Dell Force10 S4810P Configuration manual

Dell Configuration Guide for the S4810 System
9.5(0.0)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2014 - 06
Rev. A00
Contents
1 About this Guide......................................................................................................35
Audience..............................................................................................................................................35
Conventions........................................................................................................................................ 35
Related Documents.............................................................................................................................35
2 Configuration Fundamentals.............................................................................. 36
Accessing the Command Line............................................................................................................36
CLI Modes............................................................................................................................................36
Navigating CLI Modes................................................................................................................... 37
The do Command...............................................................................................................................40
Undoing Commands...........................................................................................................................41
Obtaining Help.................................................................................................................................... 42
Entering and Editing Commands....................................................................................................... 42
Command History...............................................................................................................................43
Filtering show Command Outputs.....................................................................................................43
Multiple Users in Configuration Mode............................................................................................... 45
3 Getting Started........................................................................................................46
Console Access...................................................................................................................................46
Serial Console................................................................................................................................46
Accessing the CLI Interface and Running Scripts Using SSH............................................................ 47
S4810 ............................................................................................................................................ 47
Entering CLI commands Using an SSH Connection................................................................... 48
Executing Local CLI Scripts Using an SSH Connection...............................................................48
Default Configuration......................................................................................................................... 49
Configuring a Host Name...................................................................................................................49
Accessing the System Remotely........................................................................................................ 49
Accessing the S4810 and Remotely.............................................................................................49
Configure the Management Port IP Address............................................................................... 50
Configure a Management Route..................................................................................................50
Configuring a Username and Password.......................................................................................50
Configuring the Enable Password.......................................................................................................51
Configuration File Management......................................................................................................... 51
Copy Files to and from the System...............................................................................................51
Save the Running-Configuration..................................................................................................52
Configure the Overload Bit for a Startup Scenario...................................................................... 53
Viewing Files.................................................................................................................................. 53
Compressing Configuration Files................................................................................................. 54
Managing the File System................................................................................................................... 57
Enabling Software Features on Devices Using a Command Option................................................ 58
View Command History......................................................................................................................59
Upgrading Dell Networking OS.......................................................................................................... 59
Using Hashes to Validate Software Images........................................................................................59
Using HTTP for File Transfers.............................................................................................................60
4 Management............................................................................................................62
Configuring Privilege Levels............................................................................................................... 62
Creating a Custom Privilege Level................................................................................................62
Removing a Command from EXEC Mode................................................................................... 62
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 62
Allowing Access to CONFIGURATION Mode Commands.......................................................... 63
Allowing Access to the Following Modes.................................................................................... 63
Applying a Privilege Level to a Username.................................................................................... 65
Applying a Privilege Level to a Terminal Line...............................................................................65
Configuring Logging...........................................................................................................................65
Audit and Security Logs................................................................................................................ 66
Configuring Logging Format .......................................................................................................67
Display the Logging Buffer and the Logging Configuration....................................................... 68
Setting Up a Secure Connection to a Syslog Server....................................................................69
Sending System Messages to a Syslog Server..............................................................................70
Log Messages in the Internal Buffer...................................................................................................70
Configuration Task List for System Log Management.................................................................70
Disabling System Logging...................................................................................................................70
Sending System Messages to a Syslog Server.................................................................................... 71
Configuring a UNIX System as a Syslog Server.............................................................................71
Changing System Logging Settings.................................................................................................... 71
Display the Logging Buffer and the Logging Configuration..............................................................72
Configuring a UNIX Logging Facility Level.........................................................................................73
Synchronizing Log Messages..............................................................................................................74
Enabling Timestamp on Syslog Messages..........................................................................................75
File Transfer Services...........................................................................................................................75
Configuration Task List for File Transfer Services........................................................................ 75
Enabling the FTP Server................................................................................................................ 76
Configuring FTP Server Parameters..............................................................................................76
Configuring FTP Client Parameters.............................................................................................. 76
Terminal Lines......................................................................................................................................77
Denying and Permitting Access to a Terminal Line..................................................................... 77
Configuring Login Authentication for Terminal Lines................................................................. 78
Setting Time Out of EXEC Privilege Mode......................................................................................... 79
Using Telnet to get to Another Network Device............................................................................... 79
Lock CONFIGURATION Mode........................................................................................................... 80
Viewing the Configuration Lock Status........................................................................................80
Recovering from a Forgotten Password on the S4810 System.........................................................81
Recovering from a Forgotten Enable Password on the S4810 .................................................. 82
Recovering from a Failed Start on the S4810 System....................................................................... 83
Restoring the Factory Default Settings.............................................................................................. 84
S4810MXL Switch..........................................................................................................................84
Important Points to Remember....................................................................................................84
5 802.1ag......................................................................................................................85
Ethernet CFM...................................................................................................................................... 85
Maintenance Domains........................................................................................................................86
Maintenance Points............................................................................................................................ 86
Maintenance End Points..................................................................................................................... 87
Implementation Information..............................................................................................................88
Configuring the CFM.......................................................................................................................... 88
Related Configuration Tasks.........................................................................................................88
Enabling Ethernet CFM.......................................................................................................................88
Creating a Maintenance Domain....................................................................................................... 89
Creating a Maintenance Association..................................................................................................89
Create Maintenance Points................................................................................................................ 89
Creating a Maintenance End Point...............................................................................................90
Creating a Maintenance Intermediate Point................................................................................90
Displaying the MP Databases........................................................................................................ 91
Continuity Check Messages............................................................................................................... 92
Enabling CCM................................................................................................................................93
Enabling Cross-Checking............................................................................................................. 93
Sending Loopback Messages and Responses....................................................................................93
Sending Linktrace Messages and Responses.....................................................................................94
Caching Link Trace....................................................................................................................... 94
Enabling CFM SNMP Traps................................................................................................................. 95
Displaying Ethernet CFM Statistics..................................................................................................... 97
6 802.1X........................................................................................................................98
The Port-Authentication Process.......................................................................................................99
EAP over RADIUS......................................................................................................................... 101
Configuring 802.1X............................................................................................................................101
Related Configuration Tasks....................................................................................................... 101
Important Points to Remember........................................................................................................102
Enabling 802.1X.................................................................................................................................103
Configuring Request Identity Re-Transmissions.............................................................................104
Configuring a Quiet Period after a Failed Authentication......................................................... 105
Forcibly Authorizing or Unauthorizing a Port..................................................................................106
Re-Authenticating a Port.................................................................................................................. 107
Configuring Timeouts.......................................................................................................................108
Configuring Dynamic VLAN Assignment with Port Authentication................................................109
Guest and Authentication-Fail VLANs.............................................................................................. 110
Configuring a Guest VLAN...........................................................................................................111
Configuring an Authentication-Fail VLAN...................................................................................111
7 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)...........................................................................................................113
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..........................................113
Guidelines for Configuring ACL VLAN groups................................................................................. 114
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.........................115
Configuring ACL VLAN Groups................................................................................................... 115
Configuring FP Blocks for VLAN Parameters..............................................................................116
Viewing CAM Usage...........................................................................................................................117
Allocating FP Blocks for VLAN Processes.........................................................................................118
8 Access Control Lists (ACLs)................................................................................120
IP Access Control Lists (ACLs)...........................................................................................................121
CAM Usage...................................................................................................................................121
Implementing ACLs on Dell Networking OS..............................................................................123
Important Points to Remember........................................................................................................124
