Dell Networking Configuration Guide for the MXL 10/40GbE Switch I/O Module
9.8(0.0)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2015 - 05
Rev. A00
Contents |
|
1 About this Guide................................................................................................. |
33 |
Audience.............................................................................................................................................. |
33 |
Conventions........................................................................................................................................ |
33 |
Information Symbols........................................................................................................................... |
34 |
Related Documents............................................................................................................................ |
34 |
2 Configuration Fundamentals........................................................................... |
35 |
Accessing the Command Line............................................................................................................ |
35 |
CLI Modes............................................................................................................................................ |
35 |
Navigating CLI Modes................................................................................................................... |
37 |
The do Command............................................................................................................................... |
40 |
Undoing Commands.......................................................................................................................... |
40 |
Obtaining Help.................................................................................................................................... |
41 |
Entering and Editing Commands....................................................................................................... |
42 |
Command History............................................................................................................................... |
43 |
Filtering show Command Outputs..................................................................................................... |
43 |
Multiple Users in Configuration Mode............................................................................................... |
44 |
3 Getting Started.................................................................................................... |
46 |
Console Access................................................................................................................................... |
47 |
Serial Console................................................................................................................................ |
47 |
External Serial Port with a USB Connector.................................................................................. |
49 |
Accessing the CLI Interface and Running Scripts Using SSH............................................................ |
49 |
Entering CLI commands Using an SSH Connection................................................................... |
49 |
Executing Local CLI Scripts Using an SSH Connection............................................................... |
49 |
Boot Process....................................................................................................................................... |
50 |
Default Configuration......................................................................................................................... |
52 |
Configuring a Host Name................................................................................................................... |
52 |
Configuring a Host Name................................................................................................................... |
52 |
Accessing the System Remotely......................................................................................................... |
53 |
Accessing the MXL Switch Remotely............................................................................................ |
53 |
Configure the Management Port IP Address............................................................................... |
53 |
Configure a Management Route.................................................................................................. |
53 |
Configuring a Username and Password....................................................................................... |
54 |
Configuring the Enable Password...................................................................................................... |
54 |
Configuration File Management......................................................................................................... |
55 |
Copy Files to and from the System.............................................................................................. |
55 |
Save the Running-Configuration.................................................................................................. |
56 |
3
Viewing Files.................................................................................................................................. |
57 |
Managing the File System................................................................................................................... |
58 |
View the Command History............................................................................................................... |
59 |
Using HTTP for File Transfers............................................................................................................. |
60 |
Upgrading and Downgrading the Dell Networking OS..................................................................... |
60 |
Using Hashes to Validate Software Images....................................................................................... |
60 |
4 Management....................................................................................................... |
62 |
Configuring Privilege Levels............................................................................................................... |
62 |
Creating a Custom Privilege Level................................................................................................ |
62 |
Customizing a Privilege Level....................................................................................................... |
63 |
Applying a Privilege Level to a Username.................................................................................... |
64 |
Applying a Privilege Level to a Terminal Line............................................................................... |
65 |
Configuring Logging........................................................................................................................... |
65 |
Audit and Security Logs................................................................................................................. |
65 |
Configuring Logging Format ....................................................................................................... |
67 |
Setting Up a Secure Connection to a Syslog Server.................................................................... |
68 |
Display the Logging Buffer and the Logging Configuration............................................................. |
69 |
Log Messages in the Internal Buffer................................................................................................... |
70 |
Configuration Task List for System Log Management................................................................. |
70 |
Disabling System Logging................................................................................................................... |
70 |
Sending System Messages to a Syslog Server.................................................................................... |
70 |
Configuring a UNIX System as a Syslog Server............................................................................. |
71 |
Changing System Logging Settings.................................................................................................... |
71 |
Display the Logging Buffer and the Logging Configuration.............................................................. |
72 |
Configuring a UNIX Logging Facility Level......................................................................................... |
73 |
Synchronizing Log Messages.............................................................................................................. |
74 |
Enabling Timestamp on Syslog Messages.......................................................................................... |
74 |
File Transfer Services........................................................................................................................... |
75 |
Configuration Task List for File Transfer Services........................................................................ |
