Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell™, the DELL logo, Dell Precision™, OptiPlex™, Latitude™, PowerEdge™, PowerVault™,
PowerConnect™, OpenManage™, EqualLogic™, KACE™, FlexAddress™ and Vostro™ are trademarks of Dell Inc. Intel
Core™ and Celeron
Opteron™, AMD Phenom™, and AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft
®
Server
, MS-DOS® and Windows Vista® are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or
other countries. Red Hat Enterprise Linux
countries. Novell
registered trademark of Oracle Corporation and/or its affiliates. Citrix
or trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware
®
are registered trademarks of Intel Corporation in the U.S. and other countries. AMD® is a registered trademark and AMD
®
®
is a registered trademark and SUSE ™ is a trademark of Novell Inc. in the United States and other countries. Oracle® is a
and Enterprise Linux® are registered trademarks of Red Hat, Inc. in the United States and/or other
®
, Xen®, XenServer® and XenMotion® are either registered trademarks
®
, Virtual SMP®, vMotion®, vCenter®, and vSphere®
®
, Pentium®, Xeon®,
®
, Windows®, Windows
are registered trademarks or trademarks of VMWare, Inc. in the United States or other countries.
Other trademarks and trade names may be used in this publication to refer to either the entities claiming the marks and names or their products.
Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
This guide describes the protocols and features supported by the Force10 Operating System (FTOS) and
provides configuration instructions and examples for implementing them. It supports the system platforms
E-Series, C-Series, and S-Series.
Though this guide contains information on protocols, it is not intended to be a complete reference. This
guide is a reference for configuring protocols on Dell Force10 systems. For complete information on
protocols, refer to other documentation including IETF Requests for Comment (RFCs). The instructions in
this guide cite relevant RFCs, and Chapter 56, Standards Compliance contains a complete list of the
supported RFCs and Management Information Base files (MIBs).
1
Audience
This document is intended for system administrators who are responsible for configuring and maintaining
networks and assumes you are knowledgeable in Layer 2 and Layer 3 networking technologies.
Conventions
This document uses the following conventions to describe command syntax:
ConventionDescription
keyword
parameter
{X}Keywords and parameters within braces must be entered in the CLI.
[X]Keywords and parameters within brackets are optional.
x | y Keywords and parameters separated by bar require you to choose one.
Keywords are in bold and should be entered in the CLI as listed.
Parameters are in italics and require a number or word to be entered in the CLI.
About this Guide | 29
Information Symbols
Table 1-1 describes symbols contained in this guide.
Table 1-1. Information Symbols
SymbolWarningDescription
NoteThis symbol informs you of important operational information.
ces
www.dell.com | support.dell.com
et e
S
4820
x
T
Platform Specific
Feature
E-Series Specific
Feature/Command
S4810
S4820T
Related Documents
For more information about the system refer to the following documents:
•FTOS Command Reference
•Installing and Maintaining the S4810 System
•Installing and Maintaining the S4820T System
•FTOS Release Notes
This symbol informs you of a feature that supported on one or two
platforms only: e is for E-Series, c is for C-Series, s is for S-Series.
If a feature or command applies to only one of the E-Series platforms, a
separate symbol calls this to attention:
the ExaScale.
This symbol indicates that the selected feature is supported on the S4810
but not on other S-Series systems.
This symbol indicates that the selected feature is supported on the S4820T
but not on other S-Series systems.
et for the TeraScale or e x for
30|About this Guide
About this Guide | 31
www.dell.com | support.dell.com
32|About this Guide
Configuration Fundamentals
The FTOS Command Line Interface (CLI) is a text-based interface through which you can configure
interfaces and protocols. The CLI is largely the same for the E-Series, C-Series, and S-Series with the
exception of some commands and command outputs. The CLI is structured in modes for security and
management purposes. Different sets of commands are available in each mode, and you can limit user
access to modes using privilege levels.
In FTOS, after a command is enabled, it is entered into the running configuration file. You can view the
current configuration for the whole system or for a particular CLI mode. To save the current configuration
copy the running configuration to another location.
Note: Due to a differences in hardware architecture and the continued system development, features may
occasionally differ between the platforms. These differences are identified by the information symbols
shown on Table 1-1, "Information Symbols," in About this Guide.
2
Accessing the Command Line
Access the command line through a serial console port or a Telnet session as shown in the example below.
When the system successfully boots, you enter the command line in the EXEC mode.
Note: You must have a password configured on a virtual terminal line before you can Telnet into the
system. Therefore, you must use a console connection when connecting to the system for the first time.
telnet 172.31.1.53
Trying 172.31.1.53...
Connected to 172.31.1.53.
Escape character is '^]'.
Login: username
Password:
FTOS>
Configuration Fundamentals | 33
CLI Modes
Different sets of commands are available in each mode. A command found in one mode cannot be
executed from another mode (with the exception of EXEC mode commands preceded by the command
see The do Command in the Configuration Fundamentals chapter). You can set user access rights to
commands and command modes using privilege levels; for more information on privilege levels and
security options, refer to Privilege Levels Overview in the Security chapter.
The FTOS CLI is divided into three major mode levels:
•EXEC mode is the default mode and has a privilege level of 1, which is the most restricted level. Only
a limited selection of commands is available, notably
system information.
www.dell.com | support.dell.com
•EXEC Privilege mode has commands to view configurations, clear counters, manage configuration
files, run diagnostics, and enable or disable debug operations. The privilege level is 15, which is
unrestricted. You can configure a password for this mode; refer to Configure the Enable Password in
the Getting Started chapter.
•CONFIGURATION mode enables you to configure security features, time settings, set logging and
SNMP functions, configure static ARP and MAC addresses, and set line cards on the system.
Beneath CONFIGURATION mode are sub-modes that apply to interfaces, protocols, and features. The
example below illustrates this sub-mode command structure. Two sub-CONFIGURATION modes are
important when configuring the chassis for the first time:
do;
show commands, which allow you to view
•INTERFACE sub-mode is the mode in which you configure Layer 2 and Layer 3 protocols and IP
services specific to an interface. An interface can be physical (Management interface, 1-Gigabit
Ethernet, or 10-Gigabit Ethernet, or SONET) or logical (Loopback, Null, port channel, or VLAN).
•LINE sub-mode is the mode in which you to configure the console and virtual terminal lines.
Note: At any time, entering a question mark (?) will display the available command options. For example,
when you are in CONFIGURATION mode, entering the question mark first will list all available commands,
including the possible sub-modes.
EXEC
EXEC Privilege
CONFIGURATION
ARCHIVE
AS-PATH ACL
INTERFACE
GIGABIT ETHERNET
10 GIGABIT ETHERNET
INTERFACE RANGE
LOOP BACK
MANAGEMENT ETHERNET
NULL
PORT-CHANNEL
SONET
VLAN
VRRP
34|Configuration Fundamentals
IP
IPv6
IP COMMUNITY-LIST
IP ACCESS-LIST
STANDARD ACCESS-LIST
EXTENDED ACCESS-LIST
LINE
AUXILLIARY
CONSOLE
VIRTUAL TERMINAL
MAC ACCESS-LIST
MONITOR SESSION
MULTIPLE SPANNING TREE
Per-VLAN SPANNING TREE
PREFIX-LIST
RAPID SPANNING TREE
REDIRECT
ROUTE-MAP
ROUTER BGP
ROUTER ISIS
ROUTER OSPF
ROUTER RIP
SPANNING TREE
TRACE-LIST
Note: In the example above, SONET is not supported on the S4810 or S4820T.
Navigating CLI Modes
The FTOS prompt changes to indicate the CLI mode. Table 2-1, "FTOS Command Modes," in
Configuration Fundamentals lists the CLI mode, its prompt, and information on how to access and exit this
CLI mode. You must move linearly through the command modes, with the exception of the
which takes you directly to EXEC Privilege mode; the
level.
Note: Sub-CONFIGURATION modes all have the letters “conf” in the prompt with additional modifiers to
identify the mode and slot/port information. These are shown in Table 2-1, "FTOS Command Modes," in
Configuration Fundamentals.
Table 2-1. FTOS Command Modes
CLI Command Mode Prompt
EXEC
FTOS>
end command
exit command moves you up one command mode
Access Command
Access the router through the console or Telnet.
Configuration Fundamentals | 35
Table 2-1. FTOS Command Modes (continued)
CLI Command Mode Prompt
EXEC Privilege
CONFIGURATION
Note: Access all of the following modes from CONFIGURATION mode.
www.dell.com | support.dell.com
Note: SONET is not supported on the S4810 or S4820T.
ARCHIVE
AS-PATH ACL
Gigabit Ethernet
Interface
10 Gigabit Ethernet
Interface
Interface Range
Loopback Interface
Management Ethernet
Interface
Access Command
FTOS#•From EXEC mode, enter the command enable.
•From any other mode, use the command end.
FTOS(conf)#•From EXEC privilege mode, enter the command
configure.
•From every mode except EXEC and EXEC
FTOS(conf-archive)
FTOS(config-as-path)#
Privilege, enter the command
archive
ip as-path access-list
exit.
FTOS(conf-if-gi-0/0)#
FTOS(conf-if-te-0/0)#
FTOS(conf-if-range)#
FTOS(conf-if-lo-0)#
FTOS(conf-if-ma-0/0)#
interface
Null Interface
Port-channel Interface
SONET Interface
VLAN Interface
INTERFACE modes
STANDARD ACCESSLIST
EXTENDED ACCESSLIST
IP ACCESS-LIST
IP COMMUNITY-LIST
AUXILIARY
CONSOLE
VIRTUAL TERMINAL
LINE
FTOS(conf-if-nu-0)#
FTOS(conf-if-po-0)#
FTOS(conf-if-so-0/0)#
FTOS(conf-if-vl-0)#
FTOS(config-std-nacl)#
FTOS(config-ext-nacl)#
FTOS(config-community-list)#
FTOS(config-line-aux)#
FTOS(config-line-console)#
FTOS(config-line-vty)#
ip access-list standard
ip access-list extended
ip community-list
line
36|Configuration Fundamentals
Table 2-1. FTOS Command Modes (continued)
CLI Command Mode Prompt
STANDARD ACCESSLIST
EXTENDED ACCESSLIST
FTOS(config-std-macl)#
FTOS(config-ext-macl)#
MAC ACCESS-LIST
MULTIPLE
SPANNING TREE
Per-VLAN SPANNING
TREE Plus
PREFIX-LIST
RAPID SPANNING
TREE
REDIRECT
ROUTE-MAP
ROUTER BGP
FTOS(config-mstp)#
FTOS(config-pvst)#
FTOS(conf-nprefixl)#
FTOS(config-rstp)#
FTOS(conf-redirect-list)#
FTOS(config-route-map)#
FTOS(conf-router_bgp)#
Access Command
mac access-list standard
mac access-list extended
protocol spanning-tree mstp
protocol spanning-tree pvst
ip prefix-list
protocol spanning-tree rstp
ip redirect-list
route-map
router bgp
ROUTER ISIS
ROUTER OSPF
ROUTER RIP
SPANNING TREE
TRACE-LIST
The following example illustrates how to change the command mode from CONFIGURATION mode to
PROTOCOL SPANNING TREE.