Configuration Task List for Route Maps..................................................................................... 124
Configuring Match Routes.......................................................................................................... 127
Configuring Set Conditions........................................................................................................ 128
Configure a Route Map for Route Redistribution...................................................................... 129
Configure a Route Map for Route Tagging................................................................................130
Continue Clause..........................................................................................................................130
IP Fragment Handling........................................................................................................................131
IP Fragments ACL Examples........................................................................................................131
Layer 4 ACL Rules Examples....................................................................................................... 132
Configure a Standard IP ACL............................................................................................................ 133
Configuring a Standard IP ACL Filter.......................................................................................... 134
Configure an Extended IP ACL......................................................................................................... 135
Configuring Filters with a Sequence Number............................................................................ 135
Configuring Filters Without a Sequence Number......................................................................136
Configure Layer 2 and Layer 3 ACLs.................................................................................................137
Assign an IP ACL to an Interface.......................................................................................................138
Applying an IP ACL............................................................................................................................138
Counting ACL Hits.......................................................................................................................139
Configure Ingress ACLs.....................................................................................................................139
Configure Egress ACLs..................................................................................................................... 140
Applying Egress Layer 3 ACLs (Control-Plane)...........................................................................141
IP Prefix Lists...................................................................................................................................... 141
Implementation Information...................................................................................................... 142
Configuration Task List for Prefix Lists....................................................................................... 142
ACL Resequencing............................................................................................................................146
Resequencing an ACL or Prefix List............................................................................................147
Route Maps........................................................................................................................................148
Implementation Information...................................................................................................... 148
Logging of ACL Processes................................................................................................................149
Guidelines for Configuring ACL Logging................................................................................... 150
Configuring ACL Logging........................................................................................................... 150
Flow-Based Monitoring Support for ACLs........................................................................................151
Behavior of Flow-Based Monitoring........................................................................................... 151
Enabling Flow-Based Monitoring............................................................................................... 153
9 Bidirectional Forwarding Detection (BFD).....................................................155
How BFD Works................................................................................................................................ 155
BFD Packet Format......................................................................................................................156
BFD Sessions................................................................................................................................158
BFD Three-Way Handshake........................................................................................................158
Session State Changes................................................................................................................ 159
Important Points to Remember....................................................................................................... 160
Configure BFD...................................................................................................................................160
Configure BFD for Physical Ports................................................................................................161
Configure BFD for Static Routes.................................................................................................164
Configure BFD for OSPF............................................................................................................. 166
Configure BFD for OSPFv3......................................................................................................... 169
Configure BFD for IS-IS...............................................................................................................170
Configure BFD for BGP............................................................................................................... 173
Configure BFD for VRRP............................................................................................................. 180
Configuring Protocol Liveness................................................................................................... 183
Troubleshooting BFD.................................................................................................................. 183
10 Border Gateway Protocol IPv4 (BGPv4)....................................................... 185
Autonomous Systems (AS)................................................................................................................185
Sessions and Peers............................................................................................................................ 187
Establish a Session.......................................................................................................................188
Route Reflectors................................................................................................................................188
BGP Attributes................................................................................................................................... 189
Best Path Selection Criteria........................................................................................................ 190
Weight..........................................................................................................................................192
Local Preference......................................................................................................................... 192
Multi-Exit Discriminators (MEDs)................................................................................................ 193
Origin........................................................................................................................................... 194
AS Path.........................................................................................................................................195
Next Hop......................................................................................................................................195
Multiprotocol BGP............................................................................................................................ 196
Implement BGP with Dell Networking OS.......................................................................................196
Additional Path (Add-Path) Support........................................................................................... 196
Advertise IGP Cost as MED for Redistributed Routes................................................................ 196
Ignore Router-ID for Some Best-Path Calculations.................................................................. 197
Four-Byte AS Numbers................................................................................................................197
AS4 Number Representation...................................................................................................... 198
AS Number Migration..................................................................................................................199
BGP4 Management Information Base (MIB).............................................................................. 201
Important Points to Remember..................................................................................................201
Configuration Information............................................................................................................... 202
BGP Configuration............................................................................................................................202
Enabling BGP...............................................................................................................................203
Configuring AS4 Number Representations................................................................................207
Configuring Peer Groups........................................................................................................... 209
Configuring BGP Fast Fall-Over..................................................................................................212
Configuring Passive Peering....................................................................................................... 213
Maintaining Existing AS Numbers During an AS Migration........................................................214
Allowing an AS Number to Appear in its Own AS Path..............................................................215
Enabling Graceful Restart............................................................................................................216
Enabling Neighbor Graceful Restart........................................................................................... 217
Filtering on an AS-Path Attribute................................................................................................218
Regular Expressions as Filters..................................................................................................... 219
Redistributing Routes.................................................................................................................. 221
Enabling Additional Paths............................................................................................................221
Configuring IP Community Lists................................................................................................ 222
Configuring an IP Extended Community List............................................................................ 224
Filtering Routes with Community Lists...................................................................................... 225
Manipulating the COMMUNITY Attribute...................................................................................225
Changing MED Attributes............................................................................................................227
Changing the LOCAL_PREFERENCE Attribute.......................................................................... 227
Changing the NEXT_HOP Attribute........................................................................................... 228
Changing the WEIGHT Attribute................................................................................................ 229
Enabling Multipath...................................................................................................................... 229
Filtering BGP Routes................................................................................................................... 229
Filtering BGP Routes Using Route Maps.....................................................................................231
Filtering BGP Routes Using AS-PATH Information....................................................................232
Configuring BGP Route Reflectors.............................................................................................232
Aggregating Routes.....................................................................................................................233
Configuring BGP Confederations.............................................................................................. 234
Enabling Route Flap Dampening................................................................................................234
Changing BGP Timers.................................................................................................................237
Enabling BGP Neighbor Soft-Reconfiguration.......................................................................... 237
Route Map Continue...................................................................................................................239
Enabling MBGP Configurations........................................................................................................239
BGP Regular Expression Optimization............................................................................................ 240
Debugging BGP................................................................................................................................ 240
Storing Last and Bad PDUs......................................................................................................... 241
Capturing PDUs...........................................................................................................................242
PDU Counters............................................................................................................................. 243
Sample Configurations.....................................................................................................................244
11 Content Addressable Memory (CAM)............................................................ 250
CAM Allocation................................................................................................................................. 250
Test CAM Usage................................................................................................................................252
View CAM-ACL Settings................................................................................................................... 252
View CAM Usage...............................................................................................................................254
CAM Optimization.............................................................................................................................255
Troubleshoot CAM Profiling.............................................................................................................255
CAM Profile Mismatches.............................................................................................................255
QoS CAM Region Limitation.......................................................................................................256
12 Control Plane Policing (CoPP)........................................................................ 257
Configure Control Plane Policing.................................................................................................... 258
Configuring CoPP for Protocols................................................................................................ 259
Configuring CoPP for CPU Queues........................................................................................... 261
CoPP for OSPFv3 Packets...........................................................................................................262
Configuring CoPP for OSPFv3....................................................................................................265
Show Commands....................................................................................................................... 266
13 Data Center Bridging (DCB).............................................................................268
Ethernet Enhancements in Data Center Bridging...........................................................................268
Priority-Based Flow Control.......................................................................................................269
Enhanced Transmission Selection............................................................................................. 270
Data Center Bridging Exchange Protocol (DCBx)......................................................................272
Data Center Bridging in a Traffic Flow....................................................................................... 273
