Dell Configuration Guide for the Z9000
System
9.5(0.1)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2014 - 07
Rev. A00
Contents
1 About this Guide..................................................................................................31
Audience.............................................................................................................................................. 31
Conventions.........................................................................................................................................31
Related Documents.............................................................................................................................31
2 Configuration Fundamentals........................................................................... 32
Accessing the Command Line............................................................................................................32
CLI Modes............................................................................................................................................32
Navigating CLI Modes................................................................................................................... 34
The do Command............................................................................................................................... 37
Undoing Commands...........................................................................................................................38
Obtaining Help.................................................................................................................................... 39
Entering and Editing Commands....................................................................................................... 39
Command History.............................................................................................................................. 40
Filtering show Command Outputs.....................................................................................................40
Multiple Users in Configuration Mode............................................................................................... 42
3 Data Center Bridging (DCB)..............................................................................43
SNMP Support for PFC and Buffer Statistics Tracking.......................................................................43
4 Getting Started................................................................................................... 44
Console Access...................................................................................................................................44
Serial Console................................................................................................................................44
Accessing the CLI Interface and Running Scripts Using SSH............................................................45
Z9000 ........................................................................................................................................... 45
Entering CLI commands Using an SSH Connection................................................................... 46
Executing Local CLI Scripts Using an SSH Connection...............................................................46
Default Configuration......................................................................................................................... 47
Configuring a Host Name...................................................................................................................47
Accessing the System Remotely.........................................................................................................47
Accessing the Z-Series and Remotely..........................................................................................47
Configure the Management Port IP Address............................................................................... 47
Configure a Management Route..................................................................................................48
Configuring a Username and Password.......................................................................................48
Configuring the Enable Password......................................................................................................48
Configuration File Management.........................................................................................................49
Copy Files to and from the System.............................................................................................. 49
Save the Running-Configuration..................................................................................................50
Configure the Overload Bit for a Startup Scenario...................................................................... 51
Viewing Files...................................................................................................................................51
Managing the File System................................................................................................................... 52
Enabling Software Features on Devices Using a Command Option................................................ 53
View Command History......................................................................................................................54
Upgrading Dell Networking OS.......................................................................................................... 54
Using HTTP for File Transfers............................................................................................................. 55
Using Hashes to Validate Software Images........................................................................................55
5 Management........................................................................................................57
Configuring Privilege Levels................................................................................................................57
Creating a Custom Privilege Level................................................................................................57
Removing a Command from EXEC Mode....................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 57
Allowing Access to CONFIGURATION Mode Commands.......................................................... 58
Allowing Access to the Following Modes.................................................................................... 58
Applying a Privilege Level to a Username.................................................................................... 60
Applying a Privilege Level to a Terminal Line...............................................................................60
Configuring Logging...........................................................................................................................60
Audit and Security Logs.................................................................................................................61
Configuring Logging Format ...................................................................................................... 62
Setting Up a Secure Connection to a Syslog Server....................................................................63
Log Messages in the Internal Buffer...................................................................................................64
Configuration Task List for System Log Management................................................................ 64
Disabling System Logging.................................................................................................................. 64
Sending System Messages to a Syslog Server....................................................................................65
Configuring a UNIX System as a Syslog Server............................................................................65
Changing System Logging Settings....................................................................................................65
Display the Logging Buffer and the Logging Configuration............................................................. 66
Configuring a UNIX Logging Facility Level.........................................................................................67
Synchronizing Log Messages............................................................................................................. 68
Enabling Timestamp on Syslog Messages......................................................................................... 68
File Transfer Services.......................................................................................................................... 69
Configuration Task List for File Transfer Services........................................................................69
Enabling the FTP Server................................................................................................................ 69
Configuring FTP Server Parameters............................................................................................. 70
Configuring FTP Client Parameters..............................................................................................70
Terminal Lines......................................................................................................................................71
Denying and Permitting Access to a Terminal Line......................................................................71
Configuring Login Authentication for Terminal Lines..................................................................72
Setting Time Out of EXEC Privilege Mode..........................................................................................73
Using Telnet to get to Another Network Device................................................................................73
Lock CONFIGURATION Mode............................................................................................................74
Viewing the Configuration Lock Status........................................................................................ 74
Recovering from a Forgotten Password on the Z9000 System........................................................75
Recovering from a Forgotten Enable Password on the Z9000.................................................. 76
Recovering from a Failed Start on the Z9000 System.......................................................................77
Restoring the Factory Default Settings...............................................................................................78
Z9000MXL Switch......................................................................................................................... 78
Important Points to Remember....................................................................................................78
Restoring Factory Default Environment Variables....................................................................... 78
6 802.1X................................................................................................................... 81
The Port-Authentication Process.......................................................................................................82
EAP over RADIUS...........................................................................................................................84
Configuring 802.1X............................................................................................................................. 84
Related Configuration Tasks.........................................................................................................84
Important Points to Remember..........................................................................................................85
Enabling 802.1X...................................................................................................................................85
Configuring Request Identity Re-Transmissions............................................................................... 87
Configuring a Quiet Period after a Failed Authentication........................................................... 87
Forcibly Authorizing or Unauthorizing a Port....................................................................................88
Re-Authenticating a Port....................................................................................................................89
Configuring Timeouts.........................................................................................................................90
Configuring Dynamic VLAN Assignment with Port Authentication.................................................. 91
Guest and Authentication-Fail VLANs................................................................................................92
Configuring a Guest VLAN............................................................................................................93
Configuring an Authentication-Fail VLAN....................................................................................93
7 Access Control Lists (ACLs)...............................................................................95
IP Access Control Lists (ACLs)............................................................................................................ 96
CAM Usage....................................................................................................................................96
Implementing ACLs on Dell Networking OS............................................................................... 98
IP Fragment Handling......................................................................................................................... 99
IP Fragments ACL Examples......................................................................................................... 99
Layer 4 ACL Rules Examples.......................................................................................................100
Configure a Standard IP ACL............................................................................................................ 101
Configuring a Standard IP ACL Filter..........................................................................................102
Configure an Extended IP ACL......................................................................................................... 103
Configuring Filters with a Sequence Number............................................................................103
Configuring Filters Without a Sequence Number......................................................................104
Configure Layer 2 and Layer 3 ACLs................................................................................................ 105
Assign an IP ACL to an Interface...................................................................................................... 106
Applying an IP ACL............................................................................................................................106
Counting ACL Hits.......................................................................................................................107
Configure Ingress ACLs.....................................................................................................................107
Configure Egress ACLs..................................................................................................................... 108
Applying Egress Layer 3 ACLs (Control-Plane).......................................................................... 109
IP Prefix Lists......................................................................................................................................109
Implementation Information.......................................................................................................110
Configuration Task List for Prefix Lists........................................................................................110
ACL Resequencing............................................................................................................................ 114
Resequencing an ACL or Prefix List............................................................................................ 115
Route Maps........................................................................................................................................ 116
Implementation Information.......................................................................................................116
Important Points to Remember........................................................................................................ 116
Configuration Task List for Route Maps......................................................................................117
Configuring Match Routes.......................................................................................................... 119
Configuring Set Conditions.........................................................................................................121
Configure a Route Map for Route Redistribution...................................................................... 122
Configure a Route Map for Route Tagging................................................................................ 122
Continue Clause..........................................................................................................................123