FTOS(conf)#protocol spanning-tree 0
FTOS(config-span)#
The do Command
Enter an EXEC mode command from any CONFIGURATION mode (CONFIGURATION, INTERFACE,
SPANNING TREE, etc.) without returning to EXEC mode by preceding the EXEC mode command with
the command
do. The following example illustrates the do command.
FTOS(conf-router_isis)#
FTOS(conf-router_ospf)#
FTOS(conf-router_rip)#
FTOS(config-span)#
FTOS(conf-trace-acl)#
router isis
router ospf
router rip
protocol spanning-tree 0
ip trace-list
Note: The following commands cannot be modified by the do command: enable, disable, exit, and configure.
When you enter a command, the command line is added to the running configuration file. Disable a
command and remove it from the running-config by entering the original command preceded by the
command
ip-address
Note: Use the help or ? command as discussed in Obtaining Help in the Configuration Fundamentals
chapter command to help you construct the “no” form of a command.
FTOS(conf)#interface gigabitethernet 4/17
FTOS(conf-if-gi-4/17)#ip address 192.168.10.1/24
FTOS(conf-if-gi-4/17)#show config
!
interface GigabitEthernet 4/17
ip address 192.168.10.1/24
no shutdown
FTOS(conf-if-gi-4/17)#no ip address
FTOS(conf-if-gi-4/17)#show config
!
interface GigabitEthernet 4/17
no ip address
no shutdown
no. For example, to delete an ip address configured on an interface, use the no ip address
command, as shown in the following example.
Layer 2 protocols are disabled by default. Enable them using the no disable command. For example, in
PROTOCOL SPANNING TREE mode, enter
Obtaining Help
Obtain a list of keywords and a brief functional description of those keywords at any CLI mode using the ?
help command:
or
•Enter
? at the prompt or after a keyword to list the keywords available in the current mode.
•
? after a prompt lists all of the available keywords. The output of this command is the same for the
help command.
FTOS#?
calendar Manage the hardware calendar
cd Change current directory
no disable to enable Spanning Tree.
Configuration Fundamentals | 39
change Change subcommands
clear Reset functions
clock Manage the system clock
configure Configuring from terminal
copy Copy from one file to another
debug Debug functions
--More--
•? after a partial keyword lists all of the keywords that begin with the specified letters.
FTOS(conf)#cl?
class-map
www.dell.com | support.dell.com
clock
FTOS(conf)#cl
•A keyword followed by [space]? lists all of the keywords that can follow the specified keyword.
FTOS(conf)#clock ?
summer-time Configure summer (daylight savings) time
timezone Configure time zone
FTOS(conf)#clock
Entering and Editing Commands
When entering commands:
•The CLI is not case sensitive.
•You can enter partial CLI keywords.
•You must enter the minimum number of letters to uniquely identify a command. For example,
cannot be entered as a partial keyword because both the clock and class-map commands begin with
the letters “cl.”
begins with those three letters.
•The TAB key auto-completes keywords in commands. You must enter the minimum number of letters
to uniquely identify a command.
•The UP and DOWN arrow keys display previously entered commands (see Command History in the
Configuration Fundamentals chapter).
•The BACKSPACE and DELETE keys erase the previous letter.
•Key combinations are available to move quickly across the command line, as described in Table 2-2,
"Short-Cut Keys and their Actions," in Configuration Fundamentals.
Table 2-2. Short-Cut Keys and their Actions
Key CombinationAction
CNTL-AMoves the cursor to the beginning of the command line.
CNTL-BMoves the cursor back one character.
clo, however, can be entered as a partial keyword because only one command
cl
40|Configuration Fundamentals
Table 2-2. Short-Cut Keys and their Actions (continued)
Key CombinationAction
CNTL-DDeletes character at cursor.
CNTL-EMoves the cursor to the end of the line.
CNTL-FMoves the cursor forward one character.
CNTL-ICompletes a keyword.
CNTL-KDeletes all characters from the cursor to the end of the command line.
CNTL-LRe-enters the previous command.
CNTL-NReturn to more recent commands in the history buffer after recalling commands with CTRL-P or the
UP arrow key.
CNTL-PRecalls commands, beginning with the last command
CNTL-RRe-enters the previous command.
CNTL-UDeletes the line.
CNTL-WDeletes the previous word.
CNTL-XDeletes the line.
CNTL-ZEnds continuous scrolling of command outputs.
Esc BMoves the cursor back one word.
Esc FMoves the cursor forward one word.
Esc DDeletes all characters from the cursor to the end of the word.
Command History
FTOS maintains a history of previously-entered commands for each mode. For example:
•When you are in EXEC mode, the UP and DOWN arrow keys display the previously-entered EXEC
mode commands.
•When you are in CONFIGURATION mode, the UP or DOWN arrows keys recall the
previously-entered CONFIGURATION mode commands.
Filtering show Command Outputs
Filter the output of a show command to display specific information by adding | [except | find | grep | no-more
| save
] specified_text after the command. The variable specified_text is the text for which you are filtering and
it IS case sensitive unless the
Starting with FTOS 7.8.1.0, the
case-insensitive. For example, the commands:
•
show run | grep Ethernet returns a search result with instances containing a capitalized “Ethernet,” such
as interface GigabitEthernet 0/0.
ignore-casesub-option is implemented.
grep command accepts an ignore-casesub-option that forces the search to
Configuration Fundamentals | 41
•show run | grep ethernet would not return that search result because it only searches for instances
containing a non-capitalized “ethernet.”
Executing the command
“Ethernet” and “ethernet.”
grep displays only the lines containing specified text. The following example shows this command
•
used in combination with the command
FTOS(conf)#do show linecard all | grep 0
0 not present
Note: FTOS accepts a space or no space before and after the pipe. To filter on a phrase with spaces,
www.dell.com | support.dell.com
underscores, or ranges, enclose the phrase with double quotation marks.
•except displays text that does not match the specified text. The following example shows this
command used in combination with the command
•find displays the output of the show command beginning from the first occurrence of specified text.
The following example shows this command used in combination with the command
no-more displays the output all at once rather than one screen at a time. This is similar to the command
terminal length except that the no-more option affects the output of the specified command only.
save copies the output to a file for future reference.
•
Note: You can filter a single command output multiple times. The save option should be the last option
entered. For example:
other-regular-expression | findregular-expression | save
www.dell.com | support.dell.com
Multiple Users in Configuration mode
FTOS notifies all users in the event that there are multiple users logged into CONFIGURATION mode. A
warning message indicates the username, type of connection (console or vty), and in the case of a vty
connection, the IP address of the terminal on which the connection was established. For example:
•On the system that telnets into the switch, Message 1 appears:
Message 1 Multiple Users in Configuration mode Telnet Message
% Warning: The following users are currently configuring the system:
User "<username>" on line console0
•On the system that is connected over the console, Message 2 appears:
Message 2 Multiple Users in Configuration mode Telnet Message
% Warning: User "<username>" on line vty0 "10.11.130.2" is in configuration mode
If either of these messages appears, Dell Force10 recommends that you coordinate with the users listed in
the message so that you do not unintentionally overwrite each other’s configuration changes.
44|Configuration Fundamentals
Getting Started
This chapter contains the following major sections:
•Default Configuration
•Configure a Host Name
•Access the System Remotely
•Configure the Enable Password
•Configuration File Management
•File System Management
When you power up the chassis, the system performs a Power-On Self Test (POST) during which Route
Processor Module (RPM), Switch Fabric Module (SFM), and line card status LEDs blink green.The
system then loads FTOS and boot messages scroll up the terminal window during this process. No user
interaction is required if the boot process proceeds without interruption.
3
When the boot process is complete, the RPM and line card status LEDs remain online (green), and the
console monitor displays the EXEC mode prompt.
For details on using the Command Line Interface (CLI), refer to Accessing the Command Line in the
Configuration Fundamentals chapter.
Console access
The S4810 has 2 management ports available for system access: a serial console port and an
Out-of-Bounds (OOB) port.
Serial console
The RJ-45/RS-232 console port is labeled on the S4810 chassis. It is in the upper right-hand side, as you
face the I/O side of the chassis.
RJ-45
Console Port
Getting Started | 45
The RJ-45/RS-232 console port is labeled on the S4820T chassis. It is to the left of Fan Module 0, as you
face the PSU side of the chassis.
RJ-45
Console Port
To access the console port, follow the procedures below. Refer to Table 3-1, "Pin Assignments Between
the Console and a DTE Terminal Server," in Getting Started for the console port pinout.
www.dell.com | support.dell.com
StepTask
1Install an RJ-45 copper cable into the console port.Use a rollover (crossover) cable to connect the S4810 or
S4820T console port to a terminal server.
2Connect the other end of the cable to the DTE terminal server.
3Terminal settings on the console port cannot be changed in the software and are set as follows:
9600 baud rate
No parity
8 data bits
1 stop bit
No flow control
Accessing the RJ-45 console port with a DB-9 adapter
You can connect to the console using a RJ-45 to RJ-45 rollover cable and a RJ-45 to DB-9 female DTE
adapter to a terminal server (for example, PC). Table 3-1, "Pin Assignments Between the Console and a
DTE Terminal Server," in Getting Started lists the pin assignments.