Enabling Data Center Bridging......................................................................................................... 273
QoS dot1p Traffic Classification and Queue Assignment............................................................... 274
Configuring Priority-Based Flow Control........................................................................................ 275
Configuring Lossless Queues..................................................................................................... 277
Configuring the PFC Buffer in a Switch Stack............................................................................278
Configure Enhanced Transmission Selection..................................................................................279
ETS Prerequisites and Restrictions............................................................................................. 279
Creating a QoS DCB Output Policy........................................................................................... 280
Creating an ETS Priority Group.................................................................................................. 282
Applying an ETS Output Policy for a Priority Group to an Interface.........................................283
ETS Operation with DCBx.......................................................................................................... 284
Configuring Bandwidth Allocation for DCBx CIN..................................................................... 285
Applying DCB Policies in a Switch Stack..........................................................................................285
Applying DCB Policies with an ETS Configuration..........................................................................286
Configure a DCBx Operation........................................................................................................... 286
DCBx Operation..........................................................................................................................287
DCBx Port Roles..........................................................................................................................287
DCB Configuration Exchange.................................................................................................... 289
Configuration Source Election...................................................................................................289
Propagation of DCB Information...............................................................................................290
Auto-Detection and Manual Configuration of the DCBx Version............................................290
DCBx Example.............................................................................................................................291
DCBx Prerequisites and Restrictions.......................................................................................... 291
Configuring DCBx....................................................................................................................... 291
Verifying the DCB Configuration..................................................................................................... 296
PFC and ETS Configuration Examples............................................................................................. 307
Using PFC and ETS to Manage Data Center Traffic........................................................................ 307
PFC and ETS Configuration Command Examples.................................................................... 309
Using PFC and ETS to Manage Converged Ethernet Traffic in a Switch Stack........................ 310
Hierarchical Scheduling in ETS Output Policies........................................................................ 310
Configuring DCB Maps and its Attributes.........................................................................................311
DCB Map: Configuration Procedure...........................................................................................311
Important Points to Remember..................................................................................................312
Applying a DCB Map on a Port................................................................................................... 312
Configuring PFC without a DCB Map.........................................................................................313
Configuring Lossless Queues..................................................................................................... 314
Priority-Based Flow Control Using Dynamic Buffer Method.......................................................... 315
Pause and Resume of Traffic...................................................................................................... 315
Buffer Sizes for Lossless or PFC Packets.................................................................................... 315
Interworking of DCB Map With DCB Buffer Threshold Settings.....................................................316
Configuring the Dynamic Buffer Method.........................................................................................317
14 Dynamic Host Configuration Protocol (DHCP).......................................... 319
DHCP Packet Format and Options...................................................................................................319
Assign an IP Address using DHCP.....................................................................................................321
Implementation Information............................................................................................................322
Configure the System to be a DHCP Server.................................................................................... 323
Configuring the Server for Automatic Address Allocation........................................................ 323
Specifying a Default Gateway.....................................................................................................325
Configure a Method of Hostname Resolution...........................................................................325
Using DNS for Address Resolution............................................................................................. 325
Using NetBIOS WINS for Address Resolution............................................................................ 325
Creating Manual Binding Entries................................................................................................ 326
Debugging the DHCP Server......................................................................................................326
Using DHCP Clear Commands.................................................................................................. 326
Configure the System to be a Relay Agent...................................................................................... 327
Configure the System to be a DHCP Client.....................................................................................329
Configuring the DHCP Client System........................................................................................329
DHCP Client on a Management Interface..................................................................................331
DHCP Client Operation with Other Features.............................................................................331
Configure the System for User Port Stacking (Option 230)............................................................332
Configure Secure DHCP...................................................................................................................333
Option 82.................................................................................................................................... 333
DHCP Snooping..........................................................................................................................334
Drop DHCP Packets on Snooped VLANs Only..........................................................................336
Dynamic ARP Inspection............................................................................................................ 336
Configuring Dynamic ARP Inspection........................................................................................337
Source Address Validation................................................................................................................338
Enabling IP Source Address Validation.......................................................................................338
DHCP MAC Source Address Validation......................................................................................339
Enabling IP+MAC Source Address Validation............................................................................ 339
15 Equal Cost Multi-Path (ECMP).........................................................................341
ECMP for Flow-Based Affinity...........................................................................................................341
Configuring the Hash Algorithm.................................................................................................341
Enabling Deterministic ECMP Next Hop.................................................................................... 341
Configuring the Hash Algorithm Seed....................................................................................... 342
Link Bundle Monitoring.................................................................................................................... 342
Managing ECMP Group Paths.................................................................................................... 343
Creating an ECMP Group Bundle...............................................................................................344
Modifying the ECMP Group Threshold......................................................................................344
16 FCoE Transit........................................................................................................ 346
Fibre Channel over Ethernet............................................................................................................ 346
Ensure Robustness in a Converged Ethernet Network...................................................................346
FIP Snooping on Ethernet Bridges...................................................................................................348
FIP Snooping in a Switch Stack........................................................................................................ 350
Using FIP Snooping...........................................................................................................................350
FIP Snooping Prerequisites.........................................................................................................350
Important Points to Remember..................................................................................................351
Enabling the FCoE Transit Feature..............................................................................................351
Enable FIP Snooping on VLANs..................................................................................................352
Configure the FC-MAP Value..................................................................................................... 352
Configure a Port for a Bridge-to-Bridge Link............................................................................ 352
Configure a Port for a Bridge-to-FCF Link................................................................................ 352
Impact on Other Software Features...........................................................................................352
FIP Snooping Restrictions...........................................................................................................353
Configuring FIP Snooping...........................................................................................................353
Displaying FIP Snooping Information.............................................................................................. 354
FCoE Transit Configuration Example...............................................................................................360
17 Enabling FIPS Cryptography............................................................................362
Configuration Tasks..........................................................................................................................362
Preparing the System........................................................................................................................362
Enabling FIPS Mode.......................................................................................................................... 363
Generating Host-Keys...................................................................................................................... 363
Monitoring FIPS Mode Status...........................................................................................................364
Disabling FIPS Mode......................................................................................................................... 364
18 Force10 Resilient Ring Protocol (FRRP)....................................................... 366
Protocol Overview............................................................................................................................366
Ring Status...................................................................................................................................367
Multiple FRRP Rings.................................................................................................................... 368
Important FRRP Points................................................................................................................368
Important FRRP Concepts..........................................................................................................368
Implementing FRRP.......................................................................................................................... 370
FRRP Configuration.......................................................................................................................... 370
Creating the FRRP Group........................................................................................................... 370
Configuring the Control VLAN....................................................................................................371
Configuring and Adding the Member VLANs.............................................................................372
Setting the FRRP Timers..............................................................................................................374
Clearing the FRRP Counters....................................................................................................... 374
Viewing the FRRP Configuration................................................................................................ 374
Viewing the FRRP Information....................................................................................................374
Troubleshooting FRRP...................................................................................................................... 375
Configuration Checks................................................................................................................. 375
Sample Configuration and Topology...............................................................................................375
19 GARP VLAN Registration Protocol (GVRP)...................................................378
Important Points to Remember....................................................................................................... 378
Configure GVRP................................................................................................................................379
Related Configuration Tasks.......................................................................................................379
Enabling GVRP Globally................................................................................................................... 380
Enabling GVRP on a Layer 2 Interface.............................................................................................380
Configure GVRP Registration...........................................................................................................380
Configure a GARP Timer...................................................................................................................381
RPM Redundancy..............................................................................................................................382
20 High Availability (HA)........................................................................................ 383
Component Redundancy.................................................................................................................383
Automatic and Manual Stack Unit Failover................................................................................ 383
Synchronization between Management and Standby Units.....................................................384
Forcing an Stack Unit Failover....................................................................................................384
Specifying an Auto-Failover Limit.............................................................................................. 385
Disabling Auto-Reboot............................................................................................................... 385
Manually Synchronizing Management and Standby Units........................................................385
Pre-Configuring a Stack Unit Slot....................................................................................................385
Removing a Provisioned Logical Stack Unit.................................................................................... 386