Logging of ACL Processes................................................................................................................ 123
Guidelines for Configuring ACL Logging......................................................................................... 124
Configuring ACL Logging................................................................................................................. 125
Flow-Based Monitoring Support for ACLs....................................................................................... 125
Behavior of Flow-Based Monitoring...........................................................................................126
Enabling Flow-Based Monitoring..................................................................................................... 127
8 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)......................................................................................................129
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................... 129
Guidelines for Configuring ACL VLAN groups.................................................................................130
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.........................131
Configuring ACL VLAN Groups................................................................................................... 131
Configuring FP Blocks for VLAN Parameters............................................................................. 132
Viewing CAM Usage.......................................................................................................................... 133
Allocating FP Blocks for VLAN Processes.........................................................................................134
9 Bidirectional Forwarding Detection (BFD)...................................................136
How BFD Works................................................................................................................................ 136
BFD Packet Format......................................................................................................................137
BFD Sessions................................................................................................................................139
BFD Three-Way Handshake........................................................................................................139
Session State Changes................................................................................................................140
Important Points to Remember........................................................................................................ 141
Configure BFD................................................................................................................................... 141
Configure BFD for Physical Ports............................................................................................... 142
Configure BFD for Static Routes.................................................................................................145
Configure BFD for OSPF..............................................................................................................147
Configure BFD for OSPFv3......................................................................................................... 150
Configure BFD for IS-IS............................................................................................................... 151
Configure BFD for BGP............................................................................................................... 154
Configure BFD for VRRP..............................................................................................................161
Configuring Protocol Liveness................................................................................................... 164
Troubleshooting BFD..................................................................................................................164
10 Border Gateway Protocol IPv4 (BGPv4).................................................... 166
Autonomous Systems (AS)................................................................................................................166
Sessions and Peers............................................................................................................................168
Establish a Session.......................................................................................................................169
Route Reflectors................................................................................................................................169
BGP Attributes................................................................................................................................... 170
Best Path Selection Criteria......................................................................................................... 171
Weight.......................................................................................................................................... 173
Local Preference..........................................................................................................................173
Multi-Exit Discriminators (MEDs)................................................................................................ 174
Origin............................................................................................................................................175
AS Path......................................................................................................................................... 176
Next Hop......................................................................................................................................176
Multiprotocol BGP............................................................................................................................. 177
Implement BGP with Dell Networking OS........................................................................................177
Additional Path (Add-Path) Support............................................................................................177
Advertise IGP Cost as MED for Redistributed Routes.................................................................177
Ignore Router-ID for Some Best-Path Calculations..................................................................178
Four-Byte AS Numbers................................................................................................................178
AS4 Number Representation.......................................................................................................179
AS Number Migration..................................................................................................................180
BGP4 Management Information Base (MIB).............................................................................. 182
Important Points to Remember..................................................................................................182
Configuration Information................................................................................................................183
BGP Configuration............................................................................................................................ 183
Enabling BGP...............................................................................................................................184
Configuring AS4 Number Representations................................................................................188
Configuring Peer Groups............................................................................................................190
Configuring BGP Fast Fall-Over..................................................................................................192
Configuring Passive Peering....................................................................................................... 194
Maintaining Existing AS Numbers During an AS Migration........................................................195
Allowing an AS Number to Appear in its Own AS Path..............................................................196
Enabling Graceful Restart............................................................................................................197
Enabling Neighbor Graceful Restart...........................................................................................198
Filtering on an AS-Path Attribute................................................................................................198
Regular Expressions as Filters.................................................................................................... 200
Redistributing Routes..................................................................................................................201
Enabling Additional Paths...........................................................................................................202
Configuring IP Community Lists................................................................................................ 202
Configuring an IP Extended Community List............................................................................ 204
Filtering Routes with Community Lists...................................................................................... 205
Manipulating the COMMUNITY Attribute.................................................................................. 205
Changing MED Attributes........................................................................................................... 207
Changing the LOCAL_PREFERENCE Attribute.......................................................................... 207
Changing the NEXT_HOP Attribute...........................................................................................208
Changing the WEIGHT Attribute................................................................................................209
Enabling Multipath......................................................................................................................209
Filtering BGP Routes...................................................................................................................209
Filtering BGP Routes Using Route Maps.....................................................................................211
Filtering BGP Routes Using AS-PATH Information.................................................................... 212
Configuring BGP Route Reflectors.............................................................................................212
Aggregating Routes.....................................................................................................................213
Configuring BGP Confederations...............................................................................................214
Enabling Route Flap Dampening................................................................................................ 214
Changing BGP Timers................................................................................................................. 217
Enabling BGP Neighbor Soft-Reconfiguration...........................................................................217
Route Map Continue...................................................................................................................219
Enabling MBGP Configurations........................................................................................................ 219
BGP Regular Expression Optimization.............................................................................................220
Debugging BGP................................................................................................................................ 220
Storing Last and Bad PDUs..........................................................................................................221
Capturing PDUs...........................................................................................................................222
PDU Counters............................................................................................................................. 223
Sample Configurations..................................................................................................................... 224
11 Content Addressable Memory (CAM)......................................................... 230
CAM Allocation................................................................................................................................. 230
Test CAM Usage................................................................................................................................232
View CAM Profiles.............................................................................................................................232
View CAM-ACL Settings................................................................................................................... 233
View CAM Usage...............................................................................................................................235
CAM Optimization.............................................................................................................................235
Troubleshoot CAM Profiling.............................................................................................................236
CAM Profile Mismatches.............................................................................................................236
QoS CAM Region Limitation.......................................................................................................236
12 Control Plane Policing (CoPP)..................................................................... 237
Configure Control Plane Policing.................................................................................................... 238
Configuring CoPP for Protocols................................................................................................ 239
Configuring CoPP for CPU Queues........................................................................................... 241
CoPP for OSPFv3 Packets...........................................................................................................242
Configuring CoPP for OSPFv3....................................................................................................245
Show Commands....................................................................................................................... 246
13 Dynamic Host Configuration Protocol (DHCP)........................................248
DHCP Packet Format and Options.................................................................................................. 248
Assign an IP Address using DHCP....................................................................................................250
Implementation Information............................................................................................................ 251
Configure the System to be a DHCP Server.................................................................................... 252
Configuring the Server for Automatic Address Allocation........................................................ 252
Specifying a Default Gateway.....................................................................................................254
Configure a Method of Hostname Resolution.......................................................................... 254
Using DNS for Address Resolution.............................................................................................254
Using NetBIOS WINS for Address Resolution............................................................................ 254
Creating Manual Binding Entries................................................................................................ 255
Debugging the DHCP Server......................................................................................................255
Using DHCP Clear Commands...................................................................................................255
Configure the System to be a Relay Agent......................................................................................256
Configure the System to be a DHCP Client.................................................................................... 258
DHCP Client on a Management Interface................................................................................. 258
DHCP Client Operation with Other Features............................................................................ 259
Configure the System for User Port Stacking (Option 230)........................................................... 260
Configure Secure DHCP.................................................................................................................. 260
Option 82....................................................................................................................................260
DHCP Snooping.......................................................................................................................... 261
Drop DHCP Packets on Snooped VLANs Only..........................................................................263
