACL and AAA authentication to the line. Then users are denied
access only after they enter a username and password. Beginning in Dell Networking OS version
7.4.2.0, only an ACL is required, and users are denied access before they are prompted for a
www.dell.com | support.dell.com
username and password.
Configure Login Authentication for Terminal Lines
You can use any combination of up to 6 authentication methods to authenticate a user on a terminal line. A
combination of authentication methods is called a method list. If the user fails the first authentication
method, Dell Networking OS prompts the next method until all methods are exhausted, at which point the
connection is terminated. The available authentication methods are:
•
enable—Prompt for the enable password.
•
line—Prompt for the e password you assigned to the terminal line. You must configure a password for
the terminal line to which you assign a method list that contains the
line authentication method.
Configure a password using the command password from LINE mode.
•
local—Prompt for the the system username and password.
•
none—Do not authenticate the user.
•
radius—Prompt for a username and password and use a RADIUS server to authenticate.
•
tacacs+—Prompt for a username and password and use a TACACS+ server to authenticate.
To configure authentication for a terminal line:
StepTaskCommand SyntaxCommand Mode
1Create an authentication method list.
You may use a mnemonic name or
use the keyword default. The default
authentication method for terminal
lines is local, and the default method
list is empty.
EXEC timeout is a basic security feature that returns Dell Networking OS to the EXEC mode after a period
of inactivity on terminal lines.
To change the timeout period or disable EXEC timeout.
TaskCommand SyntaxCommand Mode
Set the number of minutes and seconds.
Default: 10 minutes on console, 30 minutes on VTY.
Disable EXEC timeout by setting the timeout period to 0.
Return to the default timeout values.
View the configuration using the command
exec-timeout minutes [seconds]
no exec-timeout
show config from LINE mode.
LINE
LINE
System Management | 71
Figure 4-7. Configuring EXEC Timeout
FTOS(conf)#line con 0
FTOS(config-line-console)#exec-timeout 0
FTOS(config-line-console)#show config
line console 0
exec-timeout 0 0
FTOS(config-line-console)#
Telnet to Another Network Device
To telnet to another device:
www.dell.com | support.dell.com
TaskCommand SyntaxCommand Mode
Telnet to the peer RPM. You do not need to configure the management
port on the peer RPM to be able to telnet to it.
Telnet to a device with an IPv4 or IPv6 address. If you do not enter an IP
address, Dell Networking OS enters a Telnet dialog that prompts you for
one.
•Enter an IPv4 address in dotted decimal format (A.B.C.D).
•Enter an IPv6 address in the format
0000:0000:0000:0000:0000:0000:0000:0000. Elision of zeros is
supported.
Note: Telnet to link-local addresses is not supported.
Figure 4-8. Telnet to Another Network Device
FTOS# telnet 10.11.80.203
Trying 10.11.80.203...
Connected to 10.11.80.203.
Exit character is '^]'.
Login:
Login: admin
Password:
FTOS>exit
FTOS#telnet 2200:2200:2200:2200:2200::2201
Trying 2200:2200:2200:2200:2200::2201...
Connected to 2200:2200:2200:2200:2200::2201.
Exit character is '^]'.
FreeBSD/i386 (freebsd2.force10networks.com) (ttyp1)
login: admin
FTOS#
telnet-peer-rpm
telnet[ipv4-address |
ipv6-address]
EXEC Privilege
EXEC Privilege
Lock CONFIGURATION mode
Dell Networking OS allows multiple users to make configurations at the same time. You can lock
CONFIGURATION mode so that only one user can be in CONFIGURATION mode at any time
(Message 2).
72|System Management
A two types of locks can be set: auto and manual.
•Set an auto-lock using the command
configuration mode exclusive auto from CONFIGURATION
mode. When you set an auto-lock, every time a user is in CONFIGURATION mode all other users are
denied access. This means that you can exit to EXEC Privilege mode, and re-enter
CONFIGURATION mode without having to set the lock again.
•Set a manual lock using the command
configure terminal lock from CONFIGURATION mode. When
you configure a manual lock, which is the default, you must enter this command time you want to enter
CONFIGURATION mode and deny access to others.
Figure 4-9. Lock CONFIGURATION mode
R1(conf)#configuration mode exclusive auto
BATMAN(conf)#exit
3d23h35m: %RPM0-P:CP %SYS-5-CONFIG_I: Configured from console by console
If another user attempts to enter CONFIGURATION mode while a lock is in place, Message 1 appears on
their terminal.
Message 1 CONFIGURATION mode Locked Error
% Error: User "" on line console0 is in exclusive configuration mode
If any user is already in CONFIGURATION mode when while a lock is in place, Message 2 appears on
their terminal.