Table 3-1. Pin Assignments Between the Console and a DTE Terminal Server
S-Series
Console Port RJ-45 to RJ-45 Rollover Cable
SignalRJ-45 pinoutRJ-45 PinoutDB-9 PinSignal
RTS188CTS
NC276DSR
TxD362RxD
GND455GND
GND545GND
RxD633TxD
RJ-45 to DB-9
Adapter
Terminal Server
Device
46|Getting Started
Table 3-1. Pin Assignments Between the Console and a DTE Terminal Server (continued)
S-Series
Console Port RJ-45 to RJ-45 Rollover Cable
SignalRJ-45 pinoutRJ-45 PinoutDB-9 PinSignal
NC724DTR
CTS817RTS
Default Configuration
A version of FTOS is pre-loaded onto the chassis, however the system is not configured when you power
up for the first time (except for the default hostname, which is FTOS). You must configure the system
using the CLI.
Configure a Host Name
The host name appears in the prompt. The default host name is FTOS.
RJ-45 to DB-9
Adapter
Terminal Server
Device
•Host names must start with a letter and end with a letter or digit.
•Characters within the string can be letters, digits, and hyphens.
To configure a host name:
StepTaskCommand SyntaxCommand Mode
1Create a new host name.
The example below illustrates the
FTOS(conf)#hostname R1
R1(conf)#
hostname name
hostname command.
CONFIGURATION
Access the System Remotely
You can configure the system to access it remotely by Telnet. The method for configuring the C-Series and
E-Series for Telnet access is different from S-Series.
•The C-Series, E-Series, S4810 and the S4820T have a dedicated management port and a management
routing table that is separate from the IP routing table.
Getting Started | 47
•The S-Series (except the S4810 and S4820T) does not have a dedicated management port, but is
managed from any port. It does not have a separate management routing table.
Access the C-Series, E-Series, S4810, and the S4820T
Remotely
Configuring the system for Telnet is a three-step process:
1. Configure an IP address for the management port. See Configure the Management Port IP Address.
2. Configure a management route with a default gateway. See Configure a Management Route.
www.dell.com | support.dell.com
Configure the Management Port IP Address
Assign IP addresses to the management ports in order to access the system remotely.
Note: Assign different IP addresses to each RPM’s management port.
To configure the management port IP address:
StepTaskCommand SyntaxCommand Mode
1Enter INTERFACE mode for the
Management port.
3. Configure a username and password. See Configure a Username and Password.
2
Assign an IP address to the
interface.
interface ManagementEthernet slot/port
•slot range: 0 to 1
•port range: 0
ip address ip-address/mask
•ip-address: an address in dotted-decimal format
(A.B.C.D).
•mask: a subnet mask in /prefix-length format (/
xx).
CONFIGURATION
INTERFACE
3
Enable the interface.
Configure a Management Route
Define a path from the system to the network from which you are accessing the system remotely.
Management routes are separate from IP routes and are only used to manage the system through the
management port.
48|Getting Started
no shutdown
INTERFACE
To configure a management route:
StepTaskCommand SyntaxCommand Mode
Configure a management route to
1
the network from which you are
accessing the system.
management route ip-address/mask gateway
•ip-address: the network address in
dotted-decimal format (A.B.C.D).
•mask: a subnet mask in /prefix-length format (/
xx).
gateway: the next hop for network traffic
•
originating from the management port.
CONFIGURATION
Configure a Username and Password
Configure a system username and password to access the system remotely.
•7 is for inputting a password that is already
encrypted using a Type 7 hash. Obtaining the
encrypted password from the configuration of
another Dell Force10 system.
specifies how you are inputting the
CONFIGURATION
Access the S-Series Remotely
The S-Series does not have a dedicated management port nor a separate management routing table.
Configure any port on the S-Series to be the port through which you manage the system and configure an
IP route to that gateway.
Note: The S4810 and S4820T systems use management ports and should be configured similar to the
C-Series and E-Series systems. Refer to Access the C-Series, E-Series, S4810, and the S4820T
Remotely
Configuring the system for Telnet access is a three-step process:
1. Configure an IP address for the port through which you will manage the system using the command
address
2. Configure a IP route with a default gateway using the command
mode, as shown in the example below.
from INTERFACE mode, as shown in the example below.
ip route from CONFIGURATION
Getting Started | 49
ip
3. Configure a username and password using the command username from CONFIGURATION mode, as
shown in the example below.
is the privilege level, is 15 by default, and is not required.
level
encryption-type specifies how you are inputting the password, is 0 by
default, and is not required.
•0 is for inputting the password in clear text.
•7 is for inputting a password that is already encrypted using a
DES hash. Obtain the encrypted password from the configuration
file of another Dell Force10 system.
•5 is for inputting a password that is already encrypted using an
MD5 hash. Obtain the encrypted password from the configuration
file of another Dell Force10 system.
CONFIGURATION
50|Getting Started
Configuration File Management
Files can be stored on and accessed from various storage media. Rename, delete, and copy files on the
system from the EXEC Privilege mode.
The E-Series EtherScale platform architecture uses MMC cards for both the internal and external Flash
memory. MMC cards support a maximum of 100 files. The E-Series TeraScale and ExaScale platforms
architecture use Compact Flash for the internal and external Flash memory. It has a space limitation but
does not limit the number of files it can contain.
Note: Using flash memory cards in the system that have not been approved by Dell Force10 can cause
unexpected system behavior, including a reboot.
Copy Files to and from the System
The command syntax for copying files is similar to UNIX. The copy command uses the format copy
source-file-url destination-file-url.
Note: See the FTOS Command Reference for a detailed description of the copy command.
•To copy a local file to a remote system, combine the file-origin syntax for a local file location with the
file-destination syntax for a remote file location shown in Table 3-2, "Forming a copy Command," in
Getting Started.
•To copy a remote file to Dell Force10 system, combine the
with the
file-destination syntax for a local file location shown in Table 3-2, "Forming a copy Command,"
Destination file name [FTOS-EF-8.2.1.0.bin.bin]:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
26292881 bytes successfully copied
Save the Running-configuration
The running-configuration contains the current system configuration. Dell Force10 recommends that you
copy your running-configuration to the startup-configuration. The system uses the startup-configuration
during boot-up to configure the system. The startup-configuration is stored in the internal flash on the
primary RPM by default, but it can be saved onto an external flash (on an RPM) or a remote server.
52|Getting Started
To save the running-configuration:
Note: The commands in this section follow the same format as those in Copy Files to and from the
System in the Getting Started chapter but use the filenames startup-configuration and
running-configuration. These commands assume that current directory is the internal flash, which is the
system default.
TaskCommand SyntaxCommand Mode
Save the running-configuration to:
the startup-configuration on the
internal flash of the primary RPM
the internal flash on an RPMcopy running-configrpm{0|1}flash://filename
Note: The internal flash memories on the RPMs are synchronized whenever there is a
change, but only if the RPMs are running the same version of FTOS.
the external flash of an RPMcopy running-config rpm{0|1}slot0://filename
an FTP server
a TFTP servercopy running-config tftp://{hostip | hostname}/
an SCP servercopy running-config scp://{hostip | hostname}/
Note: When copying to a server, a hostname can only be used if a DNS server is configured.
Save the running-configuration to the
startup-configuration on the internal flash
of the primary RPM. Then copy the new
startup-config file to the external flash of
the primary RPM.
copy running-config startup-config
copy running-config ftp://
username:password
filename
filepath/filename
filepath/filename
copy running-config startup-config duplicate
@{hostip | hostname}/filepath/
EXEC Privilege
EXEC Privilege
FTOS Behavior: If you create a startup-configuration on an RPM and then move the RPM to another chassis, the
startup-configuration is stored as a backup file (with the extension .bak), and a new, empty startup-configuration file
is created. To restore your original startup-configuration in this situation, overwrite the new startup-configuration
with the original one using the command copystartup-config.bakstartup-config.
Configure the Overload bit for Startup Scenario
For information on setting the router overload bit for a specific period of time after a switch reload is
implemented, see the FTOS Command Line Reference Guide, Chapter 18 - Intermediate System to
Intermediate System (IS-IS).
Getting Started | 53
View Files
File information and content can only be viewed on local file systems. To view a list of files on the internal
or external Flash:
StepTaskCommand SyntaxCommand Mode
1View a list of files on:
the external flash of an RPM
www.dell.com | support.dell.com
The output of the command
modification for each file, as shown in the example below.
dir also shows the read/write privileges, size (in bytes), and date of
EXEC Privilegethe internal flash of an RPM
To view the directories on a flash drive residing in the S4820T’s USB (Type-A) port, use the usbflash
parameter, as in the following example:
FTOS#dir usbflash:
Directory of usbflash:
1 drwx 4096 Jan 01 1980 00:00:00 +00:00 .
2 drwx 2048 Dec 01 2010 22:11:27 +00:00 ..
3 -rwx 21814334 Oct 05 2012 21:35:56 +00:00 s55_usb
15 -rwx 30661593 Oct 05 2012 08:01:42 +00:00 file
16 -rwx 524528 Oct 28 2010 23:27:34 +00:00
s4820t_uboot_FTOSBOOT-SE-1-0-0-31_recent
19 -rwx 8053 Dec 01 2010 23:00:22 +00:00 running-config
20 -rwx 28615614 Oct 05 2012 08:08:32 +00:00 s4820t-FTOS5-SE-1-0-0-26
21 -rwx 1000000000 Oct 05 2012 10:07:32 +00:00 s4820junk
54|Getting Started
22 -rwx 30659825 Oct 05 2012 10:32:54 +00:00 1
23 -rwx 28615614 Oct 05 2012 08:58:26 +00:00 fiel1
24 -rwx 30659825 Oct 05 2012 10:32:30 +00:00 file2
25 -rwx 1000000000 Oct 05 2012 10:14:30 +00:00 s4820junk1
26 -rwx 1000000000 Oct 05 2012 10:18:26 +00:00 s4820junk2
27 -rwx 28615614 Oct 05 2012 10:30:06 +00:00 s4820t-FTOS5-SE-1-0-0-26file
30 -rwx 28615614 Oct 05 2012 10:31:36 +00:00 s4820t-FTOS5-SE-1-0-0-26file1
34 -rwx 30659825 Oct 05 2012 10:33:02 +00:00 2
35 -rwx 30659825 Oct 05 2012 10:33:08 +00:00 3
36 -rwx 30659825 Oct 05 2012 10:33:26 +00:00 4
37 -rwx 16644007 Oct 05 2012 11:22:56 +00:00 file19
39 -rwx 130000 Oct 05 2012 11:27:20 +00:00 junkfile1
usbflash: 4040642560 bytes total (151228416 bytes free)
To view the contents of a file:
StepTaskCommand SyntaxCommand Mode
1View the:
contents of a file in the internal flash of
an RPM
contents of a file in the external flash
of an RPM
running-configuration
startup-configuration
show file rpm{0|1}flash://filename
show file rpm{0|1}slot0://filename
show running-config
show startup-config
EXEC Privilege
View Configuration Files
Configuration files have three commented lines at the beginning of the file, as shown in the example
below, to help you track the last time any user made a change to the file, which user made the changes, and
when the file was last saved to the startup-configuration.