Dynamic ARP Inspection............................................................................................................ 263
Configuring Dynamic ARP Inspection........................................................................................265
Source Address Validation................................................................................................................266
Enabling IP Source Address Validation...................................................................................... 266
DHCP MAC Source Address Validation......................................................................................266
Enabling IP+MAC Source Address Validation............................................................................ 267
14 Equal Cost Multi-Path (ECMP).....................................................................268
ECMP for Flow-Based Affinity..........................................................................................................268
Configuring the Hash Algorithm................................................................................................ 268
Enabling Deterministic ECMP Next Hop....................................................................................268
Configuring the Hash Algorithm Seed.......................................................................................269
Link Bundle Monitoring.................................................................................................................... 269
Managing ECMP Group Paths.................................................................................................... 270
Creating an ECMP Group Bundle............................................................................................... 271
Modifying the ECMP Group Threshold.......................................................................................271
15 Enabling FIPS Cryptography.........................................................................273
Configuration Tasks.......................................................................................................................... 273
Preparing the System........................................................................................................................273
Enabling FIPS Mode.......................................................................................................................... 274
Generating Host-Keys...................................................................................................................... 274
Monitoring FIPS Mode Status........................................................................................................... 275
Disabling FIPS Mode..........................................................................................................................275
16 Force10 Resilient Ring Protocol (FRRP)..................................................... 277
Protocol Overview............................................................................................................................ 277
Ring Status...................................................................................................................................278
Multiple FRRP Rings.................................................................................................................... 279
Important FRRP Points................................................................................................................279
Important FRRP Concepts.......................................................................................................... 279
Implementing FRRP.......................................................................................................................... 281
FRRP Configuration...........................................................................................................................281
Creating the FRRP Group............................................................................................................281
Configuring the Control VLAN................................................................................................... 282
Configuring and Adding the Member VLANs.............................................................................283
Setting the FRRP Timers............................................................................................................. 284
Clearing the FRRP Counters.......................................................................................................285
Viewing the FRRP Configuration................................................................................................285
Viewing the FRRP Information................................................................................................... 285
Troubleshooting FRRP......................................................................................................................286
Configuration Checks.................................................................................................................286
Sample Configuration and Topology.............................................................................................. 286
17 GARP VLAN Registration Protocol (GVRP)................................................ 288
Important Points to Remember....................................................................................................... 288
Configure GVRP................................................................................................................................289
Related Configuration Tasks...................................................................................................... 289
Enabling GVRP Globally................................................................................................................... 290
Enabling GVRP on a Layer 2 Interface.............................................................................................290
Configure GVRP Registration...........................................................................................................290
Configure a GARP Timer...................................................................................................................291
18 Internet Group Management Protocol (IGMP).........................................293
IGMP Implementation Information..................................................................................................293
IGMP Protocol Overview..................................................................................................................293
IGMP Version 2............................................................................................................................293
IGMP Version 3............................................................................................................................295
Configure IGMP................................................................................................................................ 298
Related Configuration Tasks...................................................................................................... 298
Viewing IGMP Enabled Interfaces....................................................................................................299
Selecting an IGMP Version............................................................................................................... 299
Viewing IGMP Groups...................................................................................................................... 300
Adjusting Timers...............................................................................................................................300
Adjusting Query and Response Timers......................................................................................300
Adjusting the IGMP Querier Timeout Value...............................................................................301
Configuring a Static IGMP Group.....................................................................................................301
Enabling IGMP Immediate-Leave.................................................................................................... 302
IGMP Snooping.................................................................................................................................302
IGMP Snooping Implementation Information...........................................................................302
Configuring IGMP Snooping...................................................................................................... 302
Removing a Group-Port Association......................................................................................... 303
Disabling Multicast Flooding...................................................................................................... 303
Specifying a Port as Connected to a Multicast Router............................................................. 304
Configuring the Switch as Querier.............................................................................................304
Fast Convergence after MSTP Topology Changes......................................................................... 305
Egress Interface Selection (EIS) for HTTP and IGMP Applications..................................................305
Protocol Separation....................................................................................................................306
Enabling and Disabling Management Egress Interface Selection.............................................307
Handling of Management Route Configuration........................................................................308
Handling of Switch-Initiated Traffic...........................................................................................308
Handling of Switch-Destined Traffic......................................................................................... 309
Handling of Transit Traffic (Traffic Separation).......................................................................... 310
Mapping of Management Applications and Traffic Type...........................................................310
Behavior of Various Applications for Switch-Initiated Traffic ................................................... 311
Behavior of Various Applications for Switch-Destined Traffic ................................................. 312
Interworking of EIS With Various Applications...........................................................................313
Designating a Multicast Router Interface.........................................................................................314
19 Interfaces..........................................................................................................315
Basic Interface Configuration........................................................................................................... 315
Advanced Interface Configuration................................................................................................... 315
Interface Types..................................................................................................................................316
View Basic Interface Information..................................................................................................... 316
Enabling a Physical Interface............................................................................................................318
Physical Interfaces.............................................................................................................................318
Configuration Task List for Physical Interfaces.......................................................................... 319
Overview of Layer Modes........................................................................................................... 319
Configuring Layer 2 (Data Link) Mode........................................................................................319
Configuring Layer 2 (Interface) Mode........................................................................................320
Configuring Layer 3 (Network) Mode........................................................................................ 320
Configuring Layer 3 (Interface) Mode.........................................................................................321
Egress Interface Selection (EIS).........................................................................................................321
Important Points to Remember..................................................................................................322
Configuring EIS........................................................................................................................... 322
Management Interfaces....................................................................................................................322
Configuring Management Interfaces......................................................................................... 322
Configuring Management Interfaces on the S-Series...............................................................323
VLAN Interfaces................................................................................................................................ 324
Loopback Interfaces......................................................................................................................... 325
Null Interfaces................................................................................................................................... 325
Port Channel Interfaces....................................................................................................................325
Port Channel Definition and Standards......................................................................................326
Port Channel Benefits.................................................................................................................326
Port Channel Implementation....................................................................................................326
10/100/1000 Mbps Interfaces in Port Channels........................................................................327
Configuration Tasks for Port Channel Interfaces...................................................................... 327
Creating a Port Channel............................................................................................................. 328
Adding a Physical Interface to a Port Channel.......................................................................... 328
Reassigning an Interface to a New Port Channel......................................................................330
Configuring the Minimum Oper Up Links in a Port Channel.....................................................331
......................................................................................................................................................331
Assigning an IP Address to a Port Channel................................................................................ 332
Deleting or Disabling a Port Channel.........................................................................................332
Load Balancing Through Port Channels.................................................................................... 332
Load-Balancing on the S- Series................................................................................................333
Changing the Hash Algorithm.................................................................................................... 333
Bulk Configuration............................................................................................................................335
Interface Range........................................................................................................................... 335
Bulk Configuration Examples..................................................................................................... 335
Defining Interface Range Macros.....................................................................................................337
Define the Interface Range.........................................................................................................337
Choosing an Interface-Range Macro.........................................................................................337
Monitoring and Maintaining Interfaces............................................................................................338
Maintenance Using TDR............................................................................................................. 339
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 339
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................340
Important Points to Remember..................................................................................................341
Support for LM4 Optics...............................................................................................................341
Example Scenarios......................................................................................................................342
Link Dampening................................................................................................................................346
Important Points to Remember................................................................................................. 346