75 |
Enabling the FTP Server................................................................................................................. |
75 |
Configuring FTP Server Parameters.............................................................................................. |
76 |
Configuring FTP Client Parameters.............................................................................................. |
76 |
Terminal Lines...................................................................................................................................... |
77 |
Denying and Permitting Access to a Terminal Line..................................................................... |
77 |
Configuring Login Authentication for Terminal Lines................................................................. |
78 |
Setting Time Out of EXEC Privilege Mode......................................................................................... |
79 |
Using Telnet to get to Another Network Device............................................................................... |
79 |
Lock CONFIGURATION Mode........................................................................................................... |
80 |
Viewing the Configuration Lock Status........................................................................................ |
80 |
Limit Concurrent Login Sessions........................................................................................................ |
81 |
Restrictions for Limiting the Number of Concurrent Sessions.................................................... |
81 |
4
Configuring Concurrent Session Limit......................................................................................... |
81 |
Enabling the System to Clear Existing Sessions........................................................................... |
82 |
Track Login Activity............................................................................................................................. |
83 |
Restrictions for Tracking Login Activity........................................................................................ |
83 |
Configuring Login Activity Tracking............................................................................................. |
83 |
Display Login Statistics.................................................................................................................. |
84 |
Recovering from a Forgotten Password............................................................................................ |
85 |
Recovering from a Forgotten Enable Password................................................................................ |
86 |
Recovering from a Failed Start........................................................................................................... |
86 |
5 802.1X................................................................................................................... |
88 |
The Port-Authentication Process....................................................................................................... |
90 |
EAP over RADIUS........................................................................................................................... |
92 |
Configuring 802.1X............................................................................................................................. |
92 |
Related Configuration Tasks......................................................................................................... |
92 |
Important Points to Remember.......................................................................................................... |
93 |
Enabling 802.1X................................................................................................................................... |
93 |
Configuring Request Identity Re-Transmissions......................................................................... |
95 |
Configuring a Quiet Period after a Failed Authentication........................................................... |
95 |
Forcibly Authorizing or Unauthorizing a Port.................................................................................... |
96 |
Re-Authenticating a Port.................................................................................................................... |
97 |
Configuring Timeouts......................................................................................................................... |
98 |
Configuring Dynamic VLAN Assignment with Port Authentication.................................................. |
99 |
Guest and Authentication-Fail VLANs........................................................................................ |
100 |
Configuring a Guest VLAN.......................................................................................................... |
101 |
Configuring an Authentication-Fail VLAN.................................................................................. |
101 |
6 Access Control List (ACL) VLAN Groups and Content Addressable |
|
Memory (CAM)...................................................................................................... |
103 |
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................... |
103 |
Guidelines for Configuring ACL VLAN groups................................................................................. |
104 |
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters........................ |
105 |
Configuring ACL VLAN Groups................................................................................................... |
105 |
Configuring FP Blocks for VLAN Parameters............................................................................. |
106 |
Viewing CAM Usage.......................................................................................................................... |
107 |
Allocating FP Blocks for VLAN Processes........................................................................................ |
108 |
7 Access Control Lists (ACLs)............................................................................. |
110 |
IP Access Control Lists (ACLs)........................................................................................................... |
110 |
Implementing ACL on the Dell Networking OS................................................................................ |
111 |
ACLs and VLANs................................................................................................................................. |
111 |
ACL Optimization............................................................................................................................... |
111 |
5
Determine the Order in which ACLs are Used to Classify Traffic.................................................... |
111 |
Example of the order Keyword to Determine ACL Sequence................................................... |
112 |
IP Fragment Handling........................................................................................................................ |
112 |
IP Fragments ACL Examples.............................................................................................................. |
113 |
Layer 4 ACL Rules Examples............................................................................................................. |
113 |
Configure a Standard IP ACL............................................................................................................. |
114 |
Configuring a Standard IP ACL Filter................................................................................................. |
115 |
Configure an Extended IP ACL.......................................................................................................... |
116 |
Configuring Filters with a Sequence Number.................................................................................. |
116 |
Configuring Filters Without a Sequence Number............................................................................ |
117 |
Established Flag................................................................................................................................. |
118 |
Configure Layer 2 and Layer 3 ACLs................................................................................................. |
118 |
Assign an IP ACL to an Interface....................................................................................................... |
119 |
Applying an IP ACL............................................................................................................................ |
119 |
Counting ACL Hits............................................................................................................................. |
120 |
Configure Ingress ACLs.................................................................................................................... |
120 |
Configure Egress ACLs...................................................................................................................... |
