Dell Networking Configuration Guide for the
MXL 10/40GbE Switch I/O Module
9.5(0.1)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2014 - 07
Rev. A00
Contents
1 About this Guide................................................................................................. 32
Audience..............................................................................................................................................32
Conventions........................................................................................................................................ 32
Information Symbols...........................................................................................................................32
Related Documents............................................................................................................................ 33
2 Configuration Fundamentals........................................................................... 34
Accessing the Command Line............................................................................................................34
CLI Modes............................................................................................................................................34
Navigating CLI Modes................................................................................................................... 36
The do Command...............................................................................................................................39
Undoing Commands...........................................................................................................................39
Obtaining Help....................................................................................................................................40
Entering and Editing Commands....................................................................................................... 40
Command History............................................................................................................................... 41
Filtering show Command Outputs.....................................................................................................42
Multiple Users in Configuration Mode............................................................................................... 43
3 Getting Started................................................................................................... 44
Console Access...................................................................................................................................45
Serial Console................................................................................................................................45
External Serial Port with a USB Connector...................................................................................47
Accessing the CLI Interface and Running Scripts Using SSH............................................................ 47
Entering CLI commands Using an SSH Connection....................................................................47
Executing Local CLI Scripts Using an SSH Connection...............................................................47
Boot Process....................................................................................................................................... 48
Default Configuration......................................................................................................................... 50
Configuring a Host Name...................................................................................................................50
Configuring a Host Name...................................................................................................................50
Accessing the System Remotely.........................................................................................................51
Accessing the MXL Switch Remotely............................................................................................51
Configure the Management Port IP Address................................................................................51
Configure a Management Route...................................................................................................51
Configuring a Username and Password.......................................................................................52
Configuring the Enable Password...................................................................................................... 52
Configuration File Management.........................................................................................................53
Copy Files to and from the System.............................................................................................. 53
Save the Running-Configuration..................................................................................................54
Viewing Files.................................................................................................................................. 55
Managing the File System...................................................................................................................56
View the Command History................................................................................................................57
Using HTTP for File Transfers............................................................................................................. 58
Upgrading and Downgrading the Dell Networking OS.....................................................................58
Using Hashes to Validate Software Images........................................................................................58
4 Management....................................................................................................... 60
Configuring Privilege Levels............................................................................................................... 60
Creating a Custom Privilege Level............................................................................................... 60
Customizing a Privilege Level....................................................................................................... 61
Applying a Privilege Level to a Username.................................................................................... 62
Applying a Privilege Level to a Terminal Line...............................................................................63
Configuring Logging...........................................................................................................................63
Audit and Security Logs.................................................................................................................63
Configuring Logging Format ...................................................................................................... 65
Setting Up a Secure Connection to a Syslog Server....................................................................66
Display the Logging Buffer and the Logging Configuration..............................................................67
Log Messages in the Internal Buffer...................................................................................................68
Configuration Task List for System Log Management................................................................ 68
Disabling System Logging.................................................................................................................. 68
Sending System Messages to a Syslog Server................................................................................... 68
Configuring a UNIX System as a Syslog Server............................................................................68
Changing System Logging Settings................................................................................................... 69
Display the Logging Buffer and the Logging Configuration............................................................. 70
Configuring a UNIX Logging Facility Level.........................................................................................70
Synchronizing Log Messages..............................................................................................................72
Enabling Timestamp on Syslog Messages..........................................................................................72
File Transfer Services...........................................................................................................................73
Configuration Task List for File Transfer Services........................................................................ 73
Enabling the FTP Server.................................................................................................................73
Configuring FTP Server Parameters..............................................................................................73
Configuring FTP Client Parameters.............................................................................................. 74
Terminal Lines..................................................................................................................................... 74
Denying and Permitting Access to a Terminal Line..................................................................... 74
Configuring Login Authentication for Terminal Lines..................................................................75
Setting Time Out of EXEC Privilege Mode......................................................................................... 76
Using Telnet to get to Another Network Device................................................................................77
Lock CONFIGURATION Mode............................................................................................................ 77
Viewing the Configuration Lock Status........................................................................................78
Recovering from a Forgotten Password............................................................................................ 78
Recovering from a Forgotten Enable Password................................................................................ 79
Recovering from a Failed Start........................................................................................................... 80
5 802.1X................................................................................................................... 81
The Port-Authentication Process.......................................................................................................83
EAP over RADIUS...........................................................................................................................85
Configuring 802.1X............................................................................................................................. 85
Related Configuration Tasks.........................................................................................................85
Important Points to Remember......................................................................................................... 86
Enabling 802.1X...................................................................................................................................86
Configuring Request Identity Re-Transmissions......................................................................... 88
Configuring a Quiet Period after a Failed Authentication........................................................... 88
Forcibly Authorizing or Unauthorizing a Port....................................................................................89
Re-Authenticating a Port....................................................................................................................90
Configuring Timeouts......................................................................................................................... 91
Configuring Dynamic VLAN Assignment with Port Authentication..................................................92
Guest and Authentication-Fail VLANs.......................................................................................... 93
Configuring a Guest VLAN............................................................................................................94
Configuring an Authentication-Fail VLAN....................................................................................94
6 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)........................................................................................................96
Optimizing CAM Utilization During the Attachment of ACLs to VLANs...........................................96
Guidelines for Configuring ACL VLAN groups................................................................................... 97
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters..........................98
Configuring ACL VLAN Groups.................................................................................................... 98
Configuring FP Blocks for VLAN Parameters............................................................................... 99
Viewing CAM Usage..........................................................................................................................100
Allocating FP Blocks for VLAN Processes.........................................................................................101
7 Access Control Lists (ACLs).............................................................................103
IP Access Control Lists (ACLs).......................................................................................................... 103
Implementing ACL on the Dell Networking OS.............................................................................. 104
ACLs and VLANs................................................................................................................................104
ACL Optimization..............................................................................................................................104
Determine the Order in which ACLs are Used to Classify Traffic...................................................104
Example of the order Keyword to Determine ACL Sequence...................................................105
IP Fragment Handling....................................................................................................................... 105
IP Fragments ACL Examples............................................................................................................. 105
Layer 4 ACL Rules Examples.............................................................................................................106
Configure a Standard IP ACL............................................................................................................ 107
Configuring a Standard IP ACL Filter................................................................................................108
Configure an Extended IP ACL.........................................................................................................109
Configuring Filters with a Sequence Number..................................................................................109
Configuring Filters Without a Sequence Number............................................................................110
Established Flag................................................................................................................................. 110
Configure Layer 2 and Layer 3 ACLs................................................................................................. 111
Assign an IP ACL to an Interface....................................................................................................... 111
Applying an IP ACL.............................................................................................................................112
Counting ACL Hits............................................................................................................................. 112
Configure Ingress ACLs..................................................................................................................... 113
Configure Egress ACLs...................................................................................................................... 113
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................114
IP Prefix Lists...................................................................................................................................... 115
Implementation Information.......................................................................................................115
Configuration Task List for Prefix Lists..............................................................................................115
Creating a Prefix List..........................................................................................................................116
Creating a Prefix List Without a Sequence Number.........................................................................117
Viewing Prefix Lists............................................................................................................................ 117
Applying a Prefix List for Route Redistribution.................................................................................118
Applying a Filter to a Prefix List (OSPF)............................................................................................. 119
ACL Resequencing............................................................................................................................ 119
Resequencing an ACL or Prefix List..................................................................................................120