Enabling Link Dampening...........................................................................................................346
Link Bundle Monitoring.................................................................................................................... 348
Using Ethernet Pause Frames for Flow Control.............................................................................. 348
Threshold Settings...................................................................................................................... 349
Enabling Pause Frames...............................................................................................................349
Configure the MTU Size on an Interface......................................................................................... 350
Port-Pipes..........................................................................................................................................351
Auto-Negotiation on Ethernet Interfaces........................................................................................ 351
Setting the Speed and Duplex Mode of Ethernet Interfaces.....................................................352
Set Auto-Negotiation Options....................................................................................................353
View Advanced Interface Information............................................................................................. 354
Configuring the Interface Sampling Size................................................................................... 355
Dynamic Counters............................................................................................................................356
Clearing Interface Counters....................................................................................................... 356
Enhanced Validation of Interface Ranges........................................................................................ 357
20 Internet Protocol Security (IPSec).............................................................. 358
Configuring IPSec ............................................................................................................................ 359
21 IPv4 Routing....................................................................................................360
IP Addresses......................................................................................................................................360
Implementation Information......................................................................................................360
Configuration Tasks for IP Addresses.............................................................................................. 360
Assigning IP Addresses to an Interface.............................................................................................361
Configuring Static Routes.................................................................................................................362
Configure Static Routes for the Management Interface.................................................................363
IPv4 Path MTU Discovery Overview.................................................................................................364
Using the Configured Source IP Address in ICMP Messages..........................................................365
Configuring the ICMP Source Interface.....................................................................................365
Configuring the Duration to Establish a TCP Connection..............................................................365
Enabling Directed Broadcast............................................................................................................366
Resolution of Host Names............................................................................................................... 366
Enabling Dynamic Resolution of Host Names................................................................................ 366
Specifying the Local System Domain and a List of Domains..........................................................367
Configuring DNS with Traceroute....................................................................................................367
ARP.................................................................................................................................................... 368
Configuration Tasks for ARP............................................................................................................ 369
Configuring Static ARP Entries......................................................................................................... 369
Enabling Proxy ARP...........................................................................................................................369
Clearing ARP Cache..........................................................................................................................370
ARP Learning via Gratuitous ARP..................................................................................................... 370
Enabling ARP Learning via Gratuitous ARP.......................................................................................371
ARP Learning via ARP Request..........................................................................................................371
Configuring ARP Retries....................................................................................................................372
ICMP.................................................................................................................................................. 373
Configuration Tasks for ICMP...........................................................................................................373
Enabling ICMP Unreachable Messages............................................................................................373
UDP Helper........................................................................................................................................373
Configure UDP Helper................................................................................................................ 373
Important Points to Remember..................................................................................................374
Enabling UDP Helper........................................................................................................................ 374
Configuring a Broadcast Address.....................................................................................................374
Configurations Using UDP Helper....................................................................................................375
UDP Helper with Broadcast-All Addresses...................................................................................... 375
UDP Helper with Subnet Broadcast Addresses................................................................................376
UDP Helper with Configured Broadcast Addresses.........................................................................377
UDP Helper with No Configured Broadcast Addresses...................................................................377
Troubleshooting UDP Helper........................................................................................................... 377
22 IPv6 Routing....................................................................................................379
Protocol Overview............................................................................................................................ 379
Extended Address Space.............................................................................................................379
Stateless Autoconfiguration........................................................................................................379
IPv6 Headers............................................................................................................................... 380
IPv6 Header Fields.......................................................................................................................381
Extension Header Fields..............................................................................................................382
Addressing...................................................................................................................................383
Implementing IPv6 with Dell Networking OS..................................................................................385
ICMPv6.............................................................................................................................................. 387
Path MTU Discovery..........................................................................................................................387
IPv6 Neighbor Discovery..................................................................................................................388
IPv6 Neighbor Discovery of MTU Packets.................................................................................389
Configuration Task List for IPv6 RDNSS.......................................................................................... 389
Configuring the IPv6 Recursive DNS Server.............................................................................. 389
Debugging IPv6 RDNSS Information Sent to the Host ............................................................ 390
Displaying IPv6 RDNSS Information........................................................................................... 391
Secure Shell (SSH) Over an IPv6 Transport......................................................................................392
Configuration Tasks for IPv6............................................................................................................ 392
Adjusting Your CAM-Profile........................................................................................................392
Assigning an IPv6 Address to an Interface.................................................................................393
Assigning a Static IPv6 Route..................................................................................................... 393
Configuring Telnet with IPv6......................................................................................................394
SNMP over IPv6...........................................................................................................................394
Showing IPv6 Information.......................................................................................................... 395
Showing an IPv6 Interface..........................................................................................................395
Showing IPv6 Routes..................................................................................................................396
Showing the Running-Configuration for an Interface.............................................................. 397
Clearing IPv6 Routes...................................................................................................................398
23 Intermediate System to Intermediate System.......................................... 399
IS-IS Protocol Overview................................................................................................................... 399
IS-IS Addressing................................................................................................................................399
Multi-Topology IS-IS........................................................................................................................400
Transition Mode.......................................................................................................................... 401
Interface Support........................................................................................................................ 401
Adjacencies..................................................................................................................................401
Graceful Restart................................................................................................................................ 401
Timers..........................................................................................................................................402
Implementation Information............................................................................................................402
Configuration Information............................................................................................................... 403
Configuration Tasks for IS-IS..................................................................................................... 403
Configuring the Distance of a Route..........................................................................................412
Changing the IS-Type................................................................................................................. 412
Redistributing IPv4 Routes..........................................................................................................415
Redistributing IPv6 Routes..........................................................................................................416
Configuring Authentication Passwords......................................................................................417
Setting the Overload Bit.............................................................................................................. 417
Debugging IS-IS.......................................................................................................................... 418
IS-IS Metric Styles..............................................................................................................................419
Configure Metric Values................................................................................................................... 419
Maximum Values in the Routing Table...................................................................................... 420
Change the IS-IS Metric Style in One Level Only......................................................................420
Leaks from One Level to Another.............................................................................................. 422
Sample Configurations..................................................................................................................... 422
24 Link Aggregation Control Protocol (LACP)...............................................425
Introduction to Dynamic LAGs and LACP....................................................................................... 425
Important Points to Remember................................................................................................. 425
LACP Modes................................................................................................................................426
Configuring LACP Commands...................................................................................................426
LACP Configuration Tasks................................................................................................................ 427
Creating a LAG............................................................................................................................ 427
Configuring the LAG Interfaces as Dynamic............................................................................. 428
Setting the LACP Long Timeout.................................................................................................428
Monitoring and Debugging LACP.............................................................................................. 429
Shared LAG State Tracking...............................................................................................................429
Configuring Shared LAG State Tracking.................................................................................... 430
Important Points about Shared LAG State Tracking.................................................................. 431
LACP Basic Configuration Example................................................................................................. 432
Configure a LAG on ALPHA........................................................................................................ 432
Setting Up a Threshold for Utilization of High-Gigabit Port Channels.......................................... 439
Guidelines for Monitoring High-Gigabit Port Channels............................................................441
Enabling the Verification of Member Links Utilization in a High-Gigabit Port Channel................442
Viewing Buffer Utilization and Queue Statistics on High-Gigabit Ethernet Backplane Ports....... 442
25 Layer 2..............................................................................................................444
Manage the MAC Address Table......................................................................................................444
Clearing the MAC Address Table............................................................................................... 444
Setting the Aging Time for Dynamic Entries..............................................................................444