121 |
Applying Egress Layer 3 ACLs (Control-Plane)................................................................................. |
121 |
IP Prefix Lists...................................................................................................................................... |
122 |
Implementation Information....................................................................................................... |
123 |
Configuration Task List for Prefix Lists............................................................................................. |
123 |
Creating a Prefix List.......................................................................................................................... |
123 |
Creating a Prefix List Without a Sequence Number........................................................................ |
124 |
Viewing Prefix Lists............................................................................................................................ |
125 |
Applying a Prefix List for Route Redistribution................................................................................. |
125 |
Applying a Filter to a Prefix List (OSPF)............................................................................................. |
126 |
ACL Resequencing............................................................................................................................ |
127 |
Resequencing an ACL or Prefix List.................................................................................................. |
127 |
Route Maps........................................................................................................................................ |
129 |
Implementation Information...................................................................................................... |
129 |
Important Points to Remember........................................................................................................ |
129 |
Configuration Task List for Route Maps........................................................................................... |
130 |
Creating a Route Map....................................................................................................................... |
130 |
Configure Route Map Filters............................................................................................................. |
131 |
Configuring Match Routes................................................................................................................ |
132 |
Configuring Set Conditions.............................................................................................................. |
133 |
Configure a Route Map for Route Redistribution............................................................................ |
134 |
Configure a Route Map for Route Tagging...................................................................................... |
135 |
Continue Clause................................................................................................................................ |
135 |
Logging of ACL Processes................................................................................................................ |
136 |
Guidelines for Configuring ACL Logging.......................................................................................... |
137 |
Configuring ACL Logging.................................................................................................................. |
137 |
6
Flow-Based Monitoring Support for ACLs....................................................................................... |
138 |
Behavior of Flow-Based Monitoring........................................................................................... |
138 |
Enabling Flow-Based Monitoring..................................................................................................... |
140 |
8 Bidirectional Forwarding Detection (BFD).................................................. |
142 |
How BFD Works................................................................................................................................ |
142 |
BFD Packet Format...................................................................................................................... |
143 |
BFD Sessions................................................................................................................................ |
145 |
BFD Three-Way Handshake........................................................................................................ |
145 |
Session State Changes................................................................................................................ |
146 |
Important Points to Remember........................................................................................................ |
147 |
Configure BFD................................................................................................................................... |
148 |
Configure BFD for Physical Ports............................................................................................... |
148 |
Enabling BFD Globally................................................................................................................. |
148 |
Establishing a Session on Physical Ports.................................................................................... |
149 |
Changing Physical Port Session Parameters.............................................................................. |
150 |
Disabling and Re-Enabling BFD.................................................................................................. |
151 |
Configure BFD for Static Routes....................................................................................................... |
152 |
Related Configuration Tasks....................................................................................................... |
152 |
Establishing Sessions for Static Routes....................................................................................... |
152 |
Changing Static Route Session Parameters............................................................................... |
153 |
Disabling BFD for Static Routes.................................................................................................. |
153 |
Configure BFD for OSPF................................................................................................................... |
154 |
Related Configuration Tasks....................................................................................................... |
154 |
Establishing Sessions with OSPF Neighbors............................................................................... |
155 |
Changing OSPF Session Parameters.......................................................................................... |
156 |
Disabling BFD for OSPF............................................................................................................... |
157 |
Configure BFD for OSPFv3................................................................................................................ |
157 |
Related Configuration Tasks....................................................................................................... |
157 |
Establishing Sessions with OSPFv3 Neighbors........................................................................... |
157 |
Changing OSPFv3 Session Parameters...................................................................................... |
158 |
Disabling BFD for OSPFv3........................................................................................................... |
158 |
Configure BFD for BGP..................................................................................................................... |
159 |
Prerequisites................................................................................................................................ |
159 |
Establishing Sessions with BGP Neighbors................................................................................ |
159 |
Disabling BFD for BGP................................................................................................................. |
161 |
Use BFD in a BGP Peer Group.................................................................................................... |
162 |
Displaying BFD for BGP Information.......................................................................................... |
162 |
Configure BFD for VRRP................................................................................................................... |
166 |
Related Configuration Tasks....................................................................................................... |
167 |
Establishing Sessions with All VRRP Neighbors.......................................................................... |
167 |