In the running-configuration file, if there is a difference between the timestamp on the “Last configuration
change,” and “Startup-config last updated,” then you have made changes that have not been saved and will
not be preserved upon a system reboot.
FTOS#show running-config
Current Configuration ...
! Version 8.2.1.0
! Last configuration change at Thu Apr 3 23:06:28 2008 by admin
! Startup-config last updated at Thu Apr 3 23:06:55 2008 by admin
!
boot system rpm0 primary flash://FTOS-EF-8.2.1.0.bin
boot system rpm0 secondary flash://FTOS-EF-7.8.1.0.bin
boot system rpm0 default flash://FTOS-EF-7.7.1.1.bin
boot system rpm1 primary flash://FTOS-EF-7.8.1.0.bin
boot system gateway 10.10.10.100
Getting Started | 55
--More--
An example of accessing the running configuration file on an external flash drive inserted into the
The Dell Force10 system can use the internal Flash, external Flash, or remote devices to store files. It
stores files on the internal Flash by default but can be configured to store files elsewhere.
To view file system information:
TaskCommand SyntaxCommand Mode
View information about each file system.
The output of the command
show file-systems in the example below shows the total capacity, amount of free
show file-systems
EXEC Privilege
memory, file structure, media type, read/write privileges for each storage device in use.
You can change the default file system so that file management commands apply to a particular device or
memory.
To change the default storage location:
TaskCommand SyntaxCommand Mode
Change the default directory.
cd directory
EXEC Privilege
In the example below, the default storage location is changed to the external Flash of the primary RPM.
File management commands then apply to the external Flash rather than the internal Flash.
56|Getting Started
FTOS#cd slot0:
FTOS#copy running-config test
FTOS#copy run test
!
7419 bytes successfully copied
FTOS#dir
Directory of slot0:
1 drw- 32768 Jan 01 1980 00:00:00 .
2 drwx 512 Jul 23 2007 00:38:44 ..
3 ---- 0 Jan 01 1970 00:00:00 DCIM
4 -rw- 7419 Jul 23 2007 20:44:40 test
5 ---- 0 Jan 01 1970 00:00:00 BT
6 ---- 0 Jan 01 1970 00:00:00 200702~1VSN
7 ---- 0 Jan 01 1970 00:00:00 G
8 ---- 0 Jan 01 1970 00:00:00 F
9 ---- 0 Jan 01 1970 00:00:00 F
slot0: 127772672 bytes total (21927936 bytes free)
View command history
The command-history trace feature captures all commands entered by all users of the system with a time
stamp and writes these messages to a dedicated trace log buffer. The system generates a trace message for
each executed command. No password information is saved to the file.
Note: To upgrade FTOS, see the release notes for the version you want to load on the system.
show command-history command, as shown in the example
Getting Started | 57
www.dell.com | support.dell.com
58|Getting Started
Management
4
Management is supported on platforms: e c s
This chapter explains the different protocols or services used to manage the Dell Force10 system
including:
•Configure Privilege Levels
•Configure Logging
•File Transfer Services
•Terminal Lines
•Lock CONFIGURATION mode
•Recovering from a Forgotten Password on the S4810 or S4820T
•Recovering from a Failed Start on the S4810 or S4820T
Configure Privilege Levels
Privilege levels restrict access to commands based on user or terminal line. There are 16 privilege levels, of
which three are pre-defined. The default privilege level is 1.
•Level 0—Access to the system begins at EXEC mode, and EXEC mode commands are limited to
enable, disable, and exit.
•Level 1—Access to the system begins at EXEC mode, and all commands are available.
•Level 15—Access to the system begins at EXEC Privilege mode, and all commands are available.
S4820T
Create a Custom Privilege Level
Custom privilege levels start with the default EXEC mode command set. You can then customize privilege
levels 2-14 by:
•restricting access to an EXEC mode command
•moving commands from EXEC Privilege to EXEC mode
•restricting access
A user can access all commands at his privilege level and below.
Management | 59
Removing a command from EXEC mode
Remove a command from the list of available commands in EXEC mode for a specific privilege level
using the command
privilege exec from CONFIGURATION mode. In the command, specify a level greater
than the level given to a user or terminal line, followed by the first keyword of each command to be
restricted.
Move a command from EXEC privilege mode to EXEC mode
Move a command from EXEC Privilege to EXEC mode for a privilege level using the command privilege
exec
from CONFIGURATION mode. In the command, specify the privilege level of the user or terminal
line, and specify all keywords in the command to which you want to allow access.
www.dell.com | support.dell.com
Allow Access to CONFIGURATION mode commands
Allow access to CONFIGURATION mode using the command privilege exec level levelconfigure from
CONFIGURATION mode. A user that enters CONFIGURATION mode remains at his privilege level, and
has access to only two commands,
mode command to which you want to allow access using the command
command, specify the privilege level of the user or terminal line, and specify all keywords in the command
to which you want to allow access.
end and exit. You must individually specify each CONFIGURATION
privilege configure level level. In the
Allow Access to INTERFACE, LINE, ROUTE-MAP, and ROUTER mode
1. Similar to allowing access to CONFIGURATION mode, to allow access to INTERFACE, LINE,
ROUTE-MAP, and ROUTER modes, you must first allow access to the command that enters you into
the mode. For example, allow a user to enter INTERFACE mode using the command
level level interface
gigabitethernet
2. Then, individually identify the INTERFACE, LINE, ROUTE-MAP or ROUTER commands to which
you want to allow access using the command
privilege {interface | line | route-map | router} level level. In
the command, specify the privilege level of the user or terminal line, and specify all keywords in the
command to which you want to allow access.
The following table lists the configuration tasks you can use to customize a privilege level:
TaskCommand SyntaxCommand Mode
Remove a command from the list of available commands
in EXEC mode.
Move a command from EXEC Privilege to EXEC mode.privilegeexeclevellevel
Allow access to CONFIGURATION mode.privilegeexeclevellevelconfigure
privilege exec level level
{command ||...|| command}
{command ||...|| command}
privilege configure
CONFIGURATION
CONFIGURATION
CONFIGURATION
60|Management
TaskCommand SyntaxCommand Mode
Allow access to INTERFACE, LINE, ROUTE-MAP,
and/or ROUTER mode. Specify all keywords in the
command.
Allow access to a CONFIGURATION, INTERFACE,
LINE, ROUTE-MAP, and/or ROUTER mode command.
The configuration in the following example creates privilege level 3. This level:
•removes the
•moves the command
resequence command from EXEC mode by requiring a minimum of privilege level 4
capture bgp-pdu max-buffer-size from EXEC Privilege to EXEC mode by requiring
a minimum privilege level 3, which is the configured level for VTY 0
•allows access to CONFIGURATION mode with the
•allows access to INTERFACE and LINE modes are allowed with no commands
FTOS(conf)#do show run priv
!
privilege exec level 3 capture
privilege exec level 3 configure
privilege exec level 4 resequence
privilege exec level 3 capture bgp-pdu
privilege exec level 3 capture bgp-pdu max-buffer-size
privilege configure level 3 line
privilege configure level 3 interface
FTOS(conf)#do telnet 10.11.80.201
[telnet output omitted]
FTOS#show priv
Current privilege level is 3.
FTOS#?
capture Capture packet
configure Configuring from terminal
disable Turn off privileged commands
enable Turn on privileged commands
exit Exit from the EXEC
ip Global IP subcommands
monitor Monitoring feature
mtrace Trace reverse multicast path from destination to source
ping Send echo messages
quit Exit from the EXEC
show Show running system information
[output omitted]
FTOS#config
[output omitted]
FTOS(conf)#do show priv
Current privilege level is 3.
FTOS(conf)#?
end Exit from configuration mode
exit Exit from configuration mode
interface Select an interface to configure
line Configure a terminal line
linecard Set line card type
FTOS(conf)#interface ?
fastethernet Fast Ethernet interface
gigabitethernet Gigabit Ethernet interface
loopback Loopback interface
managementethernet Management Ethernet interface
null Null interface
port-channel Port-channel interface
range Configure interface range
www.dell.com | support.dell.com
tengigabitethernet TenGigabit Ethernet interface
vlan VLAN interface
FTOS(conf)#interface gigabitethernet 1/1
FTOS(conf-if-gi-1/1)#?
end Exit from configuration mode
exit Exit from interface configuration mode
FTOS(conf-if-gi-1/1)#exit
FTOS(conf)#line ?
aux Auxiliary line
console Primary terminal line
vty Virtual terminal
FTOS(conf)#line vty 0
FTOS(config-line-vty)#?
exit Exit from line configuration mode
FTOS(config-line-vty)#
Apply a Privilege Level to a Username
To set a privilege level for a user:
TaskCommand SyntaxCommand Mode
Configure a privilege level for a user.
username username privilege level
CONFIGURATION
Apply a Privilege Level to a Terminal Line
To set a privilege level for a terminal line:
TaskCommand SyntaxCommand Mode
Configure a privilege level for a terminal line.
Note: When you assign a privilege level between 2 and 15, access to the system begins at EXEC mode,
but the prompt is hostname#, rather than hostname>.
privilege level level
LINE
62|Management
Configure Logging
FTOS tracks changes in the system using event and error messages. By default, FTOS logs these messages
on:
•the internal buffer
•console and terminal lines, and
•any configured syslog servers
Disable Logging
To disable logging:
TaskCommand SyntaxCommand Mode
Disable all logging except on the console.