Route Maps........................................................................................................................................ 121
Implementation Information.......................................................................................................122
Important Points to Remember........................................................................................................122
Configuration Task List for Route Maps........................................................................................... 122
Creating a Route Map....................................................................................................................... 122
Configure Route Map Filters.............................................................................................................124
Configuring Match Routes................................................................................................................125
Configuring Set Conditions.............................................................................................................. 126
Configure a Route Map for Route Redistribution............................................................................ 126
Configure a Route Map for Route Tagging...................................................................................... 127
Continue Clause................................................................................................................................127
Logging of ACL Processes................................................................................................................ 128
Guidelines for Configuring ACL Logging......................................................................................... 129
Configuring ACL Logging................................................................................................................. 130
Flow-Based Monitoring Support for ACLs.......................................................................................130
Behavior of Flow-Based Monitoring........................................................................................... 131
Enabling Flow-Based Monitoring..................................................................................................... 132
8 Bidirectional Forwarding Detection (BFD).................................................. 134
How BFD Works................................................................................................................................ 134
BFD Packet Format......................................................................................................................135
BFD Sessions................................................................................................................................137
BFD Three-Way Handshake........................................................................................................ 137
Session State Changes................................................................................................................ 138
Important Points to Remember........................................................................................................139
Configure BFD...................................................................................................................................139
Configure BFD for Physical Ports............................................................................................... 140
Enabling BFD Globally.................................................................................................................140
Establishing a Session on Physical Ports.....................................................................................141
Changing Physical Port Session Parameters..............................................................................142
Disabling and Re-Enabling BFD..................................................................................................143
Configure BFD for Static Routes.......................................................................................................143
Related Configuration Tasks.......................................................................................................144
Establishing Sessions for Static Routes...................................................................................... 144
Changing Static Route Session Parameters............................................................................... 145
Disabling BFD for Static Routes.................................................................................................. 145
Configure BFD for OSPF................................................................................................................... 145
Related Configuration Tasks.......................................................................................................145
Establishing Sessions with OSPF Neighbors.............................................................................. 146
Changing OSPF Session Parameters.......................................................................................... 147
Disabling BFD for OSPF...............................................................................................................147
Configure BFD for OSPFv3............................................................................................................... 148
Related Configuration Tasks.......................................................................................................148
Establishing Sessions with OSPFv3 Neighbors...........................................................................148
Changing OSPFv3 Session Parameters...................................................................................... 148
Disabling BFD for OSPFv3...........................................................................................................149
Configure BFD for BGP.....................................................................................................................149
Prerequisites................................................................................................................................ 149
Establishing Sessions with BGP Neighbors................................................................................ 150
Disabling BFD for BGP.................................................................................................................152
Use BFD in a BGP Peer Group.................................................................................................... 152
Displaying BFD for BGP Information.......................................................................................... 152
Configure BFD for VRRP................................................................................................................... 156
Related Configuration Tasks....................................................................................................... 157
Establishing Sessions with All VRRP Neighbors..........................................................................157
Establishing VRRP Sessions on VRRP Neighbors....................................................................... 158
Changing VRRP Session Parameters.......................................................................................... 159
Disabling BFD for VRRP...............................................................................................................159
Configure BFD for VLANs................................................................................................................. 159
Related Configuration Task........................................................................................................ 160
Establish Sessions with VLAN Neighbors................................................................................... 160
Changing VLAN Session Parameters...........................................................................................161
Disabling BFD for VLANs............................................................................................................. 161
Configure BFD for Port-Channels.................................................................................................... 161
Related Configuration Tasks.......................................................................................................162
Establish Sessions on Port-Channels......................................................................................... 162
Changing Physical Port Session Parameters..............................................................................163
Disabling BFD for Port-Channels................................................................................................163
Configuring Protocol Liveness......................................................................................................... 163
Troubleshooting BFD........................................................................................................................163
9 Border Gateway Protocol IPv4 (BGPv4).......................................................165
Autonomous Systems (AS)................................................................................................................165
Sessions and Peers............................................................................................................................ 167
Establish a Session.......................................................................................................................168
Route Reflectors................................................................................................................................169
Communities...............................................................................................................................169
BGP Attributes................................................................................................................................... 170
Best Path Selection Criteria.........................................................................................................170
Weight.......................................................................................................................................... 172
Local Preference..........................................................................................................................172
Multi-Exit Discriminators (MEDs)................................................................................................ 173
Origin........................................................................................................................................... 174
AS Path......................................................................................................................................... 175
Next Hop......................................................................................................................................175
Multiprotocol BGP.............................................................................................................................175
Implement BGP with the Dell Networking OS.................................................................................176
Additional Path (Add-Path) Support............................................................................................176
Advertise IGP Cost as MED for Redistributed Routes................................................................ 176
Ignore Router-ID for Some Best-Path Calculations.................................................................. 177
Four-Byte AS Numbers................................................................................................................177
AS4 Number Representation.......................................................................................................178
AS Number Migration.................................................................................................................. 179
BGP4 Management Information Base (MIB)...............................................................................181
Important Points to Remember.................................................................................................. 181
Configuration Information................................................................................................................182
BGP Configuration............................................................................................................................ 182
Enabling BGP...............................................................................................................................183
Enabling MBGP Configurations...................................................................................................217
BGP Regular Expression Optimization............................................................................................. 218
Debugging BGP.................................................................................................................................218
Storing Last and Bad PDUs......................................................................................................... 219
PDU Counters..............................................................................................................................219
Sample Configurations.....................................................................................................................220
10 Content Addressable Memory (CAM).........................................................229
CAM Allocation................................................................................................................................. 229
Test CAM Usage................................................................................................................................230
View CAM-ACL Settings................................................................................................................... 230
CAM Optimization.............................................................................................................................231
11 Control Plane Policing (CoPP)..................................................................... 232
Configure Control Plane Policing.................................................................................................... 233
Configuring CoPP for Protocols................................................................................................ 234
Configuring CoPP for CPU Queues...........................................................................................236
Show Commands........................................................................................................................237
12 Data Center Bridging (DCB)......................................................................... 239
Ethernet Enhancements in Data Center Bridging........................................................................... 239
Priority-Based Flow Control.......................................................................................................240
Enhanced Transmission Selection..............................................................................................241
Data Center Bridging Exchange Protocol (DCBx)..................................................................... 242
Data Center Bridging in a Traffic Flow.......................................................................................243
Enabling Data Center Bridging.........................................................................................................243
QoS dot1p Traffic Classification and Queue Assignment...............................................................244
Configuring Priority-Based Flow Control........................................................................................245
Configuring Lossless Queues..................................................................................................... 247
Configuring the PFC Buffer in a Switch Stack........................................................................... 248
Configure Enhanced Transmission Selection................................................................................. 249
ETS Prerequisites and Restrictions............................................................................................. 249
Creating a QoS ETS Output Policy.............................................................................................250
Creating an ETS Priority Group...................................................................................................251
Applying an ETS Output Policy for a Priority Group to an Interface.........................................252
ETS Operation with DCBx...........................................................................................................254
Configuring Bandwidth Allocation for DCBx CIN..................................................................... 254
Applying DCB Policies in a Switch Stack..........................................................................................255
Applying DCB Policies with an ETS Configuration..........................................................................256
Configure a DCBx Operation........................................................................................................... 256
DCBx Operation.......................................................................................................................... 257
DCBx Port Roles..........................................................................................................................257
DCB Configuration Exchange.................................................................................................... 259
Configuration Source Election...................................................................................................259