Establishing VRRP Sessions on VRRP Neighbors....................................................................... |
167 |
7
Changing VRRP Session Parameters.......................................................................................... |
168 |
Disabling BFD for VRRP............................................................................................................... |
169 |
Configure BFD for VLANs................................................................................................................. |
169 |
Related Configuration Task......................................................................................................... |
170 |
Establish Sessions with VLAN Neighbors.................................................................................... |
170 |
Changing VLAN Session Parameters........................................................................................... |
171 |
Disabling BFD for VLANs.............................................................................................................. |
171 |
Configure BFD for Port-Channels..................................................................................................... |
171 |
Related Configuration Tasks....................................................................................................... |
172 |
Establish Sessions on Port-Channels.......................................................................................... |
172 |
Changing Physical Port Session Parameters.............................................................................. |
173 |
Disabling BFD for Port-Channels................................................................................................ |
173 |
Configuring Protocol Liveness.......................................................................................................... |
173 |
Troubleshooting BFD........................................................................................................................ |
174 |
9 Border Gateway Protocol IPv4 (BGPv4)....................................................... |
175 |
Autonomous Systems (AS)................................................................................................................ |
175 |
Sessions and Peers............................................................................................................................ |
177 |
Establish a Session....................................................................................................................... |
178 |
Route Reflectors................................................................................................................................ |
179 |
Communities............................................................................................................................... |
179 |
BGP Attributes................................................................................................................................... |
180 |
Best Path Selection Criteria........................................................................................................ |
180 |
Weight.......................................................................................................................................... |
182 |
Local Preference......................................................................................................................... |
182 |
Multi-Exit Discriminators (MEDs)................................................................................................ |
183 |
Origin........................................................................................................................................... |
184 |
AS Path......................................................................................................................................... |
185 |
Next Hop...................................................................................................................................... |
185 |
Multiprotocol BGP............................................................................................................................ |
186 |
Implement BGP with the Dell Networking OS................................................................................. |
186 |
Additional Path (Add-Path) Support........................................................................................... |
186 |
Advertise IGP Cost as MED for Redistributed Routes................................................................ |
186 |
Ignore Router-ID for Some Best-Path Calculations.................................................................. |
187 |
Four-Byte AS Numbers................................................................................................................ |
187 |
AS4 Number Representation...................................................................................................... |
188 |
AS Number Migration.................................................................................................................. |
190 |
BGP4 Management Information Base (MIB)............................................................................... |
191 |
Important Points to Remember.................................................................................................. |
191 |
Configuration Information................................................................................................................ |
192 |
BGP Configuration............................................................................................................................ |
193 |
Enabling BGP............................................................................................................................... |
194 |
8
Enabling MBGP Configurations.................................................................................................. |
227 |
BGP Regular Expression Optimization............................................................................................. |
228 |
Debugging BGP................................................................................................................................ |
228 |
Storing Last and Bad PDUs......................................................................................................... |
229 |
PDU Counters............................................................................................................................. |
230 |
Sample Configurations..................................................................................................................... |
230 |
10 Content Addressable Memory (CAM)......................................................... |
240 |
CAM Allocation................................................................................................................................. |
240 |
Test CAM Usage................................................................................................................................ |
241 |
View CAM-ACL Settings................................................................................................................... |
242 |
CAM Optimization............................................................................................................................ |
242 |
11 Control Plane Policing (CoPP)..................................................................... |
243 |
Configure Control Plane Policing.................................................................................................... |
244 |
Configuring CoPP for Protocols................................................................................................ |
245 |
Configuring CoPP for CPU Queues........................................................................................... |
247 |
Show Commands....................................................................................................................... |
248 |
12 Data Center Bridging (DCB)......................................................................... |
250 |
Ethernet Enhancements in Data Center Bridging........................................................................... |
250 |
Priority-Based Flow Control........................................................................................................ |
251 |
Enhanced Transmission Selection.............................................................................................. |
252 |
Data Center Bridging Exchange Protocol (DCBx)..................................................................... |
254 |
Data Center Bridging in a Traffic Flow....................................................................................... |
254 |
Enabling Data Center Bridging......................................................................................................... |
255 |
Configuring DCB Maps and its Attributes.................................................................................. |
256 |
Data Center Bridging: Default Configuration.................................................................................. |