Disable logging to the logging buffer.
Disable logging to terminal lines.
Disable console logging.
Log Messages in the Internal Buffer
All error messages, except those beginning with %BOOTUP (Message), are log in the internal buffer.
The following list includes the configuration tasks for system log management:
no logging on
no logging buffer
no logging monitor
no logging console
CONFIGURATION
CONFIGURATION
CONFIGURATION
CONFIGURATION
•Disable System Logging
•Send System Messages to a Syslog Server
Disable System Logging
By default, logging is enabled and log messages are sent to the logging buffer, all terminal lines, console,
and syslog servers.
Management | 63
Enable and disable system logging using the following commands:
TaskCommand SyntaxCommand Mode
Disable all logging except on the console.
Disable logging to the logging buffer.
Disable logging to terminal lines.
Disable console logging.
www.dell.com | support.dell.com
Send System Messages to a Syslog Server
Send system messages to a syslog server by specifying the server with the following command:
TaskCommand SyntaxCommand Mode
Specify the server to which you want to send system
messages. You can configure up to eight syslog servers.
Configure a Unix System as a Syslog Server
logging {ip-address | hostname}CONFIGURATION
no logging on
no logging buffer
no logging monitor
no logging console
CONFIGURATION
CONFIGURATION
CONFIGURATION
CONFIGURATION
Configure a UNIX system as a syslog server by adding the following lines to /etc/syslog.conf on the Unix
system and assigning write permissions to the file.
•on a 4.1 BSD UNIX system, add the line: local7.debugging /var/log/ftos.log
•on a 5.7 SunOS UNIX system, add the line: local7.debugging /var/adm/ftos.log
In the lines above, local7 is the logging facility level and debugging is the severity level.
Change System Logging Settings
You can change the default settings of the system logging by changing the severity level and the storage
location. The default is to log all messages up to debug level, that is, all system messages. By changing the
severity level in the logging commands, you control the number of system messages logged.
TaskCommand SyntaxCommand Mode
Specify the minimum severity level for logging to the logging buffer.
Specify the minimum severity level for logging to the console.logging consolelevel
Specify the minimum severity level for logging to terminal lines.
logging buffered levelCONFIGURATION
CONFIGURATION
logging monitor level
CONFIGURATION
64|Management
TaskCommand SyntaxCommand Mode
Specifying the minimum severity level for logging to a syslog server.logging traplevel
Specify the minimum severity level for logging to the syslog history
table.
TaskCommand SyntaxCommand Mode
Specify the size of the logging buffer.
Note: When you decrease the buffer size, FTOS deletes
all messages stored in the buffer. Increasing the buffer
size does not affect messages in the buffer.
Specify the number of messages that FTOS saves to its
logging history table.
logging buffered sizeCONFIGURATION
logging history size size
logging history level
CONFIGURATION
CONFIGURATION
CONFIGURATION
To change one of the settings for logging system messages, use any or all of the following commands in
the CONFIGURATION mode:
To view the logging buffer and configuration, use the
show logging command in the EXEC privilege mode
as shown in the example for Display the Logging Buffer and the Logging Configuration.
To change the severity level of messages logged to a syslog server, use the following command in the
CONFIGURATION mode:
To view the logging configuration, use the
show running-config logging command in the EXEC privilege
mode as shown in the example for Configure a UNIX logging facility level.
Display the Logging Buffer and the Logging Configuration
Display the current contents of the logging buffer and the logging settings for the system, use the show
logging
FTOS#show logging
syslog logging: enabled
Console logging: level Debugging
Monitor logging: level Debugging
Buffer logging: level Debugging, 40 Messages Logged, Size (40960 bytes)
Trap logging: level Informational
%IRC-6-IRC_COMMUP: Link to peer RPM is up
%RAM-6-RAM_TASK: RPM1 is transitioning to Primary RPM.
%RPM-2-MSG:CP1 %POLLMGR-2-MMC_STATE: External flash disk missing in 'slot0:'
%CHMGR-5-CARDDETECTED: Line card 0 present
%CHMGR-5-CARDDETECTED: Line card 2 present
%CHMGR-5-CARDDETECTED: Line card 4 present
%CHMGR-5-CARDDETECTED: Line card 5 present
command in the EXEC privilege mode as shown in the example below.
Management | 65
%CHMGR-5-CARDDETECTED: Line card 8 present
%CHMGR-5-CARDDETECTED: Line card 10 present
%CHMGR-5-CARDDETECTED: Line card 12 present
%TSM-6-SFM_DISCOVERY: Found SFM 0
%TSM-6-SFM_DISCOVERY: Found SFM 1
%TSM-6-SFM_DISCOVERY: Found SFM 2
%TSM-6-SFM_DISCOVERY: Found SFM 3
%TSM-6-SFM_DISCOVERY: Found SFM 4
%TSM-6-SFM_DISCOVERY: Found SFM 5
%TSM-6-SFM_DISCOVERY: Found SFM 6
%TSM-6-SFM_DISCOVERY: Found SFM 7
%TSM-6-SFM_SWITCHFAB_STATE: Switch Fabric: UP
%TSM-6-SFM_DISCOVERY: Found SFM 8
www.dell.com | support.dell.com
%TSM-6-SFM_DISCOVERY: Found 9 SFMs
%CHMGR-5-CHECKIN: Checkin from line card 5 (type EX1YB, 1 ports)
%TSM-6-PORT_CONFIG: Port link status for LC 5 => portpipe 0: OK portpipe 1: N/A
%CHMGR-5-LINECARDUP: Line card 5 is up
%CHMGR-5-CHECKIN: Checkin from line card 12 (type S12YC12, 12 ports)
%TSM-6-PORT_CONFIG: Port link status for LC 12 => portpipe 0: OK portpipe 1: N/A
%CHMGR-5-LINECARDUP: Line card 12 is up
%IFMGR-5-CSTATE_UP: changed interface Physical state to up: So 12/8
%IFMGR-5-CSTATE_DN: changed interface Physical state to down: So 12/8
To view any changes made, use the show running-config logging command in the EXEC privilege mode as
shown in the example for Configure a UNIX logging facility level.
Configure a UNIX logging facility level
You can save system log messages with a UNIX system logging facility.
66|Management
To configure a UNIX logging facility level, use the following command in the CONFIGURATION mode:
Command SyntaxCommand ModePurpose
logging facility [facility-type]CONFIGURATION Specify one of the following parameters.
•auth (for authorization messages)
•cron (for system scheduler messages)
•daemon (for system daemons)
•kern (for kernel messages)
•local0 (for local use)
•local1 (for local use)
•local2 (for local use)
•local3 (for local use)
•local4 (for local use)
•local5 (for local use)
•local6 (for local use)
•local7 (for local use). This is the default.
•lpr (for line printer system messages)
•mail (for mail system messages)
•news (for USENET news messages)
•sys9 (system use)
•sys10 (system use)
•sys11 (system use)
•sys12 (system use)
•sys13 (system use)
•sys14 (system use)
•syslog (for syslog messages)
•user (for user programs)
•uucp (UNIX to UNIX copy protocol)
The default is local7.
To view nondefault settings, use the
show running-config logging command in the EXEC mode as shown in
You can configure FTOS to filter and consolidate the system messages for a specific line by synchronizing
the message output. Only the messages with a severity at or below the set level appear. This feature works
on the terminal and console connections available on the system.
To synchronize log messages, use these commands in the following sequence starting in the
CONFIGURATION mode:
To view the logging synchronous configuration, use the
Enable timestamp on syslog messages
following parameters for the virtual
terminal lines:
•number range: zero (0) to 8.
•end-number range: 1 to 8.
You can configure multiple virtual
terminals at one time by entering a number
and an end-number.
number of messages to be printed.
Configure the following optional
parameters:
•levelseverity-level range: 0 to 7.
Default is 2. Use the all keyword to
include all messages.
•limit range: 20 to 300. Default is 20.
show config command in the LINE mode.
By default, syslog messages do not include a time/date stamp stating when the error or message was
created.
To have FTOS include a timestamp with the syslog message, use the following command syntax in the
CONFIGURATION mode:
Command SyntaxCommand ModePurpose
service timestamps [log |
debug
] [datetime [localtime]
msec] [show-timezone] |
[
uptime]
68|Management
CONFIGURATION Add timestamp to syslog messages. Specify the following
optional parameters:
•datetime: You can add the keyword localtime to include the
localtime, msec, and show-timezone. If you do not add
the keyword localtime, the time is UTC.
•uptime. To view time since last boot.
If neither parameter is specified, FTOS configures uptime.
To view the configuration, use the show running-config logging command in the EXEC privilege mode.
To disable time stamping on syslog messages, enter
File Transfer Services
With FTOS, you can configure the system to transfer files over the network using File Transfer Protocol
(FTP). One FTP application is copying the system image files over an interface on to the system; however,
FTP is not supported on VLAN interfaces.
For more information on FTP, refer to RFC 959, File Transfer Protocol.
Note: To transmit large files, Dell Force10 recommends configuring the switch as an FTP server.
Configuration Task List for File Transfer Services
The following list includes the configuration tasks for file transfer services:
•Enable FTP server (mandatory)
•Configure FTP server parameters (optional)
•Configure FTP client parameters (optional)
no service timestamps [log | debug].
Enable FTP server
To enable the system as an FTP server, use the following command in the CONFIGURATION mode:
Command SyntaxCommand ModePurpose
ftp-server enable
To view FTP configuration, use the show running-config ftp command in the EXEC privilege mode as
shown in the example below.
Note: You cannot use the change directory (cd) command until ftp-server topdir has been
configured.
To view the FTP configuration, use the
Configure FTP client parameters
To configure FTP client parameters, use the following commands in the CONFIGURATION mode:
Command SyntaxCommand ModePurpose
ip ftp source-interface interfaceCONFIGURATION Enter the following keywords and slot/port or number
CONFIGURATION Specify a user name for all FTP users and configure either
a plain text or encrypted password. Configure the
following optional and required parameters:
•username: Enter a text string
•encryption-type: Enter 0 for plain text or 7 for
encrypted text.