Configuring a Static MAC Address............................................................................................. 445
Displaying the MAC Address Table............................................................................................ 445
MAC Learning Limit.......................................................................................................................... 445
Setting the MAC Learning Limit................................................................................................. 446
mac learning-limit Dynamic.......................................................................................................446
mac learning-limit mac-address-sticky.....................................................................................447
mac learning-limit station-move............................................................................................... 447
mac learning-limit no-station-move.........................................................................................447
Learning Limit Violation Actions................................................................................................ 448
Setting Station Move Violation Actions......................................................................................448
Recovering from Learning Limit and Station Move Violations................................................. 449
NIC Teaming.....................................................................................................................................449
Configure Redundant Pairs.............................................................................................................. 450
Important Points about Configuring Redundant Pairs..............................................................452
Far-End Failure Detection................................................................................................................ 453
FEFD State Changes....................................................................................................................454
Configuring FEFD........................................................................................................................455
Enabling FEFD on an Interface...................................................................................................456
Debugging FEFD......................................................................................................................... 457
26 Link Layer Discovery Protocol (LLDP)........................................................459
802.1AB (LLDP) Overview.................................................................................................................459
Protocol Data Units.....................................................................................................................459
Optional TLVs................................................................................................................................... 460
Management TLVs......................................................................................................................460
TIA-1057 (LLDP-MED) Overview......................................................................................................462
TIA Organizationally Specific TLVs.............................................................................................463
Configure LLDP.................................................................................................................................467
Related Configuration Tasks.......................................................................................................467
Important Points to Remember................................................................................................. 468
LLDP Compatibility..................................................................................................................... 468
CONFIGURATION versus INTERFACE Configurations................................................................... 468
Enabling LLDP...................................................................................................................................469
Disabling and Undoing LLDP......................................................................................................469
Enabling LLDP on Management Ports.............................................................................................469
Disabling and Undoing LLDP on Management Ports................................................................469
Advertising TLVs................................................................................................................................470
Viewing the LLDP Configuration...................................................................................................... 471
Viewing Information Advertised by Adjacent LLDP Agents.............................................................472
Configuring LLDPDU Intervals..........................................................................................................473
Configuring Transmit and Receive Mode........................................................................................ 473
Configuring a Time to Live............................................................................................................... 474
Debugging LLDP............................................................................................................................... 475
Relevant Management Objects........................................................................................................476
27 Microsoft Network Load Balancing............................................................482
NLB Unicast Mode Scenario.............................................................................................................482
NLB Multicast Mode Scenario..........................................................................................................483
Limitations With Enabling NLB on Switches....................................................................................483
Benefits and Working of Microsoft Clustering................................................................................ 483
Enable and Disable VLAN Flooding .................................................................................................484
Configuring a Switch for NLB ......................................................................................................... 484
.....................................................................................................................................................484
28 Multicast Source Discovery Protocol (MSDP).......................................... 485
Protocol Overview............................................................................................................................485
Anycast RP.........................................................................................................................................487
Implementation Information............................................................................................................487
Configure Multicast Source Discovery Protocol............................................................................. 487
Related Configuration Tasks.......................................................................................................487
Enable MSDP..................................................................................................................................... 491
Manage the Source-Active Cache...................................................................................................492
Viewing the Source-Active Cache............................................................................................. 492
Limiting the Source-Active Cache............................................................................................. 493
Clearing the Source-Active Cache.............................................................................................493
Enabling the Rejected Source-Active Cache.............................................................................493
Accept Source-Active Messages that Fail the RFP Check.............................................................. 493
Specifying Source-Active Messages................................................................................................ 497
Limiting the Source-Active Messages from a Peer......................................................................... 498
Preventing MSDP from Caching a Local Source.............................................................................498
Preventing MSDP from Caching a Remote Source.........................................................................499
Preventing MSDP from Advertising a Local Source........................................................................ 500
Logging Changes in Peership States................................................................................................501
Terminating a Peership..................................................................................................................... 501
Clearing Peer Statistics..................................................................................................................... 501
Debugging MSDP..............................................................................................................................502
MSDP with Anycast RP..................................................................................................................... 502
Configuring Anycast RP....................................................................................................................504
Reducing Source-Active Message Flooding..............................................................................504
Specifying the RP Address Used in SA Messages...................................................................... 504
MSDP Sample Configurations.......................................................................................................... 507
29 Multiple Spanning Tree Protocol (MSTP).................................................. 510
Protocol Overview............................................................................................................................ 510
Spanning Tree Variations...................................................................................................................511
Implementation Information.......................................................................................................511
Configure Multiple Spanning Tree Protocol.....................................................................................511
Related Configuration Tasks........................................................................................................511
Enable Multiple Spanning Tree Globally...........................................................................................512
Adding and Removing Interfaces......................................................................................................512
Creating Multiple Spanning Tree Instances......................................................................................512
Influencing MSTP Root Selection.....................................................................................................514
Interoperate with Non-Dell Networking OS Bridges.......................................................................514
Changing the Region Name or Revision.......................................................................................... 515
Modifying Global Parameters........................................................................................................... 515
Modifying the Interface Parameters................................................................................................. 516
Configuring an EdgePort...................................................................................................................517
Flush MAC Addresses after a Topology Change..............................................................................518
MSTP Sample Configurations........................................................................................................... 518
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration.............................................................519
Debugging and Verifying MSTP Configurations.............................................................................. 522
30 Multicast Features..........................................................................................525
Enabling IP Multicast.........................................................................................................................525
Multicast with ECMP......................................................................................................................... 525
Implementation Information............................................................................................................526
First Packet Forwarding for Lossless Multicast................................................................................ 527
Multicast Policies...............................................................................................................................527
IPv4 Multicast Policies.................................................................................................................527
31 Open Shortest Path First (OSPFv2 and OSPFv3).......................................535
Protocol Overview............................................................................................................................ 535
Autonomous System (AS) Areas................................................................................................. 535
Area Types...................................................................................................................................536
Networks and Neighbors............................................................................................................ 537
Router Types................................................................................................................................537
Designated and Backup Designated Routers............................................................................ 539
Link-State Advertisements (LSAs)............................................................................................... 539
Router Priority and Cost..............................................................................................................541
OSPF with Dell Networking OS........................................................................................................ 541
Graceful Restart.......................................................................................................................... 542
Fast Convergence (OSPFv2, IPv4 Only)..................................................................................... 543
Multi-Process OSPFv2 (IPv4 only)..............................................................................................543
RFC-2328 Compliant OSPF Flooding........................................................................................ 544
OSPF ACK Packing...................................................................................................................... 545
Setting OSPF Adjacency with Cisco Routers............................................................................. 545
Configuration Information............................................................................................................... 546
Configuration Task List for OSPFv2 (OSPF for IPv4)..................................................................546
Sample Configurations for OSPFv2..................................................................................................561
Basic OSPFv2 Router Topology..................................................................................................561
OSPF Area 0 — Gl 1/1 and 1/2.....................................................................................................561
OSPF Area 0 — Gl 3/1 and 3/2....................................................................................................562
OSPF Area 0 — Gl 2/1 and 2/2....................................................................................................562
Configuration Task List for OSPFv3 (OSPF for IPv6)........................................................................562
Enabling IPv6 Unicast Routing................................................................................................... 563
Assigning IPv6 Addresses on an Interface................................................................................. 563
Assigning Area ID on an Interface.............................................................................................. 563
Assigning OSPFv3 Process ID and Router ID Globally.............................................................. 564
Configuring Stub Areas...............................................................................................................564
Configuring Passive-Interface....................................................................................................565