Message 2 Cannot Lock CONFIGURATION mode Error
% Error: Can't lock configuration mode exclusively since the following users are currently
configuring the system:
User "admin" on line vty1 ( 10.1.1.1 )
Note: The CONFIGURATION mode lock corresponds to a VTY session, not a user. Therefore, if you
configure a lock and then exit CONFIGURATION mode, and another user enters CONFIGURATION
mode, when you attempt to re-enter CONFIGURATION mode, you are denied access even though you
are the one that configured the lock.
Note: If your session times out and you return to EXEC mode, the CONFIGURATION mode lock is
unconfigured.
View the Configuration Lock Status
If you attempt to enter CONFIGURATION mode when another user has locked it, you may view which
user has control of CONFIGURATION mode using the command
Privilege mode.
show configuration lock from EXEC
System Management | 73
You can then send any user a message using the send command from EXEC Privilege mode. Alternatively
you can clear any line using the command
clear from EXEC Privilege mode. If you clear a console session,
the user is returned to EXEC mode.
Recovering from a Forgotten Password
If you configure authentication for the console and you exit out of EXEC mode or your console session
times out, you are prompted for a password to re-enter.
If you forget your password:
www.dell.com | support.dell.com
StepTaskCommand SyntaxCommand Mode
1Log onto the system via console.
2Power-cycle the chassis by switching off all of the power modules and then switching them back on.
3Abort bootup by sending the break
signal when prompted.
Figure 4-10. Enter BOOT_USER mode
Type "go 0x00040004" to enter the Dell Networking OS BLI shell
You can use U-boot native networking facilities
============================================================
Hit any key to stop autoboot: 0
Starting F10 BLI Shell ...
RPM0-CP BOOT_ADMIN # dir flash:
Directory of flash:
1 -rwx 11407411 Jun 09 2004 09:38:40 FTOS-EE3-5.3.1.1.bin
2 -rwx 4977 Jun 09 2004 09:38:38 startup-config.bak
7Reload the system.reloadBOOT_ADMIN
8Copy startup-config.bak to the
running config.
9Remove all authentication statements
you might have for the console.
copy flash://startup-config.bak
running-config
no authentication login
no password
EXEC Privilege
LINE
10Save the running-config.copy running-config startup-configEXEC Privilege
Recovering from a Forgotten Enable Password
If you forget the enable password:
StepTaskCommand SyntaxCommand Mode
1Log onto the system via console.
2Eject the secondary RPM if there is one.
3Power-cycle the chassis by switching off all of the power modules and then switching them back on.
4Abort bootup by sending the break
signal when prompted. See
Figure 4-10.
5Configure the system to ignore the
enable password on bootup.
Note: This command only bypasses
the enable password once. You must
repeat this procedure to bypass it
again.
Ctrl+Shift+6
ignore enable-passwordBOOT_USER
Figure 4-13. Ignore the Enable Password
***** Welcome to FTOS Boot Interface *****
Use "help" or "?" for more information.
BOOT_USER # ignore enable-password
6Reload the system.reloadBOOT_USER
7Configure a new enable password.enable {secret | password}CONFIGURATION
8Insert the secondary RPM.
System Management | 75
StepTaskCommand SyntaxCommand Mode
9Save the running-config to the
startup-config. The startup-config
files on both RPMs will be
synchronized.
Recovering from a Forgotten Password on S-Series
If you configure authentication for the console and you exit out of EXEC mode or your console session
times out, you are prompted for a password to re-enter.
www.dell.com | support.dell.com
If you forget your password:
StepTaskCommand SyntaxCommand Mode
1Log onto the system via console.
2Power-cycle the chassis by unplugging the power cord.
3Abort bootup by sending the break
signal when prompted.
Figure 4-14. Enter BOOT_USER mode
Type "go 0x00040004" to enter the Dell Networking OS BLI shell
You can use U-boot native networking facilities
============================================================
copy running-config startup-configEXEC Privilege
(any key)
***** Welcome to FTOS Boot Interface *****
Use "help" or "?" for more information.
BOOT_USER #
4Configure the system to ignore the
ignore startup-configBOOT_USER
startup-config, which prevents the
system from prompting you for a
password to enter EXEC mode.
Note: This command only bypasses
the password once. You must repeat
this procedure to bypass it again.
5Remove all authentication statements
no authentication loginCONFIGURATION
you might have for the console.
6Reload the system.reloadBOOT_USER
76|System Management
Recovering from a Failed Start
A system that does not start correctly might be attempting to boot from a corrupted Dell Networking OS
image or from a incorrect location. To resolve the problem, you can restart the system and interrupt the
boot process to point the system to another boot location by using the
below. For details on the
boot change command, its supporting commands, and other commands that can
help recover from a failed start, refer to the BOOT_USER chapter in the Dell Networking OS Command
Reference.
StepTaskCommand SyntaxCommand Mode
1Power-cycle the chassis (pull the power cord and reinsert it).
boot change command, as described
2Abort bootup by sending the break
signal when prompted.