•password: Enter a text string.
show running-config ftp command in EXEC privilege mode.
information:
•For a Gigabit Ethernet interface, enter the keyword
GigabitEthernet followed by the slot/port information.
•For a loopback interface, enter the keyword loopback
followed by a number between 0 and 16383.
•For a port channel interface, enter the keyword
port-channel followed by a number from 1 to 255 for
TeraScale and ExaScale, 1 to 32 for EtherScale.
•For a SONET interface, enter the keyword sonet
followed by the slot/port information.
•For a 10-Gigabit Ethernet interface, enter the keyword
TenGigabitEthernet followed by the slot/port
information.
•For a VLAN interface, enter the keyword vlan followed
by a number from 1 to 4094.
•For a 40-Gigabit Ethernet interface, enter the keyword
fortyGigE followed by the slot/port information.
ip ftp password password
ip ftp username nameCONFIGURATION Enter username to use on FTP client.
To view FTP configuration, use the
shown in the example for Enable FTP server.
70|Management
CONFIGURATIONConfigure a password.
show running-config ftp command in the EXEC privilege mode as
Terminal Lines
You can access the system remotely and restrict access to the system by creating user profiles. The terminal
lines on the system provide different means of accessing the system. The console line (console) connects
you through the Console port in the RPMs. The virtual terminal lines (VTY) connect you through Telnet to
the system. The auxiliary line (aux) connects secondary devices such as modems.
Deny and Permit Access to a Terminal Line
Dell Force10 recommends applying only standard ACLs to deny and permit access to VTY lines.
•Layer 3 ACL deny all traffic that is not explicitly permitted, but in the case of VTY lines, an ACL with
no rules does not deny any traffic.
•You cannot use
VTY line.
To apply an IP ACL to a line:
TaskCommand SyntaxCommand Mode
Apply an ACL to a VTY line.ip access-classaccess-listLINE
show ip accounting access-list to display the contents of an ACL that is applied only to a
To view the configuration, enter the
show config command in the LINE mode, as shown in the example
below.
FTOS(config-std-nacl)#show config
!
ip access-list standard myvtyacl
seq 5 permit host 10.11.0.1
FTOS(config-std-nacl)#line vty 0
FTOS(config-line-vty)#show config
line vty 0
access-class myvtyacl
FTOS Behavior: Prior to FTOS version 7.4.2.0, in order to deny access on a VTY line, you must apply an ACL and
AAA authentication to the line. Then users are denied access only after they enter a username and password.
Beginning in FTOS version 7.4.2.0, only an ACL is required, and users are denied access before they are
prompted for a username and password.
Configure Login Authentication for Terminal Lines
You can use any combination of up to 6 authentication methods to authenticate a user on a terminal line. A
combination of authentication methods is called a method list. If the user fails the first authentication
method, FTOS prompts the next method until all methods are exhausted, at which point the connection is
terminated. The available authentication methods are:
Management | 71
•enable—Prompt for the enable password.
•
line—Prompt for the e password you assigned to the terminal line. You must configure a password for
the terminal line to which you assign a method list that contains the
line authentication method.
Configure a password using the command password from LINE mode.
•
local—Prompt for the system username and password.
none—Do not authenticate the user.
•
•
radius—Prompt for a username and password and use a RADIUS server to authenticate.
tacacs+—Prompt for a username and password and use a TACACS+ server to authenticate.
•
To configure authentication for a terminal line:
www.dell.com | support.dell.com
StepTaskCommand SyntaxCommand Mode
1Create an authentication method list.
You may use a mnemonic name or
use the keyword default. The default
authentication method for terminal
lines is local, and the default method
list is empty.
2Apply the method list from Step 1 to
a terminal line.
3If you used the line authentication
method in the method list you
applied to the terminal line,
configure a password for the terminal
line.
In the example below, VTY lines 0-2 use a single authentication method,
EXEC timeout is a basic security feature that returns FTOS to the EXEC mode after a period of inactivity
on terminal lines.
To change the timeout period or disable EXEC timeout.
TaskCommand SyntaxCommand Mode
Set the number of minutes and seconds.
Default: 10 minutes on console, 30 minutes on VTY.
Disable EXEC timeout by setting the timeout period to 0.
Return to the default timeout values.
View the configuration using the command
FTOS(conf)#line con 0
FTOS(config-line-console)#exec-timeout 0
FTOS(config-line-console)#show config
line console 0
exec-timeout 0 0
FTOS(config-line-console)#
exec-timeout minutes [seconds]
no exec-timeout
show config from LINE mode.
LINE
LINE
Telnet to Another Network Device
To telnet to another device:
TaskCommand SyntaxCommand Mode
Telnet to the peer RPM. You do not need to configure the management
port on the peer RPM to be able to telnet to it.
telnet-peer-rpm
EXEC Privilege
Telnet to a device with an IPv4 or IPv6 address. If you do not enter an IP
address, FTOS enters a Telnet dialog that prompts you for one.
•Enter an IPv4 address in dotted decimal format (A.B.C.D).
•Enter an IPv6 address in the format
0000:0000:0000:0000:0000:0000:0000:0000. Elision of zeros is
supported.
FTOS# telnet 10.11.80.203
Trying 10.11.80.203...
Connected to 10.11.80.203.
Exit character is '^]'.
Login:
Login: admin
Password:
FTOS>exit
telnet[ip-address]
EXEC Privilege
Management | 73
FTOS#telnet 2200:2200:2200:2200:2200::2201
Trying 2200:2200:2200:2200:2200::2201...
Connected to 2200:2200:2200:2200:2200::2201.
Exit character is '^]'.
FreeBSD/i386 (freebsd2.force10networks.com) (ttyp1)
login: admin
FTOS#
Lock CONFIGURATION mode
FTOS allows multiple users to make configurations at the same time. You can lock CONFIGURATION
www.dell.com | support.dell.com
mode so that only one user can be in CONFIGURATION mode at any time (Message 2).
A two types of locks can be set: auto and manual.
•Set an auto-lock using the command
configuration mode exclusive auto from CONFIGURATION mode.
When you set an auto-lock, every time a user is in CONFIGURATION mode all other users are denied
access. This means that you can exit to EXEC Privilege mode, and re-enter CONFIGURATION mode
without having to set the lock again.
•Set a manual lock using the command configure terminal lock from CONFIGURATION mode. When
you configure a manual lock, which is the default, you must enter this command time you want to enter
CONFIGURATION mode and deny access to others.
FTOS(conf)#configuration mode exclusive auto
BATMAN(conf)#exit
3d23h35m: %RPM0-P:CP %SYS-5-CONFIG_I: Configured from console by console
If another user attempts to enter CONFIGURATION mode while a lock is in place, Message 1 appears on
their terminal.
Message 1 CONFIGURATION mode Locked Error
% Error: User "" on line console0 is in exclusive configuration mode
If any user is already in CONFIGURATION mode when while a lock is in place, Message 2 appears on
their terminal.
Message 2 Cannot Lock CONFIGURATION mode Error
% Error: Can't lock configuration mode exclusively since the following users are
currently configuring the system:
User "admin" on line vty1 ( 10.1.1.1 )
74|Management
Note: The CONFIGURATION mode lock corresponds to a VTY session, not a user. Therefore, if you
configure a lock and then exit CONFIGURATION mode, and another user enters CONFIGURATION
mode, when you attempt to re-enter CONFIGURATION mode, you are denied access even though you
are the one that configured the lock.
Note: If your session times out and you return to EXEC mode, the CONFIGURATION mode lock is
unconfigured.
Viewing the Configuration Lock Status
If you attempt to enter CONFIGURATION mode when another user has locked it, you may view which
user has control of CONFIGURATION mode using the command
Privilege mode.
show configuration lock from EXEC
You can then send any user a message using the
you can clear any line using the command
send command from EXEC Privilege mode. Alternatively
clear from EXEC Privilege mode. If you clear a console session,
the user is returned to EXEC mode.
Recovering from a Forgotten Password on the S4810 or
S4820T
If you configure authentication for the console and you exit out of EXEC mode or your console session
times out, you are prompted for a password to re-enter.
If you forget your password:
StepTaskCommand SyntaxCommand Mode
1Log onto the system via console.
2Power-cycle the chassis by switching off all of the power modules and then switching them back on.
3Hit any key to abort the boot process.
You enter uBoot i mme id at ely, as
indicated by the => prompt.
hit any key(during bootup)
4Set the system parameters to ignore
the startup configuration file when
the system reloads.
5To save the changes use the saveenv
command.
6Reload the system.
7Copy startup-config.bak to the
running config.
setenv stconfigignore true
saveenv
reset
copy flash://startup-config.bak
running-config
uBoot
uBoot
uBoot
EXEC Privilege
Management | 75
StepTaskCommand SyntaxCommand Mode
8Remove all authentication statements
you might have for the console.
9Save the running-config.
10Set the system parameters to use the
startup configuration file when the
system reloads.
11Save the running-config.copy running-config startup-configEXEC Privilege
www.dell.com | support.dell.com
Recovering from a Forgotten Enable Password on the S4810
or S4820T
If you forget the enable password:
StepTaskCommand SyntaxCommand Mode
1Log onto the system via console.
2Power-cycle the chassis by switching off all of the power modules and then switching them back on.
3Hit any key to abort the boot process.
You enter uBoot immediately, as
indicated by the => prompt.
no authentication login
no password
copy running-config startup-config
setenv stconfigignore false
hit any key(during bootup)
LINE
EXEC Privilege
uBoot
4Set the system parameters to ignore
the enable password when the system
reloads.
5Reload the system.resetuBoot
6Configure a new enable password.enable {secret | password}CONFIGURATION
7Save the running-config to the
startup-config.
setenv
enablepwdignore trueuBoot
copy running-config startup-configEXEC Privilege
Recovering from a Failed Start on the S4810 or S4820T
A system that does not start correctly might be attempting to boot from a corrupted FTOS image or from a
mis-specified location. In that case, you can restart the system and interrupt the boot process to point the
system to another boot location. Use the
command, its supporting commands, and other commands that can help recover from a failed start, see the
Boot User chapter in the FTOS Command Line Reference for the S4810 and S4820T.