Hitless Behavior................................................................................................................................ 386
Graceful Restart................................................................................................................................ 387
Software Resiliency...........................................................................................................................387
Software Component Health Monitoring.................................................................................. 387
System Health Monitoring.......................................................................................................... 387
Failure and Event Logging.......................................................................................................... 387
Hot-Lock Behavior........................................................................................................................... 388
21 Internet Group Management Protocol (IGMP)...........................................389
IGMP Implementation Information..................................................................................................389
IGMP Protocol Overview..................................................................................................................389
IGMP Version 2........................................................................................................................... 389
IGMP Version 3............................................................................................................................ 391
Configure IGMP................................................................................................................................ 394
Related Configuration Tasks...................................................................................................... 394
Viewing IGMP Enabled Interfaces.................................................................................................... 395
Selecting an IGMP Version............................................................................................................... 395
Viewing IGMP Groups...................................................................................................................... 396
Adjusting Timers............................................................................................................................... 396
Adjusting Query and Response Timers......................................................................................396
Adjusting the IGMP Querier Timeout Value...............................................................................397
Configuring a Static IGMP Group.....................................................................................................397
Enabling IGMP Immediate-Leave.................................................................................................... 398
IGMP Snooping.................................................................................................................................398
IGMP Snooping Implementation Information...........................................................................398
Configuring IGMP Snooping...................................................................................................... 398
Removing a Group-Port Association......................................................................................... 399
Disabling Multicast Flooding...................................................................................................... 399
Specifying a Port as Connected to a Multicast Router............................................................. 400
Configuring the Switch as Querier............................................................................................ 400
Fast Convergence after MSTP Topology Changes..........................................................................401
Egress Interface Selection (EIS) for HTTP and IGMP Applications..................................................401
Protocol Separation....................................................................................................................402
Enabling and Disabling Management Egress Interface Selection............................................ 403
Handling of Management Route Configuration........................................................................404
Handling of Switch-Initiated Traffic...........................................................................................404
Handling of Switch-Destined Traffic......................................................................................... 405
Handling of Transit Traffic (Traffic Separation)......................................................................... 406
Mapping of Management Applications and Traffic Type..........................................................406
Behavior of Various Applications for Switch-Initiated Traffic .................................................. 407
Behavior of Various Applications for Switch-Destined Traffic ................................................ 408
Interworking of EIS With Various Applications.......................................................................... 409
Designating a Multicast Router Interface.........................................................................................410
22 Interfaces.............................................................................................................. 411
Basic Interface Configuration........................................................................................................... 411
Advanced Interface Configuration....................................................................................................411
Interface Types..................................................................................................................................412
View Basic Interface Information..................................................................................................... 412
Enabling a Physical Interface............................................................................................................414
Physical Interfaces............................................................................................................................ 414
Configuration Task List for Physical Interfaces.......................................................................... 415
Overview of Layer Modes............................................................................................................415
Configuring Layer 2 (Data Link) Mode........................................................................................415
Configuring Layer 2 (Interface) Mode........................................................................................ 416
Configuring Layer 3 (Network) Mode.........................................................................................416
Configuring Layer 3 (Interface) Mode.........................................................................................417
Egress Interface Selection (EIS).........................................................................................................417
Important Points to Remember..................................................................................................418
Configuring EIS............................................................................................................................418
Management Interfaces....................................................................................................................418
Configuring Management Interfaces......................................................................................... 418
Configuring Management Interfaces on the S-Series............................................................... 419
VLAN Interfaces................................................................................................................................ 420
Loopback Interfaces..........................................................................................................................421
Null Interfaces................................................................................................................................... 421
Port Channel Interfaces.................................................................................................................... 421
Port Channel Definition and Standards......................................................................................422
Port Channel Benefits.................................................................................................................422
Port Channel Implementation....................................................................................................422
10/100/1000 Mbps Interfaces in Port Channels........................................................................423
Configuration Tasks for Port Channel Interfaces...................................................................... 423
Creating a Port Channel............................................................................................................. 424
Adding a Physical Interface to a Port Channel.......................................................................... 424
Reassigning an Interface to a New Port Channel......................................................................426
Configuring the Minimum Oper Up Links in a Port Channel.................................................... 427
..................................................................................................................................................... 427
Assigning an IP Address to a Port Channel................................................................................428
Deleting or Disabling a Port Channel.........................................................................................428
Load Balancing Through Port Channels....................................................................................428
Load-Balancing on the S- Series................................................................................................429
Changing the Hash Algorithm....................................................................................................429
Bulk Configuration............................................................................................................................ 431
Interface Range........................................................................................................................... 431
Bulk Configuration Examples......................................................................................................431
Defining Interface Range Macros.....................................................................................................433
Define the Interface Range.........................................................................................................433
Choosing an Interface-Range Macro........................................................................................ 433
Monitoring and Maintaining Interfaces............................................................................................434
Maintenance Using TDR............................................................................................................. 435
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 435
Link Dampening................................................................................................................................436
Important Points to Remember..................................................................................................437
Enabling Link Dampening...........................................................................................................437
Link Bundle Monitoring.................................................................................................................... 438
Using Ethernet Pause Frames for Flow Control.............................................................................. 439
Threshold Settings......................................................................................................................440
Enabling Pause Frames...............................................................................................................440
Configure the MTU Size on an Interface......................................................................................... 441
Port-Pipes......................................................................................................................................... 442
Auto-Negotiation on Ethernet Interfaces........................................................................................442
Setting the Speed and Duplex Mode of Ethernet Interfaces.....................................................442
Set Auto-Negotiation Options................................................................................................... 444
View Advanced Interface Information.............................................................................................444
Configuring the Interface Sampling Size................................................................................... 445
Dynamic Counters............................................................................................................................447
Clearing Interface Counters....................................................................................................... 447
Enhanced Validation of Interface Ranges....................................................................................... 448
23 Internet Protocol Security (IPSec).................................................................449
Configuring IPSec ............................................................................................................................450
24 IPv4 Routing........................................................................................................ 451
IP Addresses.......................................................................................................................................451
Implementation Information...................................................................................................... 451
Configuration Tasks for IP Addresses...............................................................................................451
Assigning IP Addresses to an Interface............................................................................................ 452
Configuring Static Routes.................................................................................................................453
Configure Static Routes for the Management Interface.................................................................454
IPv4 Path MTU Discovery Overview.................................................................................................455
Using the Configured Source IP Address in ICMP Messages..........................................................456
Configuring the ICMP Source Interface.....................................................................................456
Configuring the Duration to Establish a TCP Connection..............................................................456
Enabling Directed Broadcast............................................................................................................ 457
Resolution of Host Names................................................................................................................457
Enabling Dynamic Resolution of Host Names.................................................................................457
Specifying the Local System Domain and a List of Domains..........................................................458
Configuring DNS with Traceroute................................................................................................... 459
ARP.................................................................................................................................................... 459
Configuration Tasks for ARP............................................................................................................ 460
Configuring Static ARP Entries.........................................................................................................460
Enabling Proxy ARP...........................................................................................................................461
Clearing ARP Cache..........................................................................................................................461
ARP Learning via Gratuitous ARP......................................................................................................461
Enabling ARP Learning via Gratuitous ARP......................................................................................462
ARP Learning via ARP Request......................................................................................................... 462
Configuring ARP Retries................................................................................................................... 463
ICMP..................................................................................................................................................464
Configuration Tasks for ICMP..........................................................................................................464
Enabling ICMP Unreachable Messages........................................................................................... 464
UDP Helper....................................................................................................................................... 464
Configure UDP Helper................................................................................................................464