Propagation of DCB Information...............................................................................................260
Auto-Detection and Manual Configuration of the DCBx Version............................................260
DCBx Example.............................................................................................................................261
DCBx Prerequisites and Restrictions..........................................................................................262
Configuring DCBx.......................................................................................................................262
Verifying the DCB Configuration..................................................................................................... 266
PFC and ETS Configuration Examples............................................................................................. 276
Using PFC and ETS to Manage Data Center Traffic...................................................................276
Using PFC and ETS to Manage Converged Ethernet Traffic in a Switch Stack........................280
Hierarchical Scheduling in ETS Output Policies........................................................................280
Configuring DCB Maps and its Attributes........................................................................................ 281
DCB Map: Configuration Procedure.......................................................................................... 281
Important Points to Remember................................................................................................. 282
Applying a DCB Map on a Port...................................................................................................282
Configuring PFC without a DCB Map........................................................................................ 283
Configuring Lossless Queues.....................................................................................................283
Priority-Based Flow Control Using Dynamic Buffer Method..........................................................284
Pause and Resume of Traffic......................................................................................................284
Buffer Sizes for Lossless or PFC Packets....................................................................................285
Interworking of DCB Map With DCB Buffer Threshold Settings.................................................... 286
Configuring the Dynamic Buffer Method........................................................................................286
13 Debugging and Diagnostics.........................................................................288
Offline Diagnostics........................................................................................................................... 288
Important Points to Remember................................................................................................. 288
Running Offline Diagnostics.......................................................................................................288
Trace Logs......................................................................................................................................... 291
Auto Save on Crash or Rollover..................................................................................................291
Using the Show Hardware Commands........................................................................................... 292
Enabling Environmental Monitoring................................................................................................ 293
Recognize an Over-Temperature Condition............................................................................ 294
Troubleshoot an Over-Temperature Condition........................................................................295
Recognize an Under-Voltage Condition................................................................................... 296
Troubleshoot an Under-Voltage Condition.............................................................................. 296
Buffer Tuning.....................................................................................................................................297
Deciding to Tune Buffers............................................................................................................298
Using a Pre-Defined Buffer Profile............................................................................................. 301
Sample Buffer Profile Configuration.......................................................................................... 301
Troubleshooting Packet Loss...........................................................................................................302
Displaying Drop Counters.......................................................................................................... 302
Dataplane Statistics.....................................................................................................................303
Display Stack Port Statistics........................................................................................................304
Display Stack Member Counters................................................................................................305
Enabling Application Core Dumps...................................................................................................305
Mini Core Dumps..............................................................................................................................306
Enabling TCP Dumps........................................................................................................................307
14 Dynamic Host Configuration Protocol (DHCP)........................................308
DHCP Packet Format and Options..................................................................................................308
Assign an IP Address using DHCP.............................................................................................. 310
Implementation Information.............................................................................................................311
Configure the System to be a DHCP Server.................................................................................... 312
Configuring the Server for Automatic Address Allocation.........................................................312
Configuration Tasks.....................................................................................................................313
Specifying a Default Gateway..................................................................................................... 314
Enabling the DHCP Server.......................................................................................................... 314
Configure a Method of Hostname Resolution...........................................................................315
Creating Manual Binding Entries.................................................................................................315
Debugging the DHCP Server...................................................................................................... 316
Using DHCP Clear Commands...................................................................................................316
Configure the System to be a Relay Agent...................................................................................... 316
Configure the System to be a DHCP Client.....................................................................................318
Configuring the DHCP Client System........................................................................................ 319
DHCP Client on a Management Interface................................................................................. 322
DHCP Client Operation with Other Features.............................................................................323
Configure Secure DHCP...................................................................................................................324
Option 82.................................................................................................................................... 324
DHCP Snooping.......................................................................................................................... 325
Drop DHCP Packets on Snooped VLANs Only.......................................................................... 327
Dynamic ARP Inspection.............................................................................................................327
Configuring Dynamic ARP Inspection........................................................................................328
Source Address Validation..........................................................................................................329
15 Equal Cost Multi-Path (ECMP)..................................................................... 332
ECMP for Flow-Based Affinity.......................................................................................................... 332
Enabling Deterministic ECMP Next Hop....................................................................................332
Link Bundle Monitoring.................................................................................................................... 332
Managing ECMP Group Paths.......................................................................................................... 333
16 FCoE Transit.................................................................................................... 334
Fibre Channel over Ethernet............................................................................................................ 334
Ensure Robustness in a Converged Ethernet Network...................................................................334
FIP Snooping on Ethernet Bridges................................................................................................... 336
FIP Snooping in a Switch Stack........................................................................................................ 338
Using FIP Snooping...........................................................................................................................338
Important Points to Remember................................................................................................. 338
Enabling the FCoE Transit Feature.............................................................................................339
Enable FIP Snooping on VLANs..................................................................................................339
Configure the FC-MAP Value..................................................................................................... 339
Configure a Port for a Bridge-to-Bridge Link............................................................................339
Configure a Port for a Bridge-to-FCF Link................................................................................340
Impact on Other Software Features.......................................................................................... 340
FIP Snooping Prerequisites.........................................................................................................340
FIP Snooping Restrictions........................................................................................................... 341
Configuring FIP Snooping...........................................................................................................341
Displaying FIP Snooping Information.............................................................................................. 342
FCoE Transit Configuration Example...............................................................................................347
17 FIPS Cryptography......................................................................................... 350
Preparing the System........................................................................................................................350
Enabling FIPS Mode.......................................................................................................................... 350
Generating Host-Keys.......................................................................................................................351
Monitoring FIPS Mode Status............................................................................................................351
Disabling FIPS Mode......................................................................................................................... 352
18 Force10 Resilient Ring Protocol (FRRP)..................................................... 353
Protocol Overview............................................................................................................................ 353
Ring Status...................................................................................................................................354
Multiple FRRP Rings.................................................................................................................... 355
Important FRRP Points................................................................................................................356
Important FRRP Concepts.......................................................................................................... 357
Implementing FRRP.......................................................................................................................... 358
FRRP Configuration.......................................................................................................................... 358
Creating the FRRP Group........................................................................................................... 359
Configuring the Control VLAN................................................................................................... 359
Configuring and Adding the Member VLANs............................................................................ 360
Setting the FRRP Timers............................................................................................................. 362
Clearing the FRRP Counters.......................................................................................................362
Viewing the FRRP Configuration................................................................................................362
Viewing the FRRP Information................................................................................................... 362
Troubleshooting FRRP......................................................................................................................363
Configuration Checks.................................................................................................................363
Sample Configuration and Topology...............................................................................................363
19 GARP VLAN Registration Protocol (GVRP)................................................366
Important Points to Remember....................................................................................................... 366
Configure GVRP................................................................................................................................366
Related Configuration Tasks.......................................................................................................367
Enabling GVRP Globally....................................................................................................................367
Enabling GVRP on a Layer 2 Interface............................................................................................. 368
Configure GVRP Registration...........................................................................................................368
Configure a GARP Timer.................................................................................................................. 369
20 Internet Group Management Protocol (IGMP).........................................371
IGMP Protocol Overview...................................................................................................................371
IGMP Version 2............................................................................................................................ 371
IGMP Version 3............................................................................................................................373
IGMP Snooping................................................................................................................................. 376
IGMP Snooping Implementation Information........................................................................... 376
Configuring IGMP Snooping.......................................................................................................377
Enabling IGMP Immediate-Leave............................................................................................... 377
Disabling Multicast Flooding.......................................................................................................378
Specifying a Port as Connected to a Multicast Router..............................................................378
Configuring the Switch as Querier.............................................................................................378
Fast Convergence after MSTP Topology Changes..........................................................................379
Designating a Multicast Router Interface.........................................................................................379
21 Interfaces.........................................................................................................380
Basic Interface Configuration.......................................................................................................... 380