StepTaskCommand SyntaxCommand Mode
1Power-cycle the chassis (pull the power cord and reinsert it).
setenv command, as described below. For details on the setenv
76|Management
StepTaskCommand SyntaxCommand Mode
2Hit any key to abort the boot process.
hit any key(during bootup)
You enter uBoot immediately, as
indicated by the => prompt.
3Assign the new location to the FTOS
image to be used when the system
reloads.
4Assign an IP address to the
setenv [primary_image f10boot location |
uBoot
secondary_image f10boot location |
default_image f10boot location]
setenv ipaddre addressuBoot
Management Ethernet interface.
5
6Assign an IP address as the default
setenv gatewayip addressuBoot
gateway for the system.
7Reload the system.resetuBoot
Management | 77
www.dell.com | support.dell.com
78|Management
802.1ag
5
802.1ag is available only on platform: s
Ethernet Operations, Administration, and Maintenance (OAM) is a set of tools used to install, monitor,
troubleshoot and manage Ethernet infrastructure deployments. Ethernet OAM consists of three main areas:
1. Service Layer OAM: IEEE 802.1ag Connectivity Fault Management (CFM)
2. Link Layer OAM: IEEE 802.3ah OAM
3. Ethernet Local management Interface (MEF-16 E-LMI)
Ethernet CFM
Ethernet CFM is an end-to-end per-service-instance Ethernet OAM scheme which enables: proactive
connectivity monitoring, fault verification, and fault isolation.
The service-instance with regard to OAM for Metro/Carrier Ethernet is a VLAN. This service is sold to an
end-customer by a network service provider. Typically the service provider contracts with multiple
network operators to provide end-to-end service between customers. For end-to-end service between
customer switches, connectivity must be present across the service provider through multiple network
operators.
S
4820
T
Layer 2 Ethernet networks usually cannot be managed with IP tools such as ICMP Ping and IP Traceroute.
Traditional IP tools often fail because:
•there are complex interactions between various Layer 2 and Layer 3 protocols such as STP, LAG,
VRRP and ECMP configurations.
•Ping and traceroute are not designed to verify data connectivity in the network and within each node in
the network (such as in the switching fabric and hardware forwarding tables).
•when networks are built from different operational domains, access controls impose restrictions that
cannot be overcome at the IP level, resulting in poor fault visibility. There is a need for hierarchical
domains that can be monitored and maintained independently by each provider or operator.
•routing protocols choose a subset of the total network topology for forwarding, making it hard to detect
faults in links and nodes that are not included in the active routing topology. This is made more
complex when using some form of Traffic Engineering (TE) based routing.
•network and element discovery and cataloging is not clearly defined using IP troubleshooting tools.
802.1ag | 79
There is a need for Layer 2 equivalents to manage and troubleshoot native Layer 2 Ethernet networks. With
these tools, you can identify, isolate, and repair faults quickly and easily, which reduces operational cost of
running the network. OAM also increases availability and reduces mean time to recovery, which allows for
tighter service level agreements, resulting in increased revenue for the service provider.
In addition to providing end-to-end OAM in native Layer 2 Ethernet Service Provider/Metro networks,
you can also use CFM to manage and troubleshoot any Layer 2 network including enterprise, datacenter,
and cluster networks.
Maintenance Domains
www.dell.com | support.dell.com
Connectivity Fault Management (CFM) divides a network into hierarchical maintenance domains, as
shown in the illustration below.
A CFM maintenance domain is a management space on a network that is owned and operated by a single
management entity. The network administrator assigns a unique maintenance level (0 to 7) to each domain
to define the hierarchical relationship between domains. Domains can touch or nest but cannot overlap or
intersect as that would require management by multiple entities.
Customer Network
Ethernet Access
Operator Domain (5)
Service Provider Network
MPLS CoreMPLS Access
Customer Domain (7)
Provider Domain (6)
Operator Domain (5)
MPLS Domain (4)
Customer Network
Operator Domain (5)
Maintenance Points
Domains are comprised of logical entities called Maintenance Points. A maintenance point is an interface
demarcation that confines CFM frames to a domain. There are two types of maintenance points:
•Maintenance End Points (MEPs): a logical entity that marks the end-point of a domain
•Maintenance Intermediate Points (MIPs): a logical entity configured at a port of a switch that is an
intermediate point of a Maintenance Entity (ME). An ME is a point-to-point relationship between two
MEPs within a single domain. MIPs are internal to a domain, not at the boundary, and respond to CFM
only when triggered by linktrace and loopback messages. MIPs can be configured to snoop Continuity
Check Messages (CCMs) to build a MIP CCM database.
80|802.1ag
These roles define the relationships between all devices so that each device can monitor the layers under its
responsibility. Maintenance points drop all lower-level frames and forward all higher-level frames.
Service Provider Network
Customer Network
Customer Network
Ethernet Access
Operator Domain (5)
MEP
Maintenance End Points
A Maintenance End Point (MEP) is a logical entity that marks the end-point of a domain. There are two
types of MEPs defined in 802.1ag for an 802.1 bridge:
•Up-MEP: monitors the forwarding path internal to an bridge on the customer or provider edge; on
Dell Force10 systems the internal forwarding path is effectively the switch fabric and forwarding
engine.
•Down-MEP: monitors the forwarding path external another bridge.
Configure Up- MEPs on ingress ports, ports that send traffic towards the bridge relay. Configure
Down-MEPs on egress ports, ports that send traffic away from the bridge relay.
MPLS CoreMPLS Access
Customer Domain (7)
Provider Domain (6)
Operator Domain (5)
MPLS Domain(4)
MIP
Operator Domain (5)
Customer Network
towards relay
Up-MEP
Down-MEP
away from relay
Service Provider Ethernet Access
802.1ag | 81
Implementation Information
•Since the S-Series has a single MAC address for all physical/LAG interfaces, only one MEP is allowed
per MA (per VLAN or per MD level).
Configure CFM
Configuring CFM is a five-step process:
1. Configure the ecfmacl CAM region using the
www.dell.com | support.dell.com
ACL Sub-partitions.
2. Enable Ethernet CFM.
3. Create a Maintenance Domain.
4. Create a Maintenance Association.
5. Create Maintenance Points.
6. Use CFM tools:
aContinuity Check Messages
bLoopback Message and Response
cLinktrace Message and Response
Related Configuration Tasks
•Enable CFM SNMP Traps.
•Display Ethernet CFM Statistics
cam-acl command. Refer to Configure Ingress Layer 2
82|802.1ag
Enable Ethernet CFM
TaskCommand SyntaxCommand Mode
Spawn the CFM process. No CFM configuration is
allowed until the CFM process is spawned.
Disable Ethernet CFM without stopping the CFM
process.
ethernet cfm
disable
CONFIGURATION
ETHERNET CFM
Create a Maintenance Domain
Connectivity Fault Management (CFM) divides a network into hierarchical maintenance domains, as
shown in the illustration in Maintenance Domains.
Domains are comprised of logical entities called Maintenance Points. A maintenance point is a interface
demarcation that confines CFM frames to a domain. There are two types of maintenance points:
•Maintenance End Points (MEPs): a logical entity that marks the end-point of a domain
•Maintenance Intermediate Points (MIPs): a logical entity configured at a port of a switch that
constitutes intermediate points of an Maintenance Entity (ME). An ME is a point-to-point relationship
between two MEPs within a single domain.
These roles define the relationships between all devices so that each device can monitor the layers under its
responsibility.
Create a Maintenance End Point
A Maintenance End Point (MEP) is a logical entity that marks the end-point of a domain. There are two
types of MEPs defined in 802.1ag for an 802.1 bridge:
•Up-MEP: monitors the forwarding path internal to an bridge on the customer or provider edge; on
Dell Force10 systems the internal forwarding path is effectively the switch fabric and forwarding
engine.
•Down-MEP: monitors the forwarding path external another bridge.
Configure Up- MEPs on ingress ports, ports that send traffic towards the bridge relay. Configure
Down-MEPs on egress ports, ports that send traffic away from the bridge relay.
100 cfm0 7 MEP Gi 4/10 Enabled
test0 10 DOWN 00:01:e8:59:23:45
200 cfm1 6 MEP Gi 4/10 Enabled
test1 20 DOWN 00:01:e8:59:23:45
300 cfm2 5 MEP Gi 4/10 Enabled
test2 30 DOWN 00:01:e8:59:23:45
Create a Maintenance Intermediate Point
Maintenance Intermediate Point (MIP) is a logical entity configured at a port of a switch that constitutes
intermediate points of an Maintenance Entity (ME). An ME is a point-to-point relationship between two
MEPs within a single domain. An MIP is not associated with any MA or service instance, and it belongs to
the entire MD.
Continuity Check Messages (CCM) are periodic hellos used to:
•discover MEPs and MIPs within a maintenance domain
•detect loss of connectivity between MEPs
•detect misconfiguration, such as VLAN ID mismatch between MEPs
•to detect unauthorized MEPs in a maintenance domain
Continuity Check Messages (CCM) are multicast Ethernet frames sent at regular intervals from each MEP.
They have a destination address based on the MD level (01:80:C2:00:00:3X where X is the MD level of
the transmitting MEP from 0 to 7). All MEPs must listen to these multicast MAC addresses and process
these messages. MIPs may optionally processes the CCM messages originated by MEPs and construct a
MIP CCM database.
86|802.1ag
MEPs and MIPs filter CCMs from higher and lower domain levels as described in Table 5-1, "Continuity
Less than my levelBridge-relay side or Wire sideDropDropDrop
My levelBridge-relay sideConsumeDropAdd to MIP-DB
Wire sideDropConsume
Greater than my levelBridge-relay side or Wire sideForwardForwardForward
and forward
All the remote MEPs in the maintenance domain are defined on each MEP. Each MEP then expects a
periodic CCM from the configured list of MEPs. A connectivity failure is then defined as:
1. Loss of 3 consecutive CCMs from any of the remote MEP, which indicates a network failure
2. Reception of a CCM with an incorrect CCM transmission interval, which indicates a configuration
error.
3. Reception of CCM with an incorrect MEP ID or MAID, which indicates a configuration or
cross-connect error. This could happen when different VLANs are cross-connected due to a
configuration error.
4. Reception of a CCM with an MD level lower than that of the receiving MEP, which indicates a
configuration or cross-connect error.