Redistributing Routes..................................................................................................................565
Configuring a Default Route...................................................................................................... 566
Enabling OSPFv3 Graceful Restart............................................................................................. 566
OSPFv3 Authentication Using IPsec...........................................................................................568
Troubleshooting OSPFv3............................................................................................................576
32 Policy-based Routing (PBR)......................................................................... 578
Overview............................................................................................................................................578
Implementing Policy-based Routing with Dell Networking OS.....................................................580
Configuration Task List for Policy-based Routing.......................................................................... 580
PBR Exceptions (Permit)............................................................................................................. 583
Sample Configuration.......................................................................................................................585
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View
Redirect-List GOLD.....................................................................................................................586
33 PIM Sparse-Mode (PIM-SM)......................................................................... 588
Implementation Information............................................................................................................588
Protocol Overview............................................................................................................................588
Requesting Multicast Traffic.......................................................................................................588
Refuse Multicast Traffic.............................................................................................................. 589
Send Multicast Traffic................................................................................................................. 589
Configuring PIM-SM.........................................................................................................................590
Related Configuration Tasks...................................................................................................... 590
Enable PIM-SM................................................................................................................................. 590
Configuring S,G Expiry Timers..........................................................................................................591
Configuring a Static Rendezvous Point........................................................................................... 592
Overriding Bootstrap Router Updates........................................................................................593
Configuring a Designated Router.................................................................................................... 593
Creating Multicast Boundaries and Domains.................................................................................. 594
Enabling PIM-SM Graceful Restart...................................................................................................594
34 PIM Source-Specific Mode (PIM-SSM).......................................................595
Implementation Information............................................................................................................595
Important Points to Remember..................................................................................................595
Configure PIM-SMM.........................................................................................................................596
Related Configuration Tasks...................................................................................................... 596
Enabling PIM-SSM............................................................................................................................ 596
Use PIM-SSM with IGMP Version 2 Hosts....................................................................................... 596
Configuring PIM-SSM with IGMPv2............................................................................................597
35 Port Monitoring..............................................................................................599
Important Points to Remember....................................................................................................... 599
Port Monitoring................................................................................................................................ 600
Configuring Port Monitoring............................................................................................................ 601
Enabling Flow-Based Monitoring.................................................................................................... 603
Remote Port Mirroring..................................................................................................................... 604
Remote Port Mirroring Example................................................................................................ 604
Configuring Remote Port Mirroring...........................................................................................605
Displaying Remote-Port Mirroring Configurations................................................................... 607
Configuring the Sample Remote Port Mirroring....................................................................... 607
Configuring the Encapsulated Remote Port Mirroring.................................................................... 611
Configuration steps for ERPM ....................................................................................................611
ERPM Behavior on a typical Dell Networking OS ........................................................................... 613
Decapsulation of ERPM packets at the Destination IP/ Analyzer..............................................613
36 Private VLANs (PVLAN).................................................................................. 615
Private VLAN Concepts.....................................................................................................................615
Using the Private VLAN Commands.................................................................................................616
Configuration Task List......................................................................................................................617
Creating PVLAN ports..................................................................................................................617
Creating a Primary VLAN.............................................................................................................618
Creating a Community VLAN..................................................................................................... 619
Creating an Isolated VLAN..........................................................................................................620
Private VLAN Configuration Example...............................................................................................621
Inspecting the Private VLAN Configuration.....................................................................................622
37 Per-VLAN Spanning Tree Plus (PVST+)...................................................... 625
Protocol Overview............................................................................................................................625
Implementation Information............................................................................................................626
Configure Per-VLAN Spanning Tree Plus........................................................................................ 626
Related Configuration Tasks...................................................................................................... 626
Enabling PVST+.................................................................................................................................626
Disabling PVST+................................................................................................................................627
Influencing PVST+ Root Selection................................................................................................... 627
Modifying Global PVST+ Parameters...............................................................................................629
Modifying Interface PVST+ Parameters...........................................................................................630
Configuring an EdgePort.................................................................................................................. 631
PVST+ in Multi-Vendor Networks....................................................................................................632
Enabling PVST+ Extend System ID...................................................................................................632
PVST+ Sample Configurations......................................................................................................... 633
38 Quality of Service (QoS)................................................................................635
Implementation Information............................................................................................................ 637
Port-Based QoS Configurations.......................................................................................................637
Setting dot1p Priorities for Incoming Traffic..............................................................................638
Honoring dot1p Priorities on Ingress Traffic..............................................................................638
Configuring Port-Based Rate Policing.......................................................................................639
Configuring Port-Based Rate Shaping.......................................................................................639
Policy-Based QoS Configurations...................................................................................................640
Classify Traffic............................................................................................................................. 641
Create a QoS Policy....................................................................................................................644
Create Policy Maps..................................................................................................................... 646
Enabling QoS Rate Adjustment........................................................................................................ 652
Enabling Strict-Priority Queueing.................................................................................................... 653
Weighted Random Early Detection..................................................................................................653
Creating WRED Profiles.............................................................................................................. 654
Applying a WRED Profile to Traffic.............................................................................................654
Displaying Default and Configured WRED Profiles................................................................... 655
Displaying WRED Drop Statistics................................................................................................655
Pre-Calculating Available QoS CAM Space..................................................................................... 655
Configuring Weights and ECN for WRED .......................................................................................656
Global Service Pools With WRED and ECN Settings..................................................................657
Configuring WRED and ECN Attributes........................................................................................... 658
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................660
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class......... 660
Classifying Incoming Packets Using ECN and Color-Marking..................................................661
Sample configuration to mark non-ecn packets as “yellow” with single traffic class............. 663
Applying Layer 2 Match Criteria on a Layer 3 Interface..................................................................664
Applying DSCP and VLAN Match Criteria on a Service Queue.......................................................665
39 Routing Information Protocol (RIP)........................................................... 666
Protocol Overview............................................................................................................................666
RIPv1............................................................................................................................................666
RIPv2............................................................................................................................................666
Implementation Information............................................................................................................667
Configuration Information............................................................................................................... 667
Configuration Task List............................................................................................................... 667
RIP Configuration Example.........................................................................................................674
40 Remote Monitoring (RMON)....................................................................... 680
Implementation Information........................................................................................................... 680
Fault Recovery.................................................................................................................................. 680
Setting the rmon Alarm...............................................................................................................681
Configuring an RMON Event......................................................................................................682
Configuring RMON Collection Statistics................................................................................... 682
Configuring the RMON Collection History................................................................................683
41 Rapid Spanning Tree Protocol (RSTP)........................................................684
Protocol Overview............................................................................................................................684
Configuring Rapid Spanning Tree....................................................................................................684
Related Configuration Tasks...................................................................................................... 684
Important Points to Remember....................................................................................................... 685
RSTP and VLT..............................................................................................................................685
Configuring Interfaces for Layer 2 Mode.........................................................................................685
Enabling Rapid Spanning Tree Protocol Globally........................................................................... 686
Adding and Removing Interfaces.....................................................................................................688
Modifying Global Parameters...........................................................................................................689
Enabling SNMP Traps for Root Elections and Topology Changes...........................................690
Modifying Interface Parameters.......................................................................................................690
Enabling SNMP Traps for Root Elections and Topology Changes................................................. 691
Influencing RSTP Root Selection......................................................................................................691
Configuring an EdgePort.................................................................................................................. 691
Configuring Fast Hellos for Link State Detection............................................................................692
42 Software-Defined Networking (SDN)........................................................ 694
43 Security............................................................................................................ 695
AAA Accounting................................................................................................................................695
Configuration Task List for AAA Accounting............................................................................. 695