Advanced Interface Configuration...................................................................................................380
Interface Types..................................................................................................................................381
View Basic Interface Information..................................................................................................... 381
Enabling a Physical Interface............................................................................................................383
Physical Interfaces............................................................................................................................ 384
Configuration Task List for Physical Interfaces......................................................................... 384
Overview of Layer Modes...........................................................................................................384
Configuring Layer 2 (Data Link) Mode....................................................................................... 385
Configuring Layer 2 (Interface) Mode........................................................................................ 385
Configuring Layer 3 (Network) Mode.........................................................................................385
Configuring Layer 3 (Interface) Mode........................................................................................386
Management Interfaces....................................................................................................................387
Configuring Management Interfaces on the XML Switch......................................................... 387
VLAN Interfaces................................................................................................................................ 389
Loopback Interfaces.........................................................................................................................390
Null Interfaces...................................................................................................................................390
Port Channel Interfaces....................................................................................................................390
Port Channel Definition and Standards......................................................................................391
Port Channel Benefits................................................................................................................. 391
Port Channel Implementation.................................................................................................... 391
100/1000/10000 Mbps Interfaces in Port Channels.................................................................392
Configuration Tasks for Port Channel Interfaces...................................................................... 392
Creating a Port Channel............................................................................................................. 392
Adding a Physical Interface to a Port Channel.......................................................................... 393
Reassigning an Interface to a New Port Channel......................................................................395
Configuring the Minimum Oper Up Links in a Port Channel....................................................395
Adding or Removing a Port Channel from a VLAN................................................................... 396
Assigning an IP Address to a Port Channel................................................................................396
Deleting or Disabling a Port Channel.........................................................................................397
Server Ports....................................................................................................................................... 397
Default Configuration without Start-up Config.........................................................................397
Bulk Configuration............................................................................................................................398
Interface Range...........................................................................................................................398
Bulk Configuration Examples..................................................................................................... 398
Defining Interface Range Macros.................................................................................................... 400
Define the Interface Range........................................................................................................ 400
Choosing an Interface-Range Macro........................................................................................400
Monitoring and Maintaining Interfaces............................................................................................401
Maintenance Using TDR.............................................................................................................402
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 402
Merging SFP+ Ports to QSFP 40G Ports....................................................................................403
Configure the MTU Size on an Interface...................................................................................404
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................404
Important Points to Remember................................................................................................. 405
Support for LM4 Optics.............................................................................................................. 405
Example Scenarios......................................................................................................................405
Layer 2 Flow Control Using Ethernet Pause Frames.......................................................................409
Enabling Pause Frames............................................................................................................... 410
Configure MTU Size on an Interface................................................................................................ 411
Port-Pipes..........................................................................................................................................412
Auto-Negotiation on Ethernet Interfaces........................................................................................ 412
Setting the Speed and Duplex Mode of Ethernet Interfaces..................................................... 412
View Advanced Interface Information..............................................................................................414
Configuring the Interface Sampling Size....................................................................................415
Dynamic Counters...................................................................................................................... 416
Enhanced Validation of Interface Ranges........................................................................................ 417
22 Internet Protocol Security (IPSec).............................................................. 419
Configuring IPSec ............................................................................................................................ 419
23 IPv4 Routing....................................................................................................421
IP Addresses.......................................................................................................................................421
Implementation Information...................................................................................................... 421
Configuration Tasks for IP Addresses.........................................................................................421
IPv4 Path MTU Discovery Overview.................................................................................................424
Using the Configured Source IP Address in ICMP Messages..........................................................425
Configuring the ICMP Source Interface.....................................................................................425
Configuring the Duration to Establish a TCP Connection..............................................................426
Enabling Directed Broadcast............................................................................................................426
Resolution of Host Names............................................................................................................... 426
Enabling Dynamic Resolution of Host Names...........................................................................427
Specifying the Local System Domain and a List of Domains....................................................427
Configuring DNS with Traceroute............................................................................................. 428
ARP.................................................................................................................................................... 429
Configuration Tasks for ARP.......................................................................................................429
ARP Learning via Gratuitous ARP......................................................................................................431
ARP Learning via ARP Request..........................................................................................................431
Configuring ARP Retries................................................................................................................... 432
ICMP.................................................................................................................................................. 433
Configuration Tasks for ICMP.................................................................................................... 433
UDP Helper....................................................................................................................................... 433
Configure UDP Helper................................................................................................................433
Important Points to Remember................................................................................................. 433
Enabling UDP Helper.................................................................................................................. 434
Configurations Using UDP Helper................................................................................................... 434
UDP Helper with Broadcast-All Addresses................................................................................ 434
UDP Helper with Subnet Broadcast Addresses..........................................................................435
UDP Helper with Configured Broadcast Addresses.................................................................. 436
UDP Helper with No Configured Broadcast Addresses............................................................ 436
Troubleshooting UDP Helper...........................................................................................................437
24 IPv6 Addressing..............................................................................................438
Protocol Overview............................................................................................................................438
Extended Address Space............................................................................................................ 438
Stateless Autoconfiguration....................................................................................................... 438
IPv6 Header Fields............................................................................................................................440
Version (4 bits)............................................................................................................................ 440
Traffic Class (8 bits).....................................................................................................................440
Flow Label (20 bits).....................................................................................................................440
Payload Length (16 bits)............................................................................................................. 440
Next Header (8 bits)....................................................................................................................440
Hop Limit (8 bits)......................................................................................................................... 441
Source Address (128 bits)............................................................................................................441
Destination Address (128 bits).....................................................................................................441
Extension Header Fields....................................................................................................................441
Hop-by-Hop Options Header....................................................................................................442
Addressing.........................................................................................................................................442
Link-local Addresses...................................................................................................................443
Static and Dynamic Addressing..................................................................................................443
Implementing IPv6 with the Dell Networking OS...........................................................................444
ICMPv6..............................................................................................................................................446
Path MTU Discovery......................................................................................................................... 447
IPv6 Neighbor Discovery..................................................................................................................447
IPv6 Neighbor Discovery of MTU Packets.................................................................................448
Configuring the IPv6 Recursive DNS Server..............................................................................448
Debugging IPv6 RDNSS Information Sent to the Host ............................................................ 449
Displaying IPv6 RDNSS Information...........................................................................................450
IPv6 Multicast....................................................................................................................................450
Secure Shell (SSH) Over an IPv6 Transport...................................................................................... 451
Configuration Task List for IPv6........................................................................................................451
Adjusting Your CAM-Profile........................................................................................................451
Assigning an IPv6 Address to an Interface.................................................................................452
Assigning a Static IPv6 Route..................................................................................................... 453
Configuring Telnet with IPv6......................................................................................................453
SNMP over IPv6...........................................................................................................................454
Showing IPv6 Information..........................................................................................................454
Showing an IPv6 Interface..........................................................................................................454
Showing IPv6 Routes.................................................................................................................. 455
Showing the Running-Configuration for an Interface.............................................................. 456
Clearing IPv6 Routes...................................................................................................................457
25 iSCSI Optimization.........................................................................................458
iSCSI Optimization Overview........................................................................................................... 458
Monitoring iSCSI Traffic Flows...................................................................................................460
Information Monitored in iSCSI Traffic Flows........................................................................... 460
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................460
Configuring Detection and Ports for Dell Compellent Arrays...................................................461
iSCSI Optimization: Operation................................................................................................... 461
Default iSCSI Optimization Values..............................................................................................461
Displaying iSCSI Optimization Information..................................................................................... 462
26 Intermediate System to Intermediate System..........................................464
IS-IS Protocol Overview...................................................................................................................464
IS-IS Addressing................................................................................................................................464