Important Points to Remember................................................................................................. 465
Enabling UDP Helper........................................................................................................................465
Configuring a Broadcast Address.....................................................................................................465
Configurations Using UDP Helper................................................................................................... 466
UDP Helper with Broadcast-All Addresses......................................................................................466
UDP Helper with Subnet Broadcast Addresses............................................................................... 467
UDP Helper with Configured Broadcast Addresses........................................................................468
UDP Helper with No Configured Broadcast Addresses..................................................................468
Troubleshooting UDP Helper...........................................................................................................468
25 IPv6 Routing........................................................................................................470
Protocol Overview............................................................................................................................470
Extended Address Space............................................................................................................ 470
Stateless Autoconfiguration....................................................................................................... 470
IPv6 Headers................................................................................................................................471
IPv6 Header Fields.......................................................................................................................472
Extension Header Fields..............................................................................................................473
Addressing...................................................................................................................................474
Implementing IPv6 with Dell Networking OS..................................................................................476
ICMPv6.............................................................................................................................................. 478
Path MTU Discovery......................................................................................................................... 478
IPv6 Neighbor Discovery..................................................................................................................479
IPv6 Neighbor Discovery of MTU Packets.................................................................................480
Configuration Task List for IPv6 RDNSS.......................................................................................... 480
Configuring the IPv6 Recursive DNS Server..............................................................................480
Debugging IPv6 RDNSS Information Sent to the Host .............................................................481
Displaying IPv6 RDNSS Information...........................................................................................482
Secure Shell (SSH) Over an IPv6 Transport......................................................................................483
Configuration Tasks for IPv6............................................................................................................483
Adjusting Your CAM-Profile....................................................................................................... 483
Assigning an IPv6 Address to an Interface.................................................................................484
Assigning a Static IPv6 Route..................................................................................................... 484
Configuring Telnet with IPv6......................................................................................................485
SNMP over IPv6...........................................................................................................................485
Showing IPv6 Information..........................................................................................................486
Showing an IPv6 Interface..........................................................................................................486
Showing IPv6 Routes.................................................................................................................. 487
Showing the Running-Configuration for an Interface..............................................................488
Clearing IPv6 Routes.................................................................................................................. 489
26 iSCSI Optimization............................................................................................490
iSCSI Optimization Overview...........................................................................................................490
Monitoring iSCSI Traffic Flows................................................................................................... 492
Application of Quality of Service to iSCSI Traffic Flows............................................................492
Information Monitored in iSCSI Traffic Flows............................................................................492
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................ 493
Configuring Detection and Ports for Dell Compellent Arrays..................................................494
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................494
Enable and Disable iSCSI Optimization..................................................................................... 494
Default iSCSI Optimization Values...................................................................................................495
iSCSI Optimization Prerequisites..................................................................................................... 496
Configuring iSCSI Optimization.......................................................................................................496
Displaying iSCSI Optimization Information..................................................................................... 498
27 Intermediate System to Intermediate System............................................500
IS-IS Protocol Overview...................................................................................................................500
IS-IS Addressing................................................................................................................................500
Multi-Topology IS-IS.........................................................................................................................501
Transition Mode.......................................................................................................................... 502
Interface Support........................................................................................................................ 502
Adjacencies................................................................................................................................. 502
Graceful Restart................................................................................................................................ 502
Timers..........................................................................................................................................503
Implementation Information............................................................................................................503
Configuration Information............................................................................................................... 504
Configuration Tasks for IS-IS..................................................................................................... 504
Configuring the Distance of a Route..........................................................................................513
Changing the IS-Type................................................................................................................. 513
Redistributing IPv4 Routes..........................................................................................................516
Redistributing IPv6 Routes.......................................................................................................... 517
Configuring Authentication Passwords......................................................................................518
Setting the Overload Bit.............................................................................................................. 519
Debugging IS-IS...........................................................................................................................519
IS-IS Metric Styles............................................................................................................................. 520
Configure Metric Values....................................................................................................................521
Maximum Values in the Routing Table.......................................................................................521
Change the IS-IS Metric Style in One Level Only.......................................................................521
Leaks from One Level to Another.............................................................................................. 523
Sample Configurations..................................................................................................................... 524
28 Link Aggregation Control Protocol (LACP)................................................. 527
Introduction to Dynamic LAGs and LACP........................................................................................527
Important Points to Remember..................................................................................................527
LACP Modes................................................................................................................................528
Configuring LACP Commands...................................................................................................528
LACP Configuration Tasks................................................................................................................529
Creating a LAG............................................................................................................................ 529
Configuring the LAG Interfaces as Dynamic............................................................................. 530
Setting the LACP Long Timeout.................................................................................................530
Monitoring and Debugging LACP...............................................................................................531
Shared LAG State Tracking................................................................................................................531
Configuring Shared LAG State Tracking.....................................................................................532
Important Points about Shared LAG State Tracking..................................................................533
LACP Basic Configuration Example................................................................................................. 534
Configure a LAG on ALPHA........................................................................................................ 534
29 Layer 2...................................................................................................................542
Manage the MAC Address Table...................................................................................................... 542
Clearing the MAC Address Table................................................................................................542
Setting the Aging Time for Dynamic Entries..............................................................................542
Configuring a Static MAC Address............................................................................................. 543
Displaying the MAC Address Table.............................................................................................543
MAC Learning Limit...........................................................................................................................543
Setting the MAC Learning Limit..................................................................................................544
mac learning-limit Dynamic.......................................................................................................544
mac learning-limit mac-address-sticky.....................................................................................545
mac learning-limit station-move............................................................................................... 545
mac learning-limit no-station-move.........................................................................................545
Learning Limit Violation Actions.................................................................................................546
Setting Station Move Violation Actions......................................................................................546
Recovering from Learning Limit and Station Move Violations..................................................547
NIC Teaming..................................................................................................................................... 547
Configure Redundant Pairs.............................................................................................................. 548
Important Points about Configuring Redundant Pairs..............................................................550
Far-End Failure Detection.................................................................................................................551
FEFD State Changes....................................................................................................................552
Configuring FEFD........................................................................................................................ 553
Enabling FEFD on an Interface................................................................................................... 554
Debugging FEFD......................................................................................................................... 555
30 Link Layer Discovery Protocol (LLDP)...........................................................557
802.1AB (LLDP) Overview................................................................................................................. 557
Protocol Data Units.....................................................................................................................557
Optional TLVs....................................................................................................................................558
Management TLVs...................................................................................................................... 558
TIA-1057 (LLDP-MED) Overview......................................................................................................560
TIA Organizationally Specific TLVs............................................................................................. 561
Configure LLDP.................................................................................................................................565
Related Configuration Tasks.......................................................................................................565
Important Points to Remember................................................................................................. 566
LLDP Compatibility..................................................................................................................... 566
CONFIGURATION versus INTERFACE Configurations....................................................................566
Enabling LLDP................................................................................................................................... 567
Disabling and Undoing LLDP......................................................................................................567
Enabling LLDP on Management Ports............................................................................................. 567
Disabling and Undoing LLDP on Management Ports................................................................ 567
Advertising TLVs................................................................................................................................568
Viewing the LLDP Configuration......................................................................................................569
Viewing Information Advertised by Adjacent LLDP Agents.............................................................570
Configuring LLDPDU Intervals.......................................................................................................... 571
Configuring Transmit and Receive Mode.........................................................................................571
Configuring a Time to Live............................................................................................................... 572
Debugging LLDP............................................................................................................................... 573
Relevant Management Objects........................................................................................................ 574