AAA Authentication...........................................................................................................................697
Configuration Task List for AAA Authentication........................................................................698
AAA Authorization.............................................................................................................................700
Privilege Levels Overview........................................................................................................... 700
Configuration Task List for Privilege Levels................................................................................701
RADIUS.............................................................................................................................................. 706
RADIUS Authentication...............................................................................................................706
Configuration Task List for RADIUS............................................................................................707
TACACS+...........................................................................................................................................710
Configuration Task List for TACACS+........................................................................................ 710
TACACS+ Remote Authentication..............................................................................................712
Command Authorization.............................................................................................................713
Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................713
Enabling SCP and SSH.......................................................................................................................713
Using SCP with SSH to Copy a Software Image.........................................................................714
Removing the RSA Host Keys and Zeroizing Storage ............................................................... 715
Configuring When to Re-generate an SSH Key .........................................................................715
Configuring the SSH Server Key Exchange Algorithm............................................................... 716
Configuring the HMAC Algorithm for the SSH Server................................................................717
Configuring the SSH Server Cipher List...................................................................................... 717
Secure Shell Authentication........................................................................................................718
Troubleshooting SSH...................................................................................................................721
Telnet................................................................................................................................................. 721
VTY Line and Access-Class Configuration....................................................................................... 721
VTY Line Local Authentication and Authorization..................................................................... 722
VTY Line Remote Authentication and Authorization.................................................................722
VTY MAC-SA Filter Support.........................................................................................................723
Role-Based Access Control..............................................................................................................723
Overview of RBAC.......................................................................................................................724
User Roles....................................................................................................................................726
AAA Authentication and Authorization for Roles.......................................................................730
Role Accounting..........................................................................................................................733
Display Information About User Roles....................................................................................... 734
44 Service Provider Bridging.............................................................................736
VLAN Stacking...................................................................................................................................736
Important Points to Remember..................................................................................................737
Configure VLAN Stacking............................................................................................................738
Creating Access and Trunk Ports............................................................................................... 738
Enable VLAN-Stacking for a VLAN..............................................................................................739
Configuring the Protocol Type Value for the Outer VLAN Tag.................................................739
Configuring Dell Networking OS Options for Trunk Ports........................................................739
Debugging VLAN Stacking..........................................................................................................740
VLAN Stacking in Multi-Vendor Networks..................................................................................741
VLAN Stacking Packet Drop Precedence.........................................................................................744
Enabling Drop Eligibility..............................................................................................................744
Honoring the Incoming DEI Value............................................................................................. 745
Marking Egress Packets with a DEI Value...................................................................................746
Dynamic Mode CoS for VLAN Stacking........................................................................................... 746
Mapping C-Tag to S-Tag dot1p Values......................................................................................748
Layer 2 Protocol Tunneling..............................................................................................................748
Implementation Information...................................................................................................... 750
Enabling Layer 2 Protocol Tunneling..........................................................................................751
Specifying a Destination MAC Address for BPDUs.....................................................................751
Setting Rate-Limit BPDUs............................................................................................................751
Debugging Layer 2 Protocol Tunneling..................................................................................... 752
Provider Backbone Bridging............................................................................................................. 752
45 sFlow.................................................................................................................753
Overview............................................................................................................................................753
Implementation Information............................................................................................................ 753
Important Points to Remember..................................................................................................754
Enabling Extended sFlow..................................................................................................................754
Enabling and Disabling sFlow on an Interface.................................................................................755
sFlow Show Commands................................................................................................................... 755
Displaying Show sFlow Global....................................................................................................755
Displaying Show sFlow on an Interface..................................................................................... 756
Displaying Show sFlow on a Stack-unit..................................................................................... 756
Configuring Specify Collectors.........................................................................................................757
Changing the Polling Intervals..........................................................................................................757
Back-Off Mechanism........................................................................................................................ 757
sFlow on LAG ports...........................................................................................................................758
Enabling Extended sFlow..................................................................................................................758
Important Points to Remember..................................................................................................759
46 Simple Network Management Protocol (SNMP)......................................761
Protocol Overview.............................................................................................................................761
Implementation Information............................................................................................................ 761
SNMPv3 Compliance With FIPS........................................................................................................761
Configuration Task List for SNMP.................................................................................................... 763
Related Configuration Tasks.......................................................................................................763
Important Points to Remember....................................................................................................... 763
Set up SNMP......................................................................................................................................763
Creating a Community............................................................................................................... 764
Setting Up User-Based Security (SNMPv3)................................................................................ 764
Reading Managed Object Values..................................................................................................... 765
Writing Managed Object Values.......................................................................................................766
Configuring Contact and Location Information using SNMP.........................................................767
Subscribing to Managed Object Value Updates using SNMP.........................................................768
Enabling a Subset of SNMP Traps.................................................................................................... 769
Copy Configuration Files Using SNMP............................................................................................. 771
Copying a Configuration File...................................................................................................... 773
Copying Configuration Files via SNMP.......................................................................................773
Copying the Startup-Config Files to the Running-Config........................................................ 774
Copying the Startup-Config Files to the Server via FTP............................................................ 774
Copying the Startup-Config Files to the Server via TFTP.......................................................... 775
Copy a Binary File to the Startup-Configuration....................................................................... 775
Additional MIB Objects to View Copy Statistics.........................................................................776
Obtaining a Value for MIB Objects............................................................................................. 776
Manage VLANs using SNMP..............................................................................................................777
Creating a VLAN...........................................................................................................................777
Assigning a VLAN Alias.................................................................................................................777
Displaying the Ports in a VLAN....................................................................................................778
Add Tagged and Untagged Ports to a VLAN..............................................................................778
Managing Overload on Startup........................................................................................................ 779
Enabling and Disabling a Port using SNMP......................................................................................779
Fetch Dynamic MAC Entries using SNMP........................................................................................780
Deriving Interface Indices.................................................................................................................782
Monitor Port-Channels.....................................................................................................................783
Troubleshooting SNMP Operation...................................................................................................784
47 Storm Control................................................................................................. 785
Configure Storm Control..................................................................................................................785
Configuring Storm Control from INTERFACE Mode................................................................. 785
Configuring Storm Control from CONFIGURATION Mode...................................................... 785
48 Spanning Tree Protocol (STP)..................................................................... 786
Protocol Overview............................................................................................................................786
Configure Spanning Tree................................................................................................................. 786
Related Configuration Tasks.......................................................................................................786
Important Points to Remember........................................................................................................787
Configuring Interfaces for Layer 2 Mode.........................................................................................787
Enabling Spanning Tree Protocol Globally......................................................................................788
Adding an Interface to the Spanning Tree Group........................................................................... 790
Modifying Global Parameters........................................................................................................... 791
Modifying Interface STP Parameters................................................................................................792
Enabling PortFast.............................................................................................................................. 792
Prevent Network Disruptions with BPDU Guard....................................................................... 793
Selecting STP Root............................................................................................................................795
STP Root Guard.................................................................................................................................796
Root Guard Scenario...................................................................................................................796
Configuring Root Guard............................................................................................................. 797
Enabling SNMP Traps for Root Elections and Topology Changes................................................. 798
Configuring Spanning Trees as Hitless............................................................................................ 798
STP Loop Guard................................................................................................................................799
Configuring Loop Guard............................................................................................................ 800
Displaying STP Guard Configuration................................................................................................801
49 System Time and Date.................................................................................. 802
Network Time Protocol....................................................................................................................802
Protocol Overview......................................................................................................................803