3Tell the system where to access the
Dell Networking OS image used to
boot the system:
•Enter primary to configure the boot
parameters used in the first attempt
to boot the system.
•Enter secondary for when the
primary operating system boot
selection is not available.
•Enter default to configure boot
parameters used if the secondary
operating system boot parameter
selection is not available. The
default location should always be
the internal flash device (flash:),
and a verified image should be
stored there.
4On S-Series systems only , assign a port
to be the Management Ethernet
interface.
5Assign an IP address to the
Management Ethernet interface.
Ctrl-Shift 6 (Ctrl-^)—C-Series and E-Series
(On the S-Series, hit any key)
boot change {primary | secondary | default}
After entering the keywords and desired option,
press Enter. The software prompts you to enter
the following:
• boot device (ftp, tftp, flash, slot0)
Note: S-Series can only use a TFTP location.
• image file name
• IP address of the server with the image
• username and password (only for FTP)
interface management ethernet port portIDBOOT_USER
[no] interface management ethernet ip
address ip-address mask
(during bootup)
BOOT_USER
BOOT_USER
6(OPTIONAL) On C- and E-Series
systems only, configure speed, duplex,
and negotiation settings for the
management interface.
7Assign an IP address as the default
gateway for the system.
8Reload the system.reloadBOOT_USER
interface management port config
{half-duplex | full-duplex | 10m | 100m |
auto-negotiation | no auto-negotiation | show}
[no] default-gateway ip-addressBOOT_USER
BOOT_USER
System Management | 77
Very similar to the options of the boot change command, the boot system command is available in
CONFIGURATION mode on the C-Series and E-Series to set the boot parameters that, when saved to the
startup configuration file, are stored in NVRAM and are then used routinely:
TaskCommand SyntaxCommand Mode
Configure the system to routinely boot from the
designated location.
After entering rpm0 or rpm1, enter one of the three
keywords and then the
file-url.
You can use the command for each of the
combinations of RPM and option.
www.dell.com | support.dell.com
Also, because the C-Series and E-Series can boot from an external flash, you can recover from a failed
boot image on the flash by simply fixing that source. For details on boot code and Dell Networking OS
setup, see the Dell Networking OS Release Notes for the specific Dell Networking OS versions that you
want to use.
The network boot facility has only become available on the S-Series with Dell Networking OS 7.8.1.0 and
its accompanying boot code. In addition to installing Dell Networking OS 7.8.1.0, you must separately
install that new boot code. For installation details, see the S-Series and Dell Networking OS Release Notes
for Version 7.8.1.0.
•on the internal Flash, enter
followed by the filename.
•on an FTP server, enter
flash://
ftp://
user:password@hostip/filepath
•on the external Flash, enter slot0://
followed by the filename.
•on a TFTP server, enter tftp://hostip/
filepath
CONFIGURATION
78|System Management
802.1ag
802.1ag is available only on platform: s
Ethernet Operations, Administration, and Maintenance (OAM) is a set of tools used to install, monitor,
troubleshoot and manage Ethernet infrastructure deployments. Ethernet OAM consists of three main areas:
1. Service Layer OAM: IEEE 802.1ag Connectivity Fault Management (CFM)
2. Link Layer OAM: IEEE 802.3ah OAM
3. Ethernet Local management Interface (MEF-16 E-LMI)
Ethernet CFM
5
Ethernet CFM is an end-to-end, per-service-instance Ethernet OAM scheme which enables: proactive
connectivity monitoring, fault verification, and fault isolation.
The service-instance in the OAM for Metro/Carrier Ethernet context is a VLAN. This service is sold to an
end-customer by a network service provider. Typically the service provider contracts with multiple
network operators to provide end-to-end service between customers. For end-to-end service between
customer switches, connectivity must be present across the service provider through multiple network
operators.
Layer 2 Ethernet networks usually cannot be managed with IP tools such as ICMP Ping and IP Traceroute.
Traditional IP tools often fail because:
•there are complex interactions between various Layer 2 and Layer 3 protocols such as STP, LAG,
VRRP and ECMP configurations.
•Ping and traceroute are not designed to verify data connectivity in the network and within each node in
the network (such as in the switching fabric and hardware forwarding tables).
•when networks are built from different operational domains, access controls impose restrictions that
cannot be overcome at the IP level, resulting in poor fault visibility. There is a need for hierarchical
domains that can be monitored and maintained independently by each provider or operator.
•routing protocols choose a subset of the total network topology for forwarding, making it hard to detect
faults in links and nodes that are not included in the active routing topology. This is made more
complex when using some form of Traffic Engineering (TE) based routing.
•network and element discovery and cataloging is not clearly defined using IP troubleshooting tools.