Multi-Topology IS-IS........................................................................................................................ 465
Transition Mode..........................................................................................................................466
Interface Support........................................................................................................................466
Adjacencies................................................................................................................................. 466
Graceful Restart................................................................................................................................466
Timers..........................................................................................................................................467
Implementation Information............................................................................................................467
Configuration Information............................................................................................................... 468
Configuration Tasks for IS-IS..................................................................................................... 468
IS-IS Metric Styles.............................................................................................................................484
Configure Metric Values...................................................................................................................484
Maximum Values in the Routing Table...................................................................................... 485
Change the IS-IS Metric Style in One Level Only......................................................................485
Leaks from One Level to Another.............................................................................................. 487
Sample Configurations..................................................................................................................... 487
27 Link Aggregation Control Protocol (LACP)...............................................492
Introduction to Dynamic LAGs and LACP....................................................................................... 492
Important Points to Remember................................................................................................. 492
LACP Modes................................................................................................................................493
Configuring LACP Commands...................................................................................................493
LACP Configuration Tasks................................................................................................................494
Creating a LAG............................................................................................................................494
Configuring the LAG Interfaces as Dynamic............................................................................. 495
Setting the LACP Long Timeout.................................................................................................495
Shared LAG State Tracking...............................................................................................................496
Configuring Shared LAG State Tracking.......................................................................................... 497
Important Points about Shared LAG State Tracking..................................................................498
LACP Basic Configuration Example.................................................................................................499
Configure a LAG on ALPHA........................................................................................................499
28 Layer 2..............................................................................................................508
Manage the MAC Address Table......................................................................................................508
Clearing the MAC Address Table................................................................................................508
Setting the Aging Time for Dynamic Entries..............................................................................508
Configuring a Static MAC Address............................................................................................. 509
Displaying the MAC Address Table............................................................................................ 509
MAC Learning Limit.......................................................................................................................... 509
Setting the MAC Learning Limit.................................................................................................. 510
mac learning-limit Dynamic....................................................................................................... 510
mac learning-limit station-move................................................................................................510
Learning Limit Violation Actions..................................................................................................511
Setting Station Move Violation Actions.......................................................................................511
Recovering from Learning Limit and Station Move Violations...................................................511
NIC Teaming......................................................................................................................................512
MAC Move Optimization.............................................................................................................514
29 Link Layer Discovery Protocol (LLDP)........................................................ 515
802.1AB (LLDP) Overview..................................................................................................................515
Protocol Data Units..................................................................................................................... 515
Optional TLVs.................................................................................................................................... 516
Management TLVs.......................................................................................................................516
TIA-1057 (LLDP-MED) Overview...................................................................................................... 518
TIA Organizationally Specific TLVs............................................................................................. 519
Extended Power via MDI TLV......................................................................................................523
Configure LLDP.................................................................................................................................523
Related Configuration Tasks.......................................................................................................523
Important Points to Remember................................................................................................. 524
LLDP Compatibility..................................................................................................................... 524
CONFIGURATION versus INTERFACE Configurations....................................................................524
Enabling LLDP................................................................................................................................... 525
Disabling and Undoing LLDP......................................................................................................525
Advertising TLVs................................................................................................................................525
Viewing the LLDP Configuration......................................................................................................526
Viewing Information Advertised by Adjacent LLDP Agents.............................................................527
Configuring LLDPDU Intervals......................................................................................................... 528
Configuring Transmit and Receive Mode........................................................................................ 529
Configuring a Time to Live...............................................................................................................530
Debugging LLDP...............................................................................................................................530
Relevant Management Objects.........................................................................................................531
30 Microsoft Network Load Balancing............................................................538
NLB Unicast Mode Scenario.............................................................................................................538
NLB Multicast Mode Scenario.......................................................................................................... 539
Limitations With Enabling NLB on Switches....................................................................................539
Benefits and Working of Microsoft Clustering.................................................................................539
Enable and Disable VLAN Flooding .................................................................................................540
Configuring a Switch for NLB ......................................................................................................... 540
.....................................................................................................................................................540
31 Multicast Source Discovery Protocol (MSDP)........................................... 541
Protocol Overview............................................................................................................................ 541
Anycast RP.........................................................................................................................................543
Implementation Information............................................................................................................543
Configure the Multicast Source Discovery Protocol.......................................................................543
Related Configuration Tasks.......................................................................................................543
Enabling MSDP..................................................................................................................................547
Manage the Source-Active Cache...................................................................................................548
Viewing the Source-Active Cache............................................................................................. 548
Limiting the Source-Active Cache............................................................................................. 549
Clearing the Source-Active Cache.............................................................................................549
Enabling the Rejected Source-Active Cache.............................................................................549
Accept Source-Active Messages that Fail the RFP Check.............................................................. 549
Specifying Source-Active Messages.................................................................................................553
Limiting the Source-Active Messages from a Peer......................................................................... 554
Preventing MSDP from Caching a Local Source.............................................................................554
Preventing MSDP from Caching a Remote Source.........................................................................555
Preventing MSDP from Advertising a Local Source.........................................................................556
Logging Changes in Peership States................................................................................................ 557
Terminating a Peership..................................................................................................................... 557
Clearing Peer Statistics......................................................................................................................557
Debugging MSDP..............................................................................................................................558
MSDP with Anycast RP......................................................................................................................558
Configuring Anycast RP....................................................................................................................560
Reducing Source-Active Message Flooding..............................................................................560
Specifying the RP Address Used in SA Messages...................................................................... 560
MSDP Sample Configurations.......................................................................................................... 563
32 Multiple Spanning Tree Protocol (MSTP).................................................. 566
Protocol Overview............................................................................................................................566
Spanning Tree Variations..................................................................................................................567
Implementation Information............................................................................................................ 567
Configure Multiple Spanning Tree Protocol....................................................................................567
Related Configuration Tasks.......................................................................................................567
Enable Multiple Spanning Tree Globally..........................................................................................568
Creating Multiple Spanning Tree Instances.....................................................................................568
Influencing MSTP Root Selection.................................................................................................... 569
Interoperate with Non-Dell Networking OS Bridges...................................................................... 570
Changing the Region Name or Revision..........................................................................................570
Modifying Global Parameters............................................................................................................571
Enable BPDU Filtering Globally.........................................................................................................572
Modifying the Interface Parameters.................................................................................................573
Configuring an EdgePort.................................................................................................................. 573
Flush MAC Addresses after a Topology Change............................................................................. 574
MSTP Sample Configurations........................................................................................................... 575
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration.............................................................575
Debugging and Verifying MSTP Configurations.............................................................................. 578
33 Multicast Features.......................................................................................... 581
Enabling IP Multicast.........................................................................................................................581
Multicast with ECMP......................................................................................................................... 581
Implementation Information............................................................................................................582
First Packet Forwarding for Lossless Multicast................................................................................ 583
Multicast Policies.............................................................................................................................. 583
IPv4 Multicast Policies...................................................................................................................... 583
Limiting the Number of Multicast Routes..................................................................................583
Preventing a Host from Joining a Group...................................................................................584
Rate Limiting IGMP Join Requests............................................................................................. 587
Preventing a PIM Router from Forming an Adjacency.............................................................. 587
Preventing a Source from Registering with the RP................................................................... 587
Preventing a PIM Router from Processing a Join......................................................................590
34 Open Shortest Path First (OSPFv2 and OSPFv3).......................................591
Protocol Overview............................................................................................................................ 591
Autonomous System (AS) Areas..................................................................................................591
Area Types...................................................................................................................................592