Configure the Network Time Protocol......................................................................................804
Enabling NTP.............................................................................................................................. 804
Setting the Hardware Clock with the Time Derived from NTP................................................ 804
Configuring NTP Broadcasts......................................................................................................805
Disabling NTP on an Interface................................................................................................... 805
Configuring a Source IP Address for NTP Packets....................................................................805
Configuring NTP Authentication................................................................................................806
Dell Networking OS Time and Date................................................................................................ 809
Configuration Task List ..............................................................................................................809
Setting the Time and Date for the Switch Hardware Clock......................................................809
Setting the Time and Date for the Switch Software Clock.......................................................809
Setting the Timezone..................................................................................................................810
Set Daylight Saving Time............................................................................................................ 810
Setting Daylight Saving Time Once............................................................................................810
Setting Recurring Daylight Saving Time......................................................................................811
50 Tunneling ........................................................................................................813
Configuring a Tunnel........................................................................................................................ 813
Configuring Tunnel Keepalive Settings............................................................................................ 814
Configuring a Tunnel Interface........................................................................................................ 815
Configuring Tunnel allow-remote Decapsulation...........................................................................815
Configuring Tunnel source anylocal Decapsulation.......................................................................816
Guidelines for Configuring Multipoint Receive-Only Tunnels........................................................816
Multipoint Receive-Only Type and IP Unnumbered Interfaces for Tunnels.................................. 817
51 Upgrade Procedures...................................................................................... 818
Get Help with Upgrades................................................................................................................... 818
52 Virtual LANs (VLANs)......................................................................................819
Default VLAN..................................................................................................................................... 819
Port-Based VLANs............................................................................................................................ 820
VLANs and Port Tagging.................................................................................................................. 820
Configuration Task List..................................................................................................................... 821
Creating a Port-Based VLAN.......................................................................................................821
Assigning Interfaces to a VLAN...................................................................................................822
Moving Untagged Interfaces...................................................................................................... 823
Assigning an IP Address to a VLAN.............................................................................................825
Configuring Native VLANs................................................................................................................825
Enabling Null VLAN as the Default VLAN.........................................................................................826
53 Virtual Link Trunking (VLT)...........................................................................827
Overview............................................................................................................................................827
VLT on Core Switches................................................................................................................ 828
Enhanced VLT............................................................................................................................. 828
VLT Terminology.............................................................................................................................. 829
Configure Virtual Link Trunking....................................................................................................... 830
Important Points to Remember................................................................................................. 830
Configuration Notes....................................................................................................................831
Primary and Secondary VLT Peers............................................................................................. 834
RSTP and VLT.............................................................................................................................. 835
VLT Bandwidth Monitoring.........................................................................................................835
VLT and IGMP Snooping.............................................................................................................836
VLT IPv6.......................................................................................................................................836
VLT Port Delayed Restoration.................................................................................................... 836
PIM-Sparse Mode Support on VLT.............................................................................................836
VLT Routing ................................................................................................................................838
Non-VLT ARP Sync.....................................................................................................................840
RSTP Configuration...........................................................................................................................841
Preventing Forwarding Loops in a VLT Domain........................................................................ 841
Sample RSTP Configuration........................................................................................................841
Configuring VLT..........................................................................................................................842
eVLT Configuration Example............................................................................................................853
eVLT Configuration Step Examples............................................................................................854
PIM-Sparse Mode Configuration Example...................................................................................... 856
Verifying a VLT Configuration.......................................................................................................... 857
Additional VLT Sample Configurations............................................................................................860
Configuring Virtual Link Trunking (VLT Peer 1)Configuring Virtual Link Trunking (VLT Peer
2)Verifying a Port-Channel Connection to a VLT Domain (From an Attached Access
Switch)......................................................................................................................................... 861
Troubleshooting VLT........................................................................................................................863
Reconfiguring Stacked Switches as VLT..........................................................................................864
Specifying VLT Nodes in a PVLAN....................................................................................................865
Association of VLTi as a Member of a PVLAN............................................................................866
MAC Synchronization for VLT Nodes in a PVLAN..................................................................... 866
PVLAN Operations When One VLT Peer is Down..................................................................... 866
PVLAN Operations When a VLT Peer is Restarted.....................................................................867
Interoperation of VLT Nodes in a PVLAN with ARP Requests...................................................867
Scenarios for VLAN Membership and MAC Synchronization With VLT Nodes in PVLAN........867
Configuring a VLT VLAN or LAG in a PVLAN................................................................................... 869
Creating a VLT LAG or a VLT VLAN............................................................................................869
Associating the VLT LAG or VLT VLAN in a PVLAN....................................................................870
Proxy ARP Capability on VLT Peer Nodes........................................................................................ 871
Working of Proxy ARP for VLT Peer Nodes................................................................................872
VLT Nodes as Rendezvous Points for Multicast Resiliency.............................................................873
54 VLT Proxy Gateway........................................................................................874
Proxy Gateway in VLT Domains....................................................................................................... 874
LLDP organizational TLV for proxy gateway..............................................................................876
Sample Configuration Scenario for VLT Proxy Gateway...........................................................877
Configuring an LLDP VLT Proxy Gateway....................................................................................... 879
55 Virtual Router Redundancy Protocol (VRRP)........................................... 880
VRRP Overview.................................................................................................................................880
VRRP Benefits....................................................................................................................................881
VRRP Implementation.......................................................................................................................881
VRRP Configuration..........................................................................................................................882
Configuration Task List...............................................................................................................882
Setting VRRP Initialization Delay................................................................................................ 892
Sample Configurations.....................................................................................................................893
VRRP for an IPv4 Configuration................................................................................................. 893
VRRP in a VRF Configuration......................................................................................................898
56 Z-Series Debugging and Diagnostics.........................................................904
Offline Diagnostics........................................................................................................................... 904
Important Points to Remember................................................................................................. 904
Running Offline Diagnostics...................................................................................................... 904
TRACE Logs...................................................................................................................................... 908
Auto Save on Crash or Rollover.................................................................................................908
Last Restart Reason.......................................................................................................................... 909
Line Card Restart Causes and Reasons..................................................................................... 909
Hardware Watchdog Timer..............................................................................................................909
show hardware Commands.............................................................................................................909
Environmental Monitoring................................................................................................................912
......................................................................................................................................................912
Recognize an Over-Temperature Condition.............................................................................912
Troubleshoot an Over-Temperature Condition........................................................................ 912
Recognize an Under-Voltage Condition....................................................................................913
Troubleshoot an Under-Voltage Condition...............................................................................913
Buffer Tuning.....................................................................................................................................914
Buffer Tuning Points....................................................................................................................915
Decide to Tune Buffers............................................................................................................... 915
Using the Buffer Tuning Commands..........................................................................................915
Sample Buffer Profile Configuration.......................................................................................... 918
Troubleshooting Packet Loss........................................................................................................... 918
Displaying Drop Counters...........................................................................................................919
Displaying Dataplane Statistics................................................................................................... 919
Displaying Stack Member Counters........................................................................................... 921
Enabling Application Core Dumps................................................................................................... 921
Mini Core Dumps..............................................................................................................................922
Enabling TCP Dumps........................................................................................................................922
57 Standards Compliance..................................................................................924
IEEE Compliance.............................................................................................................................. 924
RFC and I-D Compliance................................................................................................................. 925
General Internet Protocols......................................................................................................... 925
General IPv4 Protocols...............................................................................................................926
General IPv6 Protocols............................................................................................................... 927
Border Gateway Protocol (BGP).................................................................................................927
Open Shortest Path First (OSPF).................................................................................................928
Intermediate System to Intermediate System (IS-IS).................................................................929
Routing Information Protocol (RIP)........................................................................................... 929
Multicast......................................................................................................................................930
Network Management................................................................................................................930
MIB Location..................................................................................................................................... 937