802.1ag | 79
There is a need for Layer 2 equivalents to manage and troubleshoot native Layer 2 Ethernet networks. With
these tools, you can identify , isolate, and repair faults quickly and easily, which reduces operational cost of
running the network. OAM also increases availability and reduces mean time to recovery , which allows for
tighter service level agreements, resulting in increased revenue for the service provider.
In addition to providing end-to-end OAM in native Layer 2 Ethernet Service Provider/Metro networks,
you can also use CFM to manage and troubleshoot any Layer 2 network including enterprise, datacenter,
and cluster networks.
Maintenance Domains
www.dell.com | support.dell.com
Connectivity Fault Management (CFM) divides a network into hierarchical maintenance domains, as
shown in Figure 5-1.
A CFM maintenance domain is a management space on a network that is owned and operated by a single
management entity . The network administrator assigns a unique maintenance level (0 to 7) to each domain
to define the hierarchical relationship between domains. Domains can touch or nest but cannot overlap or
intersect as that would require management by multiple entities.
Figure 5-1. OAM Domains
Customer Network
Ethernet Access
Operator Domain (5)
Service Provider Network
MPLS CoreMPLS Access
Customer Domain (7)
Provider Domain (6)
)
Operator Dom
M
PLS D
ain (5
omain (
4)
erator Do
Op
Customer Network
main (5)
Maintenance Points
Domains are comprised of logical entities called Maintenance Points. A maintenance point is an interface
demarcation that confines CFM frames to a domain. There are two types of maintenance points:
•Maintenance End Points (MEPs): a logical entity that marks the end-point of a domain
•Maintenance Intermediate Points (MIPs): a logical entity configured at a port of a switch that is an
intermediate point of a Maintenance Entity (ME). An ME is a point-to-point relationship between two
MEPs within a single domain. MIPs are internal to a domain, not at the boundary , and respond to CFM
only when triggered by linktrace and loopback messages. MIPs can be configured to snoop Continuity
Check Messages (CCMs) to build a MIP CCM database.
80|802.1ag
These roles define the relationships between all devices so that each device can monitor the layers under its
responsibility. Maintenance points drop all lower-level frames and forward all higher-level frames.
Figure 5-2. Maintenance Points
Customer Network
Service Provider Network
Customer Network
Ethernet Access
Operator Domain (5)
MEP
Maintenance End Points
A Maintenance End Point (MEP) is a logical entity that marks the end-point of a domain. There are two
types of MEPs defined in 802.1ag for an 802.1 bridge:
•Up-MEP: monitors the forwarding path internal to an bridge on the customer or provider edge; on
Dell Networking systems the internal forwarding path is effectively the switch fabric and forwarding
engine.
•Down-MEP: monitors the forwarding path external another bridge.
Configure Up- MEPs on ingress ports, ports that send traffic towards the bridge relay. Configure
Down-MEPs on egress ports, ports that send traffic away from the bridge relay.
MPLS CoreMPLS Access
Customer Domain (7)
Provider Domain (6)
ator Dom
per
O
MPLS Domain(4)
MIP
ain (5)
Operator Domain (5)
Figure 5-3. Up-MEP versus Down-MEP
Customer Network
towards relay
Up-MEP
Down-MEP
away from relay
Service Provider Ethernet Access
802.1ag | 81
Implementation Information
•Since the S-Series has a single MAC address for all physical/LAG interfaces, only one MEP is allowed
per MA (per VLAN or per MD level).
Configure CFM
Configuring CFM is a five-step process:
1. Configure the ecfmacl CAM region using the
www.dell.com | support.dell.com
ACL Sub-partitions.
2. Enable Ethernet CFM.
3. Create a Maintenance Domain.
4. Create a Maintenance Association.
5. Create Maintenance Points.
6. Use CFM tools:
aContinuity Check Messages
bLoopback Message and Response
cLinktrace Message and Response
Related Configuration Tasks
•Enable CFM SNMP Traps
•Display Ethernet CFM Statistics
cam-acl command. See Configuring Ingress Layer 2
82|802.1ag
Enable Ethernet CFM
TaskCommand SyntaxCommand Mode
Spawn the CFM process. No CFM configuration is
allowed until the CFM process is spawned.
Disable Ethernet CFM without stopping the CFM
process.
ethernet cfm
disable
CONFIGURATION
ETHERNET CFM
Create a Maintenance Domain
Connectivity Fault Management (CFM) divides a network into hierarchical maintenance domains, as
shown in Figure 5-1.
Domains are comprised of logical entities called Maintenance Points. A maintenance point is a interface
demarcation that confines CFM frames to a domain. There are two types of maintenance points:
•Maintenance End Points (MEPs): a logical entity that marks the end-point of a domain
•Maintenance Intermediate Points (MIPs): a logical entity configured at a port of a switch that
constitutes intermediate points of an Maintenance Entity (ME). An ME is a point-to-point relationship
between two MEPs within a single domain.
These roles define the relationships between all devices so that each device can monitor the layers under its
responsibility.