Networks and Neighbors............................................................................................................593
Router Types............................................................................................................................... 593
Link-State Advertisements (LSAs)............................................................................................... 595
Router Priority and Cost............................................................................................................. 596
OSPF with the Dell Networking OS..................................................................................................597
Graceful Restart.......................................................................................................................... 598
Fast Convergence (OSPFv2, IPv4 Only)..................................................................................... 599
Multi-Process OSPFv2 (IPv4 only)..............................................................................................599
RFC-2328 Compliant OSPF Flooding........................................................................................600
OSPF ACK Packing...................................................................................................................... 601
Setting OSPF Adjacency with Cisco Routers............................................................................. 601
Configuration Information............................................................................................................... 602
Configuration Task List for OSPFv2 (OSPF for IPv4)................................................................. 602
Troubleshooting OSPFv2............................................................................................................ 615
Configuration Task List for OSPFv3 (OSPF for IPv6)........................................................................619
Enabling IPv6 Unicast Routing....................................................................................................619
Assigning IPv6 Addresses on an Interface................................................................................. 620
Assigning Area ID on an Interface..............................................................................................620
Assigning OSPFv3 Process ID and Router ID Globally.............................................................. 620
Configuring Stub Areas............................................................................................................... 621
Configuring Passive-Interface.................................................................................................... 621
Redistributing Routes..................................................................................................................622
Configuring a Default Route.......................................................................................................622
Enabling OSPFv3 Graceful Restart............................................................................................. 622
Displaying Graceful Restart........................................................................................................ 623
OSPFv3 Authentication Using IPsec...........................................................................................625
35 Policy-based Routing (PBR)......................................................................... 634
Overview........................................................................................................................................... 634
Implementing Policy-based Routing with Dell Networking OS.....................................................636
Configuration Task List for Policy-based Routing.......................................................................... 636
PBR Exceptions (Permit)............................................................................................................. 639
Sample Configuration.......................................................................................................................641
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View
Redirect-List GOLD.................................................................................................................... 642
36 PIM Sparse-Mode (PIM-SM).........................................................................644
Implementation Information............................................................................................................644
Protocol Overview............................................................................................................................644
Requesting Multicast Traffic.......................................................................................................644
Refuse Multicast Traffic.............................................................................................................. 645
Send Multicast Traffic................................................................................................................. 645
Configuring PIM-SM.........................................................................................................................646
Related Configuration Tasks...................................................................................................... 646
Enable PIM-SM................................................................................................................................. 646
Configuring S,G Expiry Timers......................................................................................................... 647
Configuring a Static Rendezvous Point...........................................................................................648
Overriding Bootstrap Router Updates....................................................................................... 649
Configuring a Designated Router.................................................................................................... 649
Creating Multicast Boundaries and Domains..................................................................................650
Enabling PIM-SM Graceful Restart...................................................................................................650
37 PIM Source-Specific Mode (PIM-SSM)........................................................651
Configure PIM-SMM......................................................................................................................... 651
Related Configuration Tasks.......................................................................................................651
Implementation Information............................................................................................................ 651
Important Points to Remember................................................................................................. 652
Enabling PIM-SSM.............................................................................................................................652
Use PIM-SSM with IGMP Version 2 Hosts........................................................................................652
Configuring PIM-SSM with IGMPv2........................................................................................... 653
38 Port Monitoring..............................................................................................655
Important Points to Remember....................................................................................................... 655
Configuring Port Monitoring............................................................................................................656
Enabling Flow-Based Monitoring.....................................................................................................657
Remote Port Mirroring......................................................................................................................658
Remote Port Mirroring Example.................................................................................................659
Configuring Remote Port Mirroring...........................................................................................660
Displaying Remote-Port Mirroring Configurations....................................................................661
Configuring the Sample Remote Port Mirroring....................................................................... 662
Configuring the Encapsulated Remote Port Mirroring................................................................... 665
Configuration steps for ERPM ................................................................................................... 665
ERPM Behavior on a typical Dell Networking OS ...........................................................................666
Decapsulation of ERPM packets at the Destination IP/ Analyzer..............................................667
39 Private VLANs (PVLAN)..................................................................................669
Private VLAN Concepts.................................................................................................................... 669
Using the Private VLAN Commands...........................................................................................670
Configuration Task List................................................................................................................671
Private VLAN Configuration Example.........................................................................................675
40 Per-VLAN Spanning Tree Plus (PVST+)......................................................679
Protocol Overview............................................................................................................................679
Implementation Information......................................................................................................680
Configure Per-VLAN Spanning Tree Plus........................................................................................680
Related Configuration Tasks...................................................................................................... 680
Enabling PVST+................................................................................................................................ 680
Disabling PVST+................................................................................................................................681
Influencing PVST+ Root Selection............................................................................................. 681
Modifying Global PVST+ Parameters...............................................................................................683
Modifying Interface PVST+ Parameters...........................................................................................684
Configuring an EdgePort..................................................................................................................685
PVST+ in Multi-Vendor Networks....................................................................................................686
Enabling PVST+ Extend System ID.................................................................................................. 686
PVST+ Sample Configurations......................................................................................................... 687
Enable BPDU Filtering globally.........................................................................................................689
41 Quality of Service (QoS)................................................................................690
Implementation Information............................................................................................................ 691
Port-Based QoS Configurations...................................................................................................... 692
Setting dot1p Priorities for Incoming Traffic..............................................................................692
Honoring dot1p Priorities on Ingress Traffic..............................................................................693
Configuring Port-Based Rate Policing.......................................................................................694
Configuring Port-Based Rate Shaping.......................................................................................694
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................694
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class..........695
Classifying Incoming Packets Using ECN and Color-Marking................................................. 695
Sample configuration to mark non-ecn packets as “yellow” with single traffic class............. 698
Policy-Based QoS Configurations................................................................................................... 699
DSCP Color Maps....................................................................................................................... 700
Classify Traffic............................................................................................................................. 702
Create a QoS Policy....................................................................................................................706
Create Policy Maps..................................................................................................................... 709
Enabling QoS Rate Adjustment.........................................................................................................714
Enabling Strict-Priority Queueing.....................................................................................................714
Weighted Random Early Detection.................................................................................................. 715
Creating WRED Profiles...............................................................................................................716
Applying a WRED Profile to Traffic............................................................................................. 716
Displaying Default and Configured WRED Profiles....................................................................716
Displaying WRED Drop Statistics.................................................................................................717
Classifying Layer 2 Traffic on Layer 3 Interfaces ....................................................................... 717
Classifying Packets Based on a Combination of DSCP Code Points and VLAN IDs.................718
42 Routing Information Protocol (RIP)........................................................... 720
Protocol Overview............................................................................................................................720
RIPv1............................................................................................................................................ 720
RIPv2............................................................................................................................................720
Implementation Information.............................................................................................................721
Configuration Information................................................................................................................721
Configuration Task List................................................................................................................721
RIP Configuration Example.........................................................................................................728
43 Remote Monitoring (RMON)........................................................................ 733
Implementation Information............................................................................................................ 733
Fault Recovery...................................................................................................................................733
Setting the rmon Alarm...............................................................................................................734
Configuring an RMON Event...................................................................................................... 735
Configuring RMON Collection Statistics....................................................................................735
Configuring the RMON Collection History................................................................................ 736
Enabling an RMON MIB Collection History Group.................................................................... 737
44 Rapid Spanning Tree Protocol (RSTP)........................................................738
Protocol Overview............................................................................................................................ 738
Configuring Rapid Spanning Tree.................................................................................................... 738
Related Configuration Tasks.......................................................................................................738
Important Points to Remember..................................................................................................739
Configuring Interfaces for Layer 2 Mode.........................................................................................739
Enabling Rapid Spanning Tree Protocol Globally............................................................................739
Adding and Removing Interfaces..................................................................................................... 742
Modifying Global Parameters........................................................................................................... 743
Enable BPDU Filtering Globally........................................................................................................ 744