31 Microsoft Network Load Balancing...............................................................580
NLB Unicast Mode Scenario.............................................................................................................580
NLB Multicast Mode Scenario...........................................................................................................581
Limitations With Enabling NLB on Switches.................................................................................... 581
Benefits and Working of Microsoft Clustering.................................................................................581
Enable and Disable VLAN Flooding .................................................................................................582
Configuring a Switch for NLB ..........................................................................................................582
..................................................................................................................................................... 582
32 Multicast Source Discovery Protocol (MSDP).............................................583
Protocol Overview............................................................................................................................583
Anycast RP.........................................................................................................................................585
Implementation Information............................................................................................................585
Configure Multicast Source Discovery Protocol............................................................................. 585
Related Configuration Tasks.......................................................................................................585
Enable MSDP.....................................................................................................................................589
Manage the Source-Active Cache...................................................................................................590
Viewing the Source-Active Cache............................................................................................. 590
Limiting the Source-Active Cache..............................................................................................591
Clearing the Source-Active Cache............................................................................................. 591
Enabling the Rejected Source-Active Cache............................................................................. 591
Accept Source-Active Messages that Fail the RFP Check...............................................................591
Specifying Source-Active Messages................................................................................................ 595
Limiting the Source-Active Messages from a Peer......................................................................... 596
Preventing MSDP from Caching a Local Source.............................................................................596
Preventing MSDP from Caching a Remote Source.........................................................................597
Preventing MSDP from Advertising a Local Source........................................................................ 598
Logging Changes in Peership States................................................................................................599
Terminating a Peership.....................................................................................................................599
Clearing Peer Statistics..................................................................................................................... 599
Debugging MSDP............................................................................................................................. 600
MSDP with Anycast RP.....................................................................................................................600
Configuring Anycast RP....................................................................................................................602
Reducing Source-Active Message Flooding..............................................................................602
Specifying the RP Address Used in SA Messages...................................................................... 602
MSDP Sample Configurations..........................................................................................................605
33 Multiple Spanning Tree Protocol (MSTP).................................................... 608
Protocol Overview............................................................................................................................608
Spanning Tree Variations................................................................................................................. 609
Implementation Information......................................................................................................609
Configure Multiple Spanning Tree Protocol................................................................................... 609
Related Configuration Tasks...................................................................................................... 609
Enable Multiple Spanning Tree Globally.......................................................................................... 610
Adding and Removing Interfaces..................................................................................................... 610
Creating Multiple Spanning Tree Instances..................................................................................... 610
Influencing MSTP Root Selection.....................................................................................................612
Interoperate with Non-Dell Networking OS Bridges.......................................................................612
Changing the Region Name or Revision..........................................................................................613
Modifying Global Parameters........................................................................................................... 613
Modifying the Interface Parameters................................................................................................. 615
Configuring an EdgePort.................................................................................................................. 615
Flush MAC Addresses after a Topology Change..............................................................................616
MSTP Sample Configurations........................................................................................................... 617
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration.............................................................617
Debugging and Verifying MSTP Configurations..............................................................................620
34 Multicast Features..............................................................................................623
Enabling IP Multicast.........................................................................................................................623
Multicast with ECMP.........................................................................................................................623
Implementation Information............................................................................................................624
First Packet Forwarding for Lossless Multicast................................................................................ 625
Multicast Policies.............................................................................................................................. 625
IPv4 Multicast Policies................................................................................................................ 625
35 Open Shortest Path First (OSPFv2 and OSPFv3)........................................ 633
Protocol Overview............................................................................................................................633
Autonomous System (AS) Areas................................................................................................. 633
Area Types...................................................................................................................................634
Networks and Neighbors............................................................................................................635
Router Types............................................................................................................................... 635
Designated and Backup Designated Routers.............................................................................637
Link-State Advertisements (LSAs)............................................................................................... 637
Virtual Links................................................................................................................................. 639
Router Priority and Cost............................................................................................................. 639
OSPF with Dell Networking OS........................................................................................................640
Graceful Restart.......................................................................................................................... 640
Fast Convergence (OSPFv2, IPv4 Only)......................................................................................641
Multi-Process OSPFv2 (IPv4 only)..............................................................................................642
OSPF ACK Packing......................................................................................................................642
Setting OSPF Adjacency with Cisco Routers............................................................................. 642
Configuration Information............................................................................................................... 643
Configuration Task List for OSPFv2 (OSPF for IPv4)..................................................................643
Configuration Task List for OSPFv3 (OSPF for IPv6)....................................................................... 660
Enabling IPv6 Unicast Routing...................................................................................................660
Assigning IPv6 Addresses on an Interface..................................................................................661
Assigning Area ID on an Interface.............................................................................................. 661
Assigning OSPFv3 Process ID and Router ID Globally...............................................................661
Configuring Stub Areas...............................................................................................................662
Configuring Passive-Interface....................................................................................................662
Redistributing Routes..................................................................................................................663
Configuring a Default Route...................................................................................................... 663
Enabling OSPFv3 Graceful Restart............................................................................................. 663
OSPFv3 Authentication Using IPsec...........................................................................................666
Troubleshooting OSPFv3............................................................................................................673
36 Policy-based Routing (PBR)............................................................................ 675
Overview............................................................................................................................................675
Implementing Policy-based Routing with Dell Networking OS......................................................677
Configuration Task List for Policy-based Routing...........................................................................677
PBR Exceptions (Permit).............................................................................................................680
Sample Configuration.......................................................................................................................682
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View
Redirect-List GOLD.................................................................................................................... 683
37 PIM Sparse-Mode (PIM-SM)............................................................................ 685
Implementation Information............................................................................................................685
Protocol Overview............................................................................................................................685
Requesting Multicast Traffic.......................................................................................................685
Refuse Multicast Traffic.............................................................................................................. 686
Send Multicast Traffic................................................................................................................. 686
Configuring PIM-SM......................................................................................................................... 687
Related Configuration Tasks.......................................................................................................687
Enable PIM-SM..................................................................................................................................687
Configuring S,G Expiry Timers......................................................................................................... 688
Configuring a Static Rendezvous Point...........................................................................................690
Overriding Bootstrap Router Updates....................................................................................... 690
Configuring a Designated Router....................................................................................................690
Creating Multicast Boundaries and Domains...................................................................................691
38 PIM Source-Specific Mode (PIM-SSM)......................................................... 692
Implementation Information............................................................................................................692
Important Points to Remember................................................................................................. 692
Configure PIM-SMM.........................................................................................................................693
Related Configuration Tasks...................................................................................................... 693
Enabling PIM-SSM............................................................................................................................ 693
Use PIM-SSM with IGMP Version 2 Hosts....................................................................................... 693
Configuring PIM-SSM with IGMPv2...........................................................................................694
39 Port Monitoring..................................................................................................696
Important Points to Remember.......................................................................................................696
Port Monitoring.................................................................................................................................697
Configuring Port Monitoring............................................................................................................699
Enabling Flow-Based Monitoring.....................................................................................................700
Remote Port Mirroring...................................................................................................................... 701
Remote Port Mirroring Example.................................................................................................702
Configuring Remote Port Mirroring........................................................................................... 702
Displaying Remote-Port Mirroring Configurations................................................................... 704
Configuring the Sample Remote Port Mirroring........................................................................705
Configuring the Encapsulated Remote Port Mirroring................................................................... 708
Configuration steps for ERPM ................................................................................................... 708
ERPM Behavior on a typical Dell Networking OS ........................................................................... 710
Decapsulation of ERPM packets at the Destination IP/ Analyzer..............................................710
40 Private VLANs (PVLAN)......................................................................................712
Private VLAN Concepts..................................................................................................................... 712
Using the Private VLAN Commands................................................................................................. 713
Configuration Task List......................................................................................................................714