Create a Maintenance End Point
A Maintenance End Point (MEP) is a logical entity that marks the end-point of a domain. There are two
types of MEPs defined in 802.1ag for an 802.1 bridge:
•Up-MEP: monitors the forwarding path internal to an bridge on the customer or provider edge; on
Dell Networking systems the internal forwarding path is effectively the switch fabric and forwarding
engine.
•Down-MEP: monitors the forwarding path external another bridge.
Configure Up- MEPs on ingress ports, ports that send traffic towards the bridge relay. Configure
Down-MEPs on egress ports, ports that send traffic away from the bridge relay.
100 cfm0 7 MEP Gi 4/10 Enabled test0 10 DOWN 00:01:e8:59:23:45
200 cfm1 6 MEP Gi 4/10 Enabled test1 20 DOWN 00:01:e8:59:23:45
300 cfm2 5 MEP Gi 4/10 Enabled test2 30 DOWN 00:01:e8:59:23:45
Create a Maintenance Intermediate Point
Maintenance Intermediate Point (MIP) is a logical entity configured at a port of a switch that constitutes
intermediate points of an Maintenance Entity (ME). An ME is a point-to-point relationship between two
MEPs within a single domain. An MIP is not associated with any MA or service instance, and it belongs to
the entire MD.
TaskCommand SyntaxCommand Mode
Create an MIP.ethernet cfm mip domain {name | level} ma-name nameINTERFACE
Display configured MEPs and
show ethernet cfm maintenance-points local [mep | mip]EXEC Privilege
MIPs.
FTOS#show ethernet cfm maintenance-points local mip
------------------------------------------------------------------------------MPID Domain Name Level Type Port CCM-Status MA Name VLAN Dir MAC
MAC Address: 00:01:e8:58:68:78
Domain Name: cfm0
MA Name: test0
Level: 7
VLAN: 10
MP ID: 900
Sender Chassis ID: FTOS
MEP Interface status: Up
MEP Port status: Forwarding
www.dell.com | support.dell.com
Receive RDI: FALSE
MP Status: Active
Display the MIP Database.
show ethernet cfm mipdb
EXEC Privilege
MP Database Persistence
TaskCommand SyntaxCommand Mode
Set the amount of time that data
from a missing MEP is kept in
the Continuity Check Database.
database hold-time minutes
Default: 100 minutes
Range: 100-65535 minutes
ECFM DOMAIN
86|802.1ag
Continuity Check Messages
Continuity Check Messages (CCM) are periodic hellos used to:
•discover MEPs and MIPs within a maintenance domain
•detect loss of connectivity between MEPs
•detect misconfiguration, such as VLAN ID mismatch between MEPs
•to detect unauthorized MEPs in a maintenance domain
Continuity Check Messages (CCM) are multicast Ethernet frames sent at regular intervals from each MEP.
They have a destination address based on the MD level (01:80:C2:00:00:3X where X is the MD level of
the transmitting MEP from 0 to 7). All MEPs must listen to these multicast MAC addresses and process
these messages. MIPs may optionally processes the CCM messages originated by MEPs and construct a
MIP CCM database.
MEPs and MIPs filter CCMs from higher and lower domain levels as described in Table 5-1.
Less than my levelBridge-relay side or Wire sideDropDropDrop
My levelBridge-relay sideConsumeDropAdd to MIP-DB
Wire sideDropConsume
Greater than my levelBridge-relay side or Wire sideForwardForwardForward
and forward
All the remote MEPs in the maintenance domain are defined on each MEP. Each MEP then expects a
periodic CCM from the configured list of MEPs. A connectivity failure is then defined as:
1. Loss of 3 consecutive CCMs from any of the remote MEP, which indicates a network failure
2. Reception of a CCM with an incorrect CCM transmission interval, which indicates a configuration
error.
3. Reception of CCM with an incorrect MEP ID or MAID, which indicates a configuration or
cross-connect error. This could happen when different VLANs are cross-connected due to a
configuration error.
4. Reception of a CCM with an MD level lower than that of the receiving MEP, which indicates a
configuration or cross-connect error.
5. Reception of a CCM containing a port status/interface status TLV, which indicates a failed bridge or
aggregated port.
The Continuity Check protocol sends fault notifications (Syslogs, and SNMP traps if enabled) whenever
any of the above errors are encountered.
802.1ag | 87
Enable CCM
StepTaskCommand SyntaxCommand Mode
1Enable CCM.
2Configure the transmit interval (mandatory).
The interval specified applies to all MEPs in
the domain.
Enable Cross-checking
www.dell.com | support.dell.com
TaskCommand SyntaxCommand Mode
Enable cross-checking.
Start the cross-check operation for an MEP.
Configure the amount of time the system waits for a
remote MEP to come up before the cross-check operation
is started.