5. Reception of a CCM containing a port status/interface status TLV, which indicates a failed bridge or
aggregated port.
The Continuity Check protocol sends fault notifications (Syslogs, and SNMP traps if enabled) whenever
any of the above errors are encountered.
Enable CCM
StepTaskCommand SyntaxCommand Mode
1Enable CCM.
2Configure the transmit interval (mandatory).
The interval specified applies to all MEPs in
the domain.
no ccm disable
Default: Disabled
ccm transmit-interval seconds
Default: 10 seconds
ECFM DOMAIN
ECFM DOMAIN
802.1ag | 87
Enable Cross-checking
TaskCommand SyntaxCommand Mode
Enable cross-checking.
Start the cross-check operation for an MEP.
Configure the amount of time the system waits for a
remote MEP to come up before the cross-check operation
is started.
www.dell.com | support.dell.com
Loopback Message and Response
Loopback Message and Response (LBM, LBR), also called Layer 2 Ping, is an administrative echo
transmitted by MEPs to verify reachability to another MEP or MIP within the maintenance domain. LBM
and LBR are unicast frames.
TaskCommand SyntaxCommand Mode
Send a Loopback message.
ping ethernet domain name ma-name ma-name remote {mep-id
mep cross-check mep-id
mep cross-check start-delay number
ETHERNET CFM
ETHERNET CFM
ETHERNET CFM
EXEC Privilege
Linktrace Message and Response
Linktrace Message and Response (LTM, LTR), also called Layer 2 Traceroute, is an administratively sent
multicast frames transmitted by MEPs to track, hop-by-hop, the path to another MEP or MIP within the
maintenance domain. All MEPs and MIPs in the same domain respond to an LTM with a unicast LTR.
Intermediate MIPs forward the LTM toward the target MEP.
MPLS Core
MEP
L
i
n
k
t
r
a
c
e
M
m
MIPMIP
e
g
a
s
s
e
MIP
88|802.1ag
Link trace messages carry a unicast target address (the MAC address of an MIP or MEP) inside a multicast
frame. The destination group address is based on the MD level of the transmitting MEP
(01:80:C2:00:00:3[8 to F]). The MPs on the path to the target MAC address reply to the LTM with an LTR,
and relays the LTM towards the target MAC until the target MAC is reached or TTL equals 0.
TaskCommand SyntaxCommand Mode
Send a Linktrace message. Since the
LTM is a Multicast message sent to the
entire ME, there is no need to specify a
destination.
traceroute ethernet domain
EXEC Privilege
Link Trace Cache
After a Link Trace command is executed, the trace information can be cached so that you can view it later
without retracing.
TaskCommand SyntaxCommand Mode
Enable Link Trace caching.
Set the amount of time a trace result is cached.traceroute cache hold-timeminutes
Set the size of the Link Trace Cache.traceroute cache sizeentries
Display the Link Trace Cache.
traceroute cache
Default: 100 minutes
Range: 10-65535 minutes
Default: 100
Range: 1 - 4095 entries
show ethernet cfm traceroute-cache
CONFIGURATION
ETHERNET CFM
ETHERNET CFM
EXEC Privilege
FTOS#show ethernet cfm traceroute-cache
Traceroute to 00:01:e8:52:4a:f8 on Domain Customer2, Level 7, MA name Test2 with VLAN 2
----------------------------------------------------------------------------- Hops Host IngressMAC Ingr Action Relay Action
Next Host Egress MAC Egress Action FWD Status
show ethernet cfm statistics [domain {name | level}
vlan-id
vlan-idmpidmpid
EXEC Privilege
802.1ag | 91
www.dell.com | support.dell.com
92|802.1ag
802.1X
er
6
802.1X is supported on platforms: e c s
Protocol Overview
802.1X is a method of port security. A device connected to a port that is enabled with 802.1X is disallowed
from sending or receiving packets on the network until its identity can be verified (through a username and
password, for example). This feature is named for its IEEE specification.
802.1X employs Extensible Authentication Protocol (EAP)* to transfer a device’s credentials to an
authentication server (typically RADIUS) via a mandatory intermediary network access device, in this
case, a Dell Force10 switch. The network access device mediates all communication between the end-user
device and the authentication server so that the network remains secure. The network access device uses
EAP over Ethernet (EAPOL) to communicate with the end-user device and EAP over RADIUS to
communicate with the server.
End-user Device
EAP over LAN (EAPOL)
Force10 switch
EAP over RADIUS
RADIUS Serv
S
4820
T
fnC0033mp
Figure 6-1 and Figure show how EAP frames are encapsulated in Ethernet and Radius frames.
Note: FTOS supports 802.1X with EAP-MD5, EAP-OTP, EAP-TLS, EAP-TTLS, PEAPv0, PEAPv1, and
MS-CHAPv2 with PEAP.
802.1X | 93
Figure 6-1. EAPOL Frame Format
Preamble
Start Frame
Delimiter
Range: 0-4
Range: 0-4
Type: 0: EAP Packet
Type: 0: EAP Packet
1: EAPOL Start
1: EAPOL Start
2: EAPOL Logoff
2: EAPOL Logoff
3: EAPOL Key
3: EAPOL Key
4: EAPOL Encapsulated-ASF-Alert
4: EAPOL Encapsulated-ASF-Alert
Destination MAC
(1:80:c2:00:00:03)
Source MAC
(Auth Port MAC)
www.dell.com | support.dell.com
The authentication process involves three devices:
•The device attempting to access the network is the supplicant. The supplicant is not allowed to
communicate on the network until the port is authorized by the authenticator. It can only communicate
with the authenticator in response to 802.1X requests.
•The device with which the supplicant communicates is the authenticator. The authenicator is the gate
keeper of the network. It translates and forwards requests and responses between the authentication
server and the supplicant. The authenticator also changes the status of the port based on the results of
the authentication process. The Dell Force10 switch is the authenticator.
•The authentication-server selects the authentication method, verifies the information provided by the
supplicant, and grants it network access privileges.
EAP-Method Data
(Supplicant Requested Credentials)
Ports can be in one of two states:
•Ports are in an unauthorized state by default. In this state, non-802.1X traffic cannot be forwarded in
•The authenticator changes the port state to authorized if the server can authenticate the supplicant. In
The Port-authentication Process
The authentication process begins when the authenticator senses that a link status has changed from down
to up:
1. When the authenticator senses a link state change, it requests that the supplicant identify itself using an
2. The supplicant responds with its identity in an EAP Response Identity frame.
94|802.1X
or out of the port.
this state, network traffic can be forwarded normally.
Note: The Dell Force10 switches place 802.1X-enabled ports in the unauthorized state by default.
EAP Identity Request Frame.
3. The authenticator decapsulates the EAP Response from the EAPOL frame, encapsulates it in a
on
EAP {Sucess | Failure}
RADIUS Access-Request frame, and forwards the frame to the authentication server.
4. The authentication server replies with an Access-Challenge. The Access-Challenge is request that the
supplicant prove that it is who it claims to be, using a specified method (an EAP-Method). The
challenge is translated and forwarded to the supplicant by the authenticator.
5. The supplicant can negotiate the authentication method, but if it is acceptable, the supplicant provides
the requested challenge information in an EAP Response, which is translated and forwarded to the
authentication server as another Access-Request.
6. If the identity information provided by the supplicant is valid, the authentication server sends an
Access-Accept frame in which network privileges are specified. The authenticator changes the port
state to authorized, and forwards an EAP Success frame. If the identity information is invalid, the
server sends and Access-Reject frame. The port state remains unauthorized, and the authenticator
forwards EAP Failure frame.
Figure 6-2. 802.1X Authentication Process
Supplicant
Authenticator
Authenticati
Server
EAP over LAN (EAPOL)
Request Identity
Response Identity
EAP Request
EAP Reponse
EAP over RADIUS
Access Request
Access Challenge
Access Request
Access {Accept | Reject}
EAP over RADIUS
802.1X uses RADIUS to shuttle EAP packets between the authenticator and the authentication server, as
defined in RFC 3579. EAP messages are encapsulated in RADIUS packets as a type of attribute in Type,
Length, Value (TLV) format. The Type value for EAP messages is 79.
If the authenticator sends a Request Identity frame, but the supplicant does not respond, the authenticator
waits 30 seconds and then re-transmits the frame. The amount of time that the authenticator waits before
re-transmitting and the maximum number of times that the authenticator re-transmits are configurable.
Note: There are several reasons why the supplicant might fail to respond; the supplicant might have been
booting when the request arrived, or there might be a physical layer problem.
To configure the amount of time that the authenticator waits before re-transmitting an EAP Request
Identity frame:
StepTaskCommand SyntaxCommand Mode
1Configure the amount of time that the authenticator
waits before re-transmitting an EAP Request Identity
frame.
dot1x tx-period number
Range: 1-65535 (1 year)
Default: 30
INTERFACE
To configure a maximum number of Request Identity re-transmissions:
StepTaskCommand SyntaxCommand Mode
1Configure a maximum number of times that a Request
Identity frame can be re-transmitted by the
authenticator.
dot1x max-eap-req number
Range: 1-10
Default: 2
INTERFACE
802.1X | 99
Figure 6-7 shows configuration information for a port for which the authenticator re-transmits an EAP
Request Identity frame after 90 seconds and re-transmits a maximum of 10 times.
Configuring a Quiet Period after a Failed Authentication
If the supplicant fails the authentication process, the authenticator sends another Request Identity frame
after 30 seconds by default, but this period can be configured.
Note: The quiet period (dot1x quiet-period) is an transmit interval for after a failed authentication where as
the Request Identity Re-transmit interval (dot1x tx-period) is for an unresponsive supplicant.
www.dell.com | support.dell.com
To configure the quiet period after a failed authentication:
StepTaskCommand SyntaxCommand Mode
1Configure the amount of time that the authenticator
waits to re-transmit a Request Identity frame after a
failed authentication.
Figure 6-7 shows configuration information for a port for which the authenticator re-transmits an EAP
Request Identity frame:
•after 90 seconds and a maximum of 10 times for an unresponsive supplicant
•Re-transmits an EAP Request Identity frame
Figure 6-7. Configuring a Request Identity Re-transmissions