Creating PVLAN ports..................................................................................................................714
Creating a Primary VLAN.............................................................................................................715
Creating a Community VLAN......................................................................................................716
Creating an Isolated VLAN...........................................................................................................717
Private VLAN Configuration Example...............................................................................................718
Inspecting the Private VLAN Configuration......................................................................................719
41 Per-VLAN Spanning Tree Plus (PVST+)......................................................... 722
Protocol Overview............................................................................................................................ 722
Implementation Information............................................................................................................ 723
Configure Per-VLAN Spanning Tree Plus.........................................................................................723
Related Configuration Tasks.......................................................................................................723
Enabling PVST+.................................................................................................................................724
Disabling PVST+................................................................................................................................724
Influencing PVST+ Root Selection................................................................................................... 724
Modifying Global PVST+ Parameters............................................................................................... 726
Modifying Interface PVST+ Parameters........................................................................................... 727
Configuring an EdgePort..................................................................................................................728
PVST+ in Multi-Vendor Networks.................................................................................................... 729
Enabling PVST+ Extend System ID...................................................................................................729
PVST+ Sample Configurations......................................................................................................... 730
42 Quality of Service (QoS)................................................................................... 732
Implementation Information............................................................................................................ 734
Port-Based QoS Configurations.......................................................................................................734
Setting dot1p Priorities for Incoming Traffic..............................................................................735
Honoring dot1p Priorities on Ingress Traffic.............................................................................. 735
Configuring Port-Based Rate Policing....................................................................................... 736
Configuring Port-Based Rate Shaping....................................................................................... 736
Policy-Based QoS Configurations....................................................................................................737
Classify Traffic..............................................................................................................................737
Create a QoS Policy.....................................................................................................................741
Create Policy Maps..................................................................................................................... 744
DSCP Color Maps..............................................................................................................................747
Creating a DSCP Color Map....................................................................................................... 748
Displaying DSCP Color Maps......................................................................................................749
Displaying a DSCP Color Policy Configuration ........................................................................ 749
Enabling QoS Rate Adjustment........................................................................................................ 750
Enabling Strict-Priority Queueing.................................................................................................... 750
Weighted Random Early Detection.................................................................................................. 751
Creating WRED Profiles...............................................................................................................752
Applying a WRED Profile to Traffic............................................................................................. 752
Displaying Default and Configured WRED Profiles....................................................................752
Displaying WRED Drop Statistics................................................................................................ 753
Pre-Calculating Available QoS CAM Space..................................................................................... 753
Configuring Weights and ECN for WRED ....................................................................................... 754
Global Service Pools With WRED and ECN Settings..................................................................755
Configuring WRED and ECN Attributes........................................................................................... 756
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................ 758
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class..........758
Classifying Incoming Packets Using ECN and Color-Marking..................................................759
Sample configuration to mark non-ecn packets as “yellow” with single traffic class..............761
Applying Layer 2 Match Criteria on a Layer 3 Interface.................................................................. 762
Applying DSCP and VLAN Match Criteria on a Service Queue....................................................... 763
Classifying Incoming Packets Using ECN and Color-Marking....................................................... 764
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................766
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class................767
Sample configuration to mark non-ecn packets as “yellow” with single traffic class....................767
43 Routing Information Protocol (RIP)..............................................................769
Protocol Overview............................................................................................................................769
RIPv1............................................................................................................................................ 769
RIPv2............................................................................................................................................769
Implementation Information............................................................................................................ 770
Configuration Information................................................................................................................770
Configuration Task List............................................................................................................... 770
RIP Configuration Example......................................................................................................... 777
44 Remote Monitoring (RMON)...........................................................................783
Implementation Information............................................................................................................783
Fault Recovery...................................................................................................................................783
Setting the rmon Alarm...............................................................................................................784
Configuring an RMON Event...................................................................................................... 785
Configuring RMON Collection Statistics....................................................................................785
Configuring the RMON Collection History................................................................................786
45 Rapid Spanning Tree Protocol (RSTP).......................................................... 787
Protocol Overview............................................................................................................................ 787
Configuring Rapid Spanning Tree.................................................................................................... 787
Related Configuration Tasks.......................................................................................................787
Important Points to Remember....................................................................................................... 788
RSTP and VLT.............................................................................................................................. 788
Configuring Interfaces for Layer 2 Mode.........................................................................................788
Enabling Rapid Spanning Tree Protocol Globally............................................................................789
Adding and Removing Interfaces......................................................................................................791
Modifying Global Parameters........................................................................................................... 792
Enabling SNMP Traps for Root Elections and Topology Changes........................................... 793
Modifying Interface Parameters....................................................................................................... 793
Enabling SNMP Traps for Root Elections and Topology Changes................................................. 794
Influencing RSTP Root Selection..................................................................................................... 794
Configuring an EdgePort..................................................................................................................794
Configuring Fast Hellos for Link State Detection............................................................................ 795
46 Software-Defined Networking (SDN)........................................................... 797
47 Security.................................................................................................................798
AAA Accounting................................................................................................................................ 798
Configuration Task List for AAA Accounting..............................................................................798
AAA Authentication.......................................................................................................................... 800
Configuration Task List for AAA Authentication........................................................................ 801
AAA Authorization.............................................................................................................................803
Privilege Levels Overview........................................................................................................... 803
Configuration Task List for Privilege Levels...............................................................................804
RADIUS..............................................................................................................................................808
RADIUS Authentication...............................................................................................................809
Configuration Task List for RADIUS............................................................................................810
TACACS+...........................................................................................................................................813
Configuration Task List for TACACS+........................................................................................ 813
TACACS+ Remote Authentication............................................................................................. 814
Command Authorization............................................................................................................ 816
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... 816
Enabling SCP and SSH...................................................................................................................... 816
Using SCP with SSH to Copy a Software Image.........................................................................817
Removing the RSA Host Keys and Zeroizing Storage ...............................................................818
Configuring When to Re-generate an SSH Key ........................................................................818
Configuring the SSH Server Key Exchange Algorithm...............................................................819
Configuring the HMAC Algorithm for the SSH Server............................................................... 819
Configuring the SSH Server Cipher List..................................................................................... 820
Secure Shell Authentication....................................................................................................... 820
Troubleshooting SSH..................................................................................................................823
Telnet................................................................................................................................................ 824
VTY Line and Access-Class Configuration...................................................................................... 824
VTY Line Local Authentication and Authorization.....................................................................824
VTY Line Remote Authentication and Authorization.................................................................825
VTY MAC-SA Filter Support........................................................................................................ 826
Role-Based Access Control............................................................................................................. 826
Overview of RBAC.......................................................................................................................826
User Roles................................................................................................................................... 829
AAA Authentication and Authorization for Roles.......................................................................833
Role Accounting......................................................................................................................... 836
Display Information About User Roles....................................................................................... 837
48 Service Provider Bridging................................................................................839
VLAN Stacking...................................................................................................................................839
Important Points to Remember.................................................................................................840
Configure VLAN Stacking............................................................................................................841
Creating Access and Trunk Ports............................................................................................... 841
Enable VLAN-Stacking for a VLAN............................................................................................. 842
Configuring the Protocol Type Value for the Outer VLAN Tag................................................ 842
Configuring Dell Networking OS Options for Trunk Ports....................................................... 842
Debugging VLAN Stacking..........................................................................................................843
VLAN Stacking in Multi-Vendor Networks.................................................................................844
VLAN Stacking Packet Drop Precedence........................................................................................ 848
Enabling Drop Eligibility..............................................................................................................848
Honoring the Incoming DEI Value.............................................................................................849
Marking Egress Packets with a DEI Value.................................................................................. 849
Dynamic Mode CoS for VLAN Stacking...........................................................................................850
Mapping C-Tag to S-Tag dot1p Values......................................................................................852
Layer 2 Protocol Tunneling..............................................................................................................852
Implementation Information......................................................................................................854
Enabling Layer 2 Protocol Tunneling.........................................................................................855