Loopback Message and Response
no ccm disable
Default: Disabled
ccm transmit-interval seconds
Default: 10 seconds
mep cross-check enable
Default: Disabled
mep cross-check mep-id
mep cross-check start-delay
number
ECFM DOMAIN
ECFM DOMAIN
ETHERNET CFM
ETHERNET CFM
ETHERNET CFM
Loopback Message and Response (LBM, LBR), also called Layer 2 Ping, is an administrative echo
transmitted by MEPs to verify reachability to another MEP or MIP within the maintenance domain. LBM
and LBR are unicast frames.
TaskCommand SyntaxCommand Mode
Send a Loopback message.ping ethernet domainname ma-name ma-name remote
{mep-id | mac-addrmac-address} source {mep-id | port
interface}
EXEC Privilege
Linktrace Message and Response
Linktrace Message and Response (LTM, LTR), also called Layer 2 Traceroute, is an administratively sent
multicast frames transmitted by MEPs to track, hop-by-hop, the path to another MEP or MIP within the
maintenance domain. All MEPs and MIPs in the same domain respond to an LTM with a unicast LTR.
Intermediate MIPs forward the LTM toward the target MEP.
88|802.1ag
Figure 5-4. Linktrace Message and Response
MPLS Core
MEP
MIPMIP
L
i
n
k
t
r
a
c
e
g
a
s
s
e
e
M
m
L
i
n
k
t
r
a
c
e
R
e
s
n
o
p
s
e
MIP
Link trace messages carry a unicast target address (the MAC address of an MIP or MEP) inside a multicast
frame. The destination group address is based on the MD level of the transmitting MEP
(01:80:C2:00:00:3[8 to F]). The MPs on the path to the target MAC address reply to the LTM with an LTR,
and relays the LTM towards the target MAC until the target MAC is reached or TTL equals 0.
TaskCommand SyntaxCommand Mode
Send a Linktrace message. Since the
L TM is a Multicast message sent to the
entire ME, there is no need to specify a
destination.
traceroute ethernet domain
EXEC Privilege
Link Trace Cache
After a Link Trace command is executed, the trace information can be cached so that you can view it later
without retracing.
TaskCommand SyntaxCommand Mode
Enable Link Trace caching.
Set the amount of time a trace result is cached.traceroute cache hold-timeminutes
Set the size of the Link Trace Cache.traceroute cache sizeentries
Display the Link Trace Cache.
traceroute cache
Default: 100 minutes
Range: 10-65535 minutes
Default: 100
Range: 1 - 4095 entries
show ethernet cfm traceroute-cache
CONFIGURATION
ETHERNET CFM
ETHERNET CFM
EXEC Privilege
802.1ag | 89
TaskCommand SyntaxCommand Mode
FTOS#show ethernet cfm traceroute-cache
Traceroute to 00:01:e8:52:4a:f8 on Domain Customer2, Level 7, MA name Test2 with VLAN 2
-----------------------------------------------------------------------------Hops Host IngressMAC Ingr Action Relay Action Next Host Egress MAC Egress Action FWD Status
A metropolitan area network (MAN) is a set of LANs, geographically separated but managed by a single
entity. If the distance is large—across a city, for example—connectivity between LANs is managed by a
service provider. While LANs use Ethernet, service providers networks use an array of protocols (PPP and
ATM), and a variety access technologies. Implementing Ethernet from end to end, across the service
provider network, simplifies design and management, increases scalability and bandwidth, and reduces
costs.
Ethernet in a service provider environment introduces the concept of Carrier-class Ethernet and requires
some basic management and diagnostic tools. Ethernet Operations, Administration, and Maintenance
(OAM) is that toolset, which can be used to install, monitor, troubleshoot, and manage Ethernet
infrastructure deployments. It consists of three main areas:
6
1. Service Layer OAM: IEEE 802.1ag, Connectivity Fault Management (CFM)
2. Link Layer OAM: IEEE 802.3ah, Ethernet in the First Mile (EFM) OAM
3. Ethernet Local management Interface (MEF-16 E-LMI)
Link Layer OAM Overview
Link Layer OAM introduces the toolset required to effectively monitor the link between the customer and
service provider, which is called thefirst mile. Currently, service providers use a variety of access
technologies including ISDN, DSL, and coax cable in the first mile. Implementing Ethernet here reduces
the types of equipment in the subscriber access network, simplifying installation and management, and
increasing bandwidth.
Link Layer OAM performs four primary operations for the purposes of link status, performance
monitoring, and fault detection and isolation for Ethernet in the First Mile:
•OAM Discovery—detects whether the remote system is OAM capable, and negotiates OAM
parameters.
•Link Event Monitoring—defines a set of events that may impact link operation, and monitors the link
for those events.
802.3ah | 93
•Remote Loopback—directs the remote system to reflects back frames that the local system transmits
so that an administrator can isolate a fault.
•Remote Failure Indication—notifies a peer of a critical link event.