Modifying Interface Parameters....................................................................................................... 745
Configuring an EdgePort.................................................................................................................. 745
Influencing RSTP Root Selection..................................................................................................... 746
SNMP Traps for Root Elections and Topology Changes.................................................................747
Configuring Fast Hellos for Link State Detection............................................................................ 747
45 Security............................................................................................................ 748
AAA Accounting................................................................................................................................ 748
Configuration Task List for AAA Accounting..............................................................................748
AAA Authentication...........................................................................................................................750
Configuration Task List for AAA Authentication.........................................................................751
AAA Authorization............................................................................................................................. 753
Privilege Levels Overview............................................................................................................753
Configuration Task List for Privilege Levels............................................................................... 754
RADIUS.............................................................................................................................................. 758
RADIUS Authentication and Authorization.................................................................................758
Configuration Task List for RADIUS............................................................................................759
TACACS+...........................................................................................................................................762
Configuration Task List for TACACS+........................................................................................ 762
Choosing TACACS+ as the Authentication Method..................................................................763
Monitoring TACACS+..................................................................................................................764
TACACS+ Remote Authentication and Authorization...............................................................764
Specifying a TACACS+ Server Host............................................................................................765
Command Authorization............................................................................................................766
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... 766
Enabling SCP and SSH...................................................................................................................... 766
Using SCP with SSH to Copy a Software Image........................................................................ 767
Removing the RSA Host Keys and Zeroizing Storage ...............................................................768
Configuring When to Re-generate an SSH Key ........................................................................768
Configuring the SSH Server Key Exchange Algorithm...............................................................769
Configuring the HMAC Algorithm for the SSH Server...............................................................769
Configuring the SSH Server Cipher List......................................................................................770
Secure Shell Authentication........................................................................................................770
Troubleshooting SSH.................................................................................................................. 773
Telnet.................................................................................................................................................773
VTY Line and Access-Class Configuration.......................................................................................774
VTY Line Local Authentication and Authorization..................................................................... 774
VTY Line Remote Authentication and Authorization................................................................. 775
VTY MAC-SA Filter Support.........................................................................................................775
Role-Based Access Control..............................................................................................................776
Overview of RBAC.......................................................................................................................776
User Roles....................................................................................................................................779
AAA Authentication and Authorization for Roles.......................................................................783
Role Accounting..........................................................................................................................786
Display Information About User Roles....................................................................................... 787
46 Service Provider Bridging.............................................................................789
VLAN Stacking...................................................................................................................................789
Important Points to Remember................................................................................................. 790
Configure VLAN Stacking........................................................................................................... 790
Creating Access and Trunk Ports................................................................................................791
Enable VLAN-Stacking for a VLAN..............................................................................................792
Configuring the Protocol Type Value for the Outer VLAN Tag.................................................792
Configuring Options for Trunk Ports......................................................................................... 792
Debugging VLAN Stacking..........................................................................................................793
VLAN Stacking in Multi-Vendor Networks................................................................................. 794
VLAN Stacking Packet Drop Precedence.........................................................................................798
Enabling Drop Eligibility..............................................................................................................798
Honoring the Incoming DEI Value............................................................................................. 799
Marking Egress Packets with a DEI Value...................................................................................799
Dynamic Mode CoS for VLAN Stacking.......................................................................................... 800
Mapping C-Tag to S-Tag dot1p Values......................................................................................801
Layer 2 Protocol Tunneling..............................................................................................................802
Implementation Information......................................................................................................804
Enabling Layer 2 Protocol Tunneling.........................................................................................805
Specifying a Destination MAC Address for BPDUs....................................................................805
Setting Rate-Limit BPDUs...........................................................................................................805
Debugging Layer 2 Protocol Tunneling.................................................................................... 806
Provider Backbone Bridging............................................................................................................ 806
47 sFlow................................................................................................................ 807
Overview........................................................................................................................................... 807
Implementation Information............................................................................................................807
Important Points to Remember.................................................................................................808
Enabling and Disabling sFlow.......................................................................................................... 808
Enabling and Disabling sFlow on an Interface.......................................................................... 808
sFlow Show Commands.................................................................................................................. 808
Displaying Show sFlow Global...................................................................................................809
Displaying Show sFlow on an Interface.....................................................................................809
Displaying Show sFlow on a Stack Unit.....................................................................................809
Configuring Specify Collectors........................................................................................................ 810
Changing the Polling Intervals......................................................................................................... 810
Changing the Sampling Rate............................................................................................................810
Sub-Sampling...............................................................................................................................811
Back-Off Mechanism........................................................................................................................ 811
sFlow on LAG ports...........................................................................................................................812
Enabling Extended sFlow..................................................................................................................812
48 Simple Network Management Protocol (SNMP)......................................814
Implementation Information............................................................................................................ 814
Configuration Task List for SNMP...............................................................................................814
Important Points to Remember..................................................................................................815
SNMPv3 Compliance With FIPS........................................................................................................815
Set up SNMP......................................................................................................................................816
Creating a Community................................................................................................................817
Setting Up User-Based Security (SNMPv3).......................................................................................817
Reading Managed Object Values..................................................................................................... 819
Writing Managed Object Values.......................................................................................................820
Configuring Contact and Location Information using SNMP........................................................ 820
Subscribing to Managed Object Value Updates using SNMP......................................................... 821
Enabling a Subset of SNMP Traps.................................................................................................... 822
Copy Configuration Files Using SNMP............................................................................................ 824
Copying a Configuration File........................................................................................................... 826
Copying Configuration Files via SNMP............................................................................................ 827
Copying the Startup-Config Files to the Running-Config..............................................................827
Copying the Startup-Config Files to the Server via FTP................................................................. 828
Copying the Startup-Config Files to the Server via TFTP............................................................... 828
Copying a Binary File to the Startup-Configuration........................................................................829
Additional MIB Objects to View Copy Statistics.............................................................................. 829
Obtaining a Value for MIB Objects.................................................................................................. 830
Manage VLANs using SNMP..............................................................................................................831
Creating a VLAN.......................................................................................................................... 831
Assigning a VLAN Alias................................................................................................................ 831
Displaying the Ports in a VLAN....................................................................................................831
Add Tagged and Untagged Ports to a VLAN..............................................................................833
Enabling and Disabling a Port using SNMP..................................................................................... 834
Fetch Dynamic MAC Entries using SNMP........................................................................................834
Deriving Interface Indices.................................................................................................................836
Monitor Port-Channels.....................................................................................................................837
BMP Functionality Using SNMP SET................................................................................................ 838
Entity MIBS........................................................................................................................................ 839
Physical Entity............................................................................................................................. 839
Containment Tree.......................................................................................................................839
Troubleshooting SNMP Operation.................................................................................................. 840
49 Stacking........................................................................................................... 841
Stacking MXL 10/40GbE Switches....................................................................................................841
Stack Management Roles........................................................................................................... 842
Stack Master Election................................................................................................................. 843
Failover Roles..............................................................................................................................844
MAC Addressing..........................................................................................................................844
Stacking LAG...............................................................................................................................844
Supported Stacking Topologies.................................................................................................844
Stack Group/Port Numbers..............................................................................................................846
Configuring a Switch Stack.............................................................................................................. 847
Stacking Prerequisites.................................................................................................................847
Cabling Stacked Switches.......................................................................................................... 848
Accessing the CLI....................................................................................................................... 848
Configuring and Bringing Up a Stack.........................................................................................849
Removing a Switch from a Stack................................................................................................852
Adding a Stack Unit.....................................................................................................................852
Merging Two Stacks....................................................................................................................853
Splitting a Stack...........................................................................................................................854