Specifying a Destination MAC Address for BPDUs.................................................................... 855
Setting Rate-Limit BPDUs...........................................................................................................855
Debugging Layer 2 Protocol Tunneling.....................................................................................856
Provider Backbone Bridging.............................................................................................................856
49 sFlow..................................................................................................................... 857
Overview............................................................................................................................................857
Implementation Information............................................................................................................ 857
Important Points to Remember................................................................................................. 858
Enabling Extended sFlow................................................................................................................. 858
Enabling and Disabling sFlow on an Interface................................................................................ 859
sFlow Show Commands...................................................................................................................859
Displaying Show sFlow Global................................................................................................... 859
Displaying Show sFlow on an Interface.....................................................................................860
Displaying Show sFlow on a Stack-unit.....................................................................................860
Configuring Specify Collectors........................................................................................................ 861
Changing the Polling Intervals..........................................................................................................861
Back-Off Mechanism........................................................................................................................861
sFlow on LAG ports.......................................................................................................................... 862
Enabling Extended sFlow................................................................................................................. 862
Important Points to Remember................................................................................................. 863
50 Simple Network Management Protocol (SNMP)....................................... 865
Protocol Overview............................................................................................................................865
Implementation Information............................................................................................................865
SNMPv3 Compliance With FIPS....................................................................................................... 865
Configuration Task List for SNMP.................................................................................................... 867
Related Configuration Tasks.......................................................................................................867
Important Points to Remember....................................................................................................... 867
Set up SNMP......................................................................................................................................867
Creating a Community...............................................................................................................868
Setting Up User-Based Security (SNMPv3)................................................................................ 868
Reading Managed Object Values.....................................................................................................869
Writing Managed Object Values.......................................................................................................870
Configuring Contact and Location Information using SNMP......................................................... 871
Subscribing to Managed Object Value Updates using SNMP......................................................... 872
Enabling a Subset of SNMP Traps.................................................................................................... 873
Copy Configuration Files Using SNMP.............................................................................................875
Copying a Configuration File......................................................................................................877
Copying Configuration Files via SNMP.......................................................................................877
Copying the Startup-Config Files to the Running-Config........................................................878
Copying the Startup-Config Files to the Server via FTP............................................................879
Copying the Startup-Config Files to the Server via TFTP..........................................................879
Copy a Binary File to the Startup-Configuration.......................................................................879
Additional MIB Objects to View Copy Statistics........................................................................ 880
Obtaining a Value for MIB Objects.............................................................................................881
Manage VLANs using SNMP............................................................................................................. 881
Creating a VLAN.......................................................................................................................... 881
Assigning a VLAN Alias................................................................................................................882
Displaying the Ports in a VLAN...................................................................................................882
Add Tagged and Untagged Ports to a VLAN..............................................................................883
Managing Overload on Startup........................................................................................................884
Enabling and Disabling a Port using SNMP..................................................................................... 885
Fetch Dynamic MAC Entries using SNMP........................................................................................886
Deriving Interface Indices.................................................................................................................887
Monitor Port-Channels.................................................................................................................... 888
Troubleshooting SNMP Operation.................................................................................................. 889
51 Stacking.................................................................................................................891
S-Series Stacking Overview.............................................................................................................. 891
Stack Management Roles............................................................................................................891
Stack Master Election................................................................................................................. 892
Virtual IP...................................................................................................................................... 893
Failover Roles.............................................................................................................................. 893
MAC Addressing on S-Series Stacks.......................................................................................... 893
Stacking LAG............................................................................................................................... 895
Supported Stacking Topologies................................................................................................. 895
High Availability on S-Series Stacks........................................................................................... 896
Management Access on S-Series Stacks................................................................................... 897
Important Points to Remember—S4810 Stacking...........................................................................897
S-Series Stacking Installation Tasks.................................................................................................898
Create an S-Series Stack............................................................................................................ 898
Add Units to an Existing S-Series Stack..................................................................................... 903
Split an S-Series Stack................................................................................................................ 906
S-Series Stacking Configuration Tasks............................................................................................906
Assigning Unit Numbers to Units in an S-Series Stack..............................................................906
Creating a Virtual Stack Unit on an S-Series Stack....................................................................907
Displaying Information about an S-Series Stack....................................................................... 907
Influencing Management Unit Selection on an S-Series Stack................................................ 909
Managing Redundancy on an S-Series Stack............................................................................909
Resetting a Unit on an S-Series Stack........................................................................................ 910
Verify a Stack Configuration.............................................................................................................910
Displaying the Status of Stacking Ports......................................................................................910
Remove Units or Front End Ports from a Stack............................................................................... 912
Removing a Unit from an S-Series Stack....................................................................................912
Removing Front End Port Stacking.............................................................................................913
Troubleshoot an S-Series Stack........................................................................................................913
Recover from Stack Link Flaps....................................................................................................914
Recover from a Card Problem State on an S-Series Stack........................................................914
52 Storm Control..................................................................................................... 916
Configure Storm Control..................................................................................................................916
Configuring Storm Control from INTERFACE Mode................................................................. 916
Configuring Storm Control from CONFIGURATION Mode...................................................... 916
53 Spanning Tree Protocol (STP)......................................................................... 917
Protocol Overview.............................................................................................................................917
Configure Spanning Tree..................................................................................................................917
Related Configuration Tasks....................................................................................................... 917
Important Points to Remember........................................................................................................918
Configuring Interfaces for Layer 2 Mode.........................................................................................918
Enabling Spanning Tree Protocol Globally...................................................................................... 919
Adding an Interface to the Spanning Tree Group............................................................................921
Modifying Global Parameters...........................................................................................................922
Modifying Interface STP Parameters................................................................................................923
Enabling PortFast.............................................................................................................................. 923
Prevent Network Disruptions with BPDU Guard....................................................................... 924
Selecting STP Root........................................................................................................................... 926
STP Root Guard.................................................................................................................................927
Root Guard Scenario...................................................................................................................927
Configuring Root Guard.............................................................................................................928
Enabling SNMP Traps for Root Elections and Topology Changes.................................................929
Configuring Spanning Trees as Hitless............................................................................................ 929
STP Loop Guard................................................................................................................................930
Configuring Loop Guard.............................................................................................................931
Displaying STP Guard Configuration............................................................................................... 932
54 System Time and Date...................................................................................... 933
Network Time Protocol....................................................................................................................933
Protocol Overview......................................................................................................................934
Configure the Network Time Protocol...................................................................................... 935
Enabling NTP...............................................................................................................................935
Setting the Hardware Clock with the Time Derived from NTP.................................................935
Configuring NTP Broadcasts......................................................................................................936
Disabling NTP on an Interface....................................................................................................936
Configuring a Source IP Address for NTP Packets....................................................................936
Configuring NTP Authentication................................................................................................ 937
Dell Networking OS Time and Date................................................................................................ 940
Configuration Task List ..............................................................................................................940
Setting the Time and Date for the Switch Hardware Clock......................................................940
Setting the Time and Date for the Switch Software Clock.......................................................940
Setting the Timezone..................................................................................................................941
Set Daylight Saving Time.............................................................................................................941
Setting Daylight Saving Time Once............................................................................................941
Setting Recurring Daylight Saving Time.....................................................................................942
55 Tunneling ............................................................................................................944
Configuring a Tunnel........................................................................................................................944
Configuring Tunnel Keepalive Settings............................................................................................945
Configuring a Tunnel Interface........................................................................................................946
Configuring Tunnel allow-remote Decapsulation..........................................................................946
Configuring the tunnel source anylocal.......................................................................................... 947
56 Uplink Failure Detection (UFD)...................................................................... 948
Feature Description.......................................................................................................................... 948
How Uplink Failure Detection Works...............................................................................................949
UFD and NIC Teaming......................................................................................................................950
Loading...
+ 1071 hidden pages