Link Layer OAMPDUs
Link Layer OAM is conducted using OAMPDUs, shown in Figure 6-1. OAM is a slow protocol and by
requirement may transmit no more than 10 frames per second, transmits to a multicast destination MAC,
and uses an Ethernet subtype.
There are six OAMPDU types, identified by the Code field:
•Information—carries state information and Local Information and/or Remote Information TLVs.
Information OAMPDUs are used in discovery, and as keepalives.
•Local Information TLVs—indicates support for variable retrieval, link performance events, and
remote loopback, unidirectional support, and OAM mode
•Remote Information TLVs—a copy of the peer’s Local Information TLV.
•Event Notification—carries TLVs for each concurrent link fault.
•Variable Request—carries MIB object descriptors for which the remote peer should return values.
•Variable Response—carries the requested MIB object values.
•Loopback Control—carries the loopback control command (enable and disable).
•Organization Specific—contains and OUI followed by data, the format and function of which is
defined by the organization.
OAMPDU Flags
1-bit flags are used it indicate OAM state and link state. During discovery , flags 3-6 are used to indicate the
state of peership establishment. Flags 0-2 are used to indicate a local critical link event to the remote peer.
94|802.3ah
Link Layer OAM Operational Modes
When participating in EFM OAM, system may operate in active or passive mode.
•Active mode—Active mode systems initiate discovery. Once the Discovery process completes, they
can send any OAMPDU while connected to a peer in Active mode, and a subset of OAMPDUs if the
peer is in Passive mode (see Table 6-1).
•Passive mode—Passive mode systems wait for an active mode system to initiate discovery , and do not
send Variable Request or Loopback Control OAMPDUs.
Taken from IEEE 802.3ah, Table 6-1 summarizes the permitted actions in each role.
Table 6-1. Active Mode and Passive Mode Behaviors
CapabilityActivePassive
Initiates OAM Discovery processYesNo
Reacts to OAM Discovery process initiationYesYes
Required to send Information OAMPDUsYesYes
Permitted to send Event Notification OAMPDUsYesYes
Permitted to send Variable Request OAMPDUsYesNo
Permitted to send Variable Response OAMPDUs (the peer must be in Active mode)YesYes
Permitted to send Loopback Control OAMPDUsYesNo
Reacts to Loopback Control OAMPDUs (the peer must be in Active mode)YesYes
Permitted to send Organization Specific OAMPDUsYesYes
Link Layer OAM Discovery
OAM Discovery is the mechanism a Link Layer OAM-capable system uses to determine if the remote
system on the link has OAM functionality enabled. OAM Discovery ascertains OAM parameters, such as
maximum allowable OAMPDU size, and supported functions such as OAM remote loopback.
The discovery process is as follows:
1. If the link is not in Fault state, Active mode systems send Information OAMPDUs that contain (only)
the Local Information TLV.
2. Once a system receives an Information OAMPDU, it responds with an Information OAMPDU that
contains the Local and Remote Information TLV. Negotiation is complete when both systems have
received their peer’s information and are satisfied with it; to be satisfied, both peers on the link must be
have link performance event monitoring enabled.
3. When negotiation is complete, both peers may send any type of OAMPDU.
802.3ah | 95
Link Layer OAM Events
Link Layer OAM defines a set of events that may impact link operation, and monitors the link for those
events. If an event occurs, the detecting system notifies its peer. There are two types of events:
•Critical Link Events—There are three critical events; each has an associated flag which can be set in
the OAMPDU when the event occurs. Critical link events are communicated to the peer using Remote
Failure Indication.
•Link Fault—A fault occurred in the receive direction of the local peer.
•Dying Gasp—An unrecoverable local failure condition occurred. Dying Gasp notification is not
supported on S-Series.
•Critical Event—An unspecified critical event occurred. Critical Event notification is not
www.dell.com | support.dell.com
•Link Performance Events—Link events are either symbol errors or frame errors, and are
supported on S-Series.
communicated using Link Event TLVs.
•Symbol Errors—a symbol is an (electrical or optical) pulse on the physical medium that
represents one or more bits. A symbol error occurs when a symbol degrades in transit so that the
receiver is not able to decode it. Gigabit and 10-Gigabit Ethernet have and expect symbol rate, also
called Baud.
•Frame Errors—frame errors are frames with a bad CRC.
Remote Loopback
An active-mode device can place a passive peer into loopback mode by sending a Loopback Control
OAMPDU. When in loopback mode:
•the remote peer returns unaltered all non-OAMPDU frames sent by the local peer, and
•all outbound data frames are discarded (control frames are still forwarded).
Implementation Information
•Critical Link Events Dying Gasp and Critical Event are not supported.
•MIB retrieval is not supported.
•Both peers on a link must have Link Performance Monitoring Enabled, or else discovery does not
complete.
•Control frames are still forwarded when an interface is in loopback mode.