Managing Redundant Stack Management.................................................................................854
Resetting a Unit on a Stack.........................................................................................................854
Verify a Stack Configuration.............................................................................................................855
Using Show Commands............................................................................................................. 855
Troubleshooting a Switch Stack...................................................................................................... 858
Failure Scenarios...............................................................................................................................859
Stack Member FailsUnplugged Stacking CableMaster Switch FailsStack-Link Flapping
ErrorMaster Switch Recovers from FailureStack Unit in Card-Problem State Due to
Incorrect Dell Networking OS VersionStack Unit in Card-Problem State Due to
Configuration Mismatch.............................................................................................................859
Upgrading a Switch Stack.................................................................................................................862
Upgrading a Single Stack Unit..........................................................................................................863
50 Storm Control.................................................................................................865
Configure Storm Control................................................................................................................. 865
Configuring Storm Control from INTERFACE Mode.................................................................865
Configuring Storm Control from CONFIGURATION Mode......................................................865
51 Spanning Tree Protocol (STP)......................................................................866
Protocol Overview............................................................................................................................866
Configure Spanning Tree................................................................................................................. 866
Related Configuration Tasks...................................................................................................... 866
Important Points to Remember................................................................................................. 867
Configuring Interfaces for Layer 2 Mode.........................................................................................867
Enabling Spanning Tree Protocol Globally......................................................................................868
Adding an Interface to the Spanning Tree Group........................................................................... 870
Removing an Interface from the Spanning Tree Group.................................................................. 871
Modifying Global Parameters........................................................................................................... 871
Modifying Interface STP Parameters................................................................................................872
Enabling PortFast.............................................................................................................................. 873
Prevent Network Disruptions with BPDU Guard....................................................................... 873
Global BPDU Filtering....................................................................................................................... 876
Interface BPDU Filtering............................................................................................................. 876
Selecting STP Root............................................................................................................................877
STP Root Guard................................................................................................................................ 878
Root Guard Scenario.................................................................................................................. 878
Configuring Root Guard............................................................................................................. 879
SNMP Traps for Root Elections and Topology Changes................................................................880
Displaying STP Guard Configuration...............................................................................................880
52 System Time and Date...................................................................................881
Network Time Protocol.................................................................................................................... 881
Protocol Overview......................................................................................................................882
Configure the Network Time Protocol......................................................................................883
Enabling NTP...............................................................................................................................883
Setting the Hardware Clock with the Time Derived from NTP.................................................883
Configuring NTP Broadcasts......................................................................................................884
Disabling NTP on an Interface................................................................................................... 884
Configuring a Source IP Address for NTP Packets....................................................................884
Configuring NTP Authentication................................................................................................885
Dell Networking OS Time and Date.................................................................................................887
Configuration Task List .............................................................................................................. 887
Set Daylight Saving Time............................................................................................................889
53 Tunneling ........................................................................................................892
Configuring a Tunnel........................................................................................................................892
Configuring Tunnel keepalive.......................................................................................................... 893
Configuring the ip and ipv6 unnumbered.......................................................................................894
Configuring the Tunnel allow-remote............................................................................................ 894
Configuring the tunnel source anylocal..........................................................................................895
54 Uplink Failure Detection (UFD)................................................................... 896
Feature Description.......................................................................................................................... 896
How Uplink Failure Detection Works...............................................................................................897
UFD and NIC Teaming..................................................................................................................... 898
Important Points to Remember.......................................................................................................898
Configuring Uplink Failure Detection.............................................................................................. 899
Clearing a UFD-Disabled Interface.................................................................................................. 901
Displaying Uplink Failure Detection.................................................................................................902
Sample Configuration: Uplink Failure Detection............................................................................ 904
55 Upgrade Procedures..................................................................................... 906
Get Help with Upgrades...................................................................................................................906
56 Virtual LANs (VLANs)......................................................................................907
Default VLAN.....................................................................................................................................907
Port-Based VLANs...................................................................................................................... 908
VLANs and Port Tagging.............................................................................................................908
Configuration Task List...............................................................................................................909
Configuring Native VLANs...........................................................................................................913
Enabling Null VLAN as the Default VLAN......................................................................................... 914
57 Virtual Link Trunking (VLT)........................................................................... 915
Overview............................................................................................................................................915
Multi-domain VLT........................................................................................................................916
VLT Terminology............................................................................................................................... 917
Configure Virtual Link Trunking........................................................................................................917
Important Points to Remember..................................................................................................917
Configuration Notes....................................................................................................................918
RSTP and VLT.............................................................................................................................. 922
VLT Bandwidth Monitoring.........................................................................................................922
VLT and IGMP Snooping.............................................................................................................923
VLT Port Delayed Restoration.................................................................................................... 923
PIM-Sparse Mode Support on VLT.............................................................................................923
VLT Multicast...............................................................................................................................925
VLT Unicast Routing................................................................................................................... 926
Non-VLT ARP Sync..................................................................................................................... 927
RSTP Configuration...........................................................................................................................927
Preventing Forwarding Loops in a VLT Domain........................................................................928
Sample RSTP Configuration....................................................................................................... 928
Configuring VLT..........................................................................................................................929
Configuring a VLT Interconnect.................................................................................................929
Configuring a VLT Backup Link..................................................................................................930
Configuring a VLT Port Delay Period.........................................................................................930
Reconfiguring the Default VLT Settings (Optional) .................................................................. 930
Connecting a VLT Domain to an Attached Access Device (Switch or Server)......................... 931
Configuring a VLT VLAN Peer-Down (Optional)....................................................................... 932
Configure Multi-domain VLT (mVLT) (Optional)....................................................................... 933
Verifying a VLT Configuration.....................................................................................................935
Connecting a VLT Domain......................................................................................................... 939
mVLT Configuration Example.......................................................................................................... 943
In Domain 1, configure the VLT domain and VLTi on Peer 1Configure mVLT on Peer 1Add
links to the mVLT port-channel on Peer 1Next, configure the VLT domain and VLTi on
Peer 2Configure mVLT on Peer 2Add links to the mVLT port-channel on Peer 2In
Domain 2, configure the VLT domain and VLTi on Peer 3Configure mVLT on Peer 3Add
links to the mVLT port-channel on Peer 3Configure the VLT domain and VLTi on Peer
4Configure mVLT on Peer 4Add links to the mVLT port-channel on Peer 4..........................944
PIM-Sparse Mode Configuration Example...................................................................................... 945
Additional VLT Sample Configurations............................................................................................946
Configuring Virtual Link Trunking (VLT Peer 1)Configuring Virtual Link Trunking (VLT Peer
2)Verifying a Port-Channel Connection to a VLT Domain (From an Attached Access
Switch).........................................................................................................................................946
Troubleshooting VLT........................................................................................................................948
Specifying VLT Nodes in a PVLAN....................................................................................................950
Association of VLTi as a Member of a PVLAN............................................................................ 951
MAC Synchronization for VLT Nodes in a PVLAN......................................................................951
PVLAN Operations When One VLT Peer is Down..................................................................... 952
PVLAN Operations When a VLT Peer is Restarted.....................................................................952
Interoperation of VLT Nodes in a PVLAN with ARP Requests...................................................952
Scenarios for VLAN Membership and MAC Synchronization With VLT Nodes in PVLAN........953
Configuring a VLT VLAN or LAG in a PVLAN................................................................................... 954
Creating a VLT LAG or a VLT VLAN............................................................................................954
Associating the VLT LAG or VLT VLAN in a PVLAN....................................................................955
Proxy ARP Capability on VLT Peer Nodes........................................................................................956
Working of Proxy ARP for VLT Peer Nodes................................................................................957
58 Virtual Router Redundancy Protocol (VRRP)........................................... 959
VRRP Overview................................................................................................................................. 959
VRRP Benefits................................................................................................................................... 960
VRRP Implementation...................................................................................................................... 960
VRRP Configuration.......................................................................................................................... 961
Configuration Task List............................................................................................................... 961
Setting VRRP Initialization Delay................................................................................................ 970
Sample Configurations......................................................................................................................971
VRRP for an IPv4 Configuration..................................................................................................971
59 Standards Compliance..................................................................................974
IEEE Compliance...............................................................................................................................974
RFC and I-D Compliance..................................................................................................................975
General Internet Protocols............................................................................................................... 975
General IPv4 Protocols..................................................................................................................... 975
Border Gateway Protocol (BGP).......................................................................................................976
Open Shortest Path First (OSPF).......................................................................................................977