96|802.3ah
Configuring Link Layer OAM
Configuring Link Layer OAM is a two-step process:
1. Enable Link Layer OAM.
2. Enable any or all of the following:
aLink Performance Event Monitoring
bRemote Failure Indication
cRemote Loopback
Related Configuration Tasks
•Adjust the OAMPDU Transmission Parameters
•Display Link Layer OAM Configuration and Statistics
•Manage Link Layer OAM
Enable Link Layer OAM
Link Layer OAM is disabled by default. Enabling it places the system in Active mode and initiates OAM
discovery .Both peers on the link must be have link performance event monitoring enabled for discovery to
complete.
TaskCommand SyntaxCommand Mode
Enable Ethernet OAM.
Display the OAM discovery status.show ethernet oam discoveryinterfaceinterfaceEXEC Privilege
Local client
__________
Administrative configurations:
Mode:active
Unidirection:not supported
Link monitor:supported (on)
Remote loopback:not supported
MIB retrieval:not supported
Mtu size:1500
Operational status:
www.dell.com | support.dell.com
Port status:operational
Loopback status:no loopback
PDU permission:any
PDU revision:1
Remote client
___________
MAC address:0030.88fe.87de
Vendor(OUI):0x00 0x00 0x0C
Administrative configurations:
Mode:active
Unidirection:not supported
Link monitor:supported
Remote loopback:not supported
MIB retrieval:not supported
Mtu size:1500
Display Link Layer OAM sessions.
FTOS# show ethernet oam summary
Output format :
Symbols:* - Master Loopback State, # - Slave Loopback State
Capability codes:L - Link Monitor, R - Remote Loopback
U - Unidirection,V - Variable Retrieval
LocalRemote
InterfaceMAC AddressOUIModeCapability
Gi6/1/10023.84ac.b8000000DactiveL R
show ethernet oam summary
EXEC Privilege
98|802.3ah
Adjust the OAMPDU Transmission Parameters
TaskCommand SyntaxCommand Mode
Specify a the maximum or minimum
number of OAMPDUs to be sent per
second.
Set the transmission mode to active or
passive.
Specify the amount of time that the
system waits to receive an OAMPDU
from a peer before considering it
non-operational.
ethernet oam [max-rate value | min-rate value]
Range: 1-10
Default: 10
ethernet oam mode {active | passive}
Default: Active
ethernet oam timeout value
Range: 2-30 seconds
Default: 5 seconds
Link Performance Event Monitoring
Link Performance Event Monitoring OAM monitors the receive side of a link for a set of pre-defined
errors and executes an action when a threshold is exceeded; it is enabled by default. Both peers on the link
must be have link performance event monitoring enabled for discovery to complete.
There is a high and low threshold for each pre-defined error; an event occurs when any threshold is
exceeded. Dell Networking OS periodically polls hardware registers for the current frame and symbol
error count. If an interface exceeds a threshold, a notification is sent to the peer and the interface is placed
in error-disabled state.
INTERFACE
INTERFACE
INTERFACE
•Enable Error Monitoring
•Execute an Action upon Exceeding the High Threshold
Enable Error Monitoring
The polling interval for Link Performance Monitoring is 100 milliseconds.
TaskCommand SyntaxCommand Mode
Start (or stop) Link Performance
Monitoring on an interface.
Enable (or disable) support for Link
Performance Monitoring on an interface.
ethernet oam link-monitor on
no ethernet oam link-monitor on
Default: Enabled
ethernet oam link-monitor supported
no ethernet oam link-monitor supported
Default: Enabled
INTERFACE
INTERFACE
802.3ah | 99
Set Threshold Values
The available pre-defined errors fall under two categories:
•Symbol Errors—a symbol is an (electrical or optical) pulse on the physical medium that represents
one or more bits. A symbol error occurs when a symbol degrades in transit so that the receiver is not
able to decode it. Gigabit and 10-Gigabit Ethernet have and expect symbol rate, also called Baud.
•Frame Errors—frame errors are frames with a bad CRC.
The available pre-defined errors are:
•Symbol Errors per Second—the number of symbol errors during a specified period exceeds a
www.dell.com | support.dell.com
threshold.
•Frame Errors per Second—the number of frame errors during a specified period exceeds a threshold.
•Frame Errors per Frame Period—the number of frame errors within the last N frames exceeds a
threshold.
•Frame Error Seconds per Time Period—an error second is a 1-second period with at least one
frame error. The Frame Error Seconds per Time Period error occurs when the number of error seconds
within the last M seconds exceeds a threshold.
Symbol Errors per Second
TaskCommand SyntaxCommand Mode
Specify the high threshold value for
symbol errors, or disable the high
threshold.
Specify the low threshold for symbol
errors.
Specify the time period for symbol
errors per second condition.
ethernet oam link-monitor symbol-period threshold
high {symbols | none}