259 |
Interworking of DCB Map With DCB Buffer Threshold Settings.................................................... |
260 |
Configuring Priority-Based Flow Control........................................................................................ |
261 |
Configuring Lossless Queues..................................................................................................... |
262 |
Configuring the PFC Buffer in a Switch Stack........................................................................... |
263 |
Priority-Based Flow Control Using Dynamic Buffer Method.................................................... |
264 |
Configure Enhanced Transmission Selection.................................................................................. |
265 |
ETS Prerequisites and Restrictions............................................................................................. |
266 |
Creating an ETS Priority Group.................................................................................................. |
266 |
ETS Operation with DCBx........................................................................................................... |
267 |
Configuring Bandwidth Allocation for DCBx CIN..................................................................... |
268 |
Hierarchical Scheduling in ETS Output Policies........................................................................ |
269 |
Applying DCB Policies with an ETS Configuration.......................................................................... |
269 |
PFC and ETS Configuration Examples............................................................................................. |
270 |
Using PFC and ETS to Manage Data Center Traffic................................................................... |
270 |
9
Using PFC and ETS to Manage Converged Ethernet Traffic in a Switch Stack |
........................ 272 |
Applying DCB Policies in a Switch Stack.......................................................................................... |
273 |
Configure a DCBx Operation............................................................................................................ |
273 |
DCBx Operation.......................................................................................................................... |
273 |
DCBx Port Roles.......................................................................................................................... |
274 |
DCB Configuration Exchange.................................................................................................... |
276 |
Configuration Source Election................................................................................................... |
276 |
Propagation of DCB Information............................................................................................... |
276 |
Auto-Detection and Manual Configuration of the DCBx Version............................................. |
277 |
DCBx Example............................................................................................................................. |
277 |
DCBx Prerequisites and Restrictions.......................................................................................... |
278 |
Configuring DCBx....................................................................................................................... |
279 |
Verifying the DCB Configuration..................................................................................................... |
283 |
QoS dot1p Traffic Classification and Queue Assignment............................................................... |
293 |
Configuring the Dynamic Buffer Method........................................................................................ |
294 |
13 Debugging and Diagnostics......................................................................... |
296 |
Offline Diagnostics........................................................................................................................... |
296 |
Important Points to Remember................................................................................................. |
296 |
Running Offline Diagnostics....................................................................................................... |
296 |
Trace Logs......................................................................................................................................... |
299 |
Auto Save on Crash or Rollover................................................................................................. |
299 |
Using the Show Hardware Commands........................................................................................... |
300 |
Enabling Environmental Monitoring................................................................................................. |
301 |
Recognize an Over-Temperature Condition............................................................................. |
303 |
Troubleshoot an Over-Temperature Condition........................................................................ |
303 |
Recognize an Under-Voltage Condition................................................................................... |
304 |
Troubleshoot an Under-Voltage Condition.............................................................................. |
304 |
Troubleshooting Packet Loss........................................................................................................... |
305 |
Displaying Drop Counters.......................................................................................................... |
305 |
Dataplane Statistics..................................................................................................................... |
306 |
Display Stack Port Statistics........................................................................................................ |
307 |
Displaying Stack Member Counters........................................................................................... |
307 |
Enabling Application Core Dumps................................................................................................... |
308 |
Mini Core Dumps.............................................................................................................................. |
308 |
Enabling TCP Dumps........................................................................................................................ |
309 |
Enabling Buffer Statistics Tracking .................................................................................................. |
310 |
14 Dynamic Host Configuration Protocol (DHCP)........................................ |
311 |
DHCP Packet Format and Options................................................................................................... |
311 |
Assign an IP Address using DHCP............................................................................................... |
313 |
Implementation Information............................................................................................................ |
314 |
10
Configure the System to be a DHCP Server.................................................................................... |
315 |
Configuring the Server for Automatic Address Allocation......................................................... |
315 |
Configuration Tasks.................................................................................................................... |
316 |
Specifying a Default Gateway..................................................................................................... |
317 |
Enabling the DHCP Server........................................................................................................... |
317 |
Configure a Method of Hostname Resolution........................................................................... |
318 |
Creating Manual Binding Entries................................................................................................. |
319 |
Debugging the DHCP Server...................................................................................................... |
319 |
Using DHCP Clear Commands................................................................................................... |
319 |
Configure the System to be a Relay Agent...................................................................................... |
320 |
Configure the System to be a DHCP Client..................................................................................... |
322 |
Configuring the DHCP Client System........................................................................................ |
322 |
DHCP Client on a Management Interface................................................................................. |
326 |
DHCP Client Operation with Other Features............................................................................. |
327 |
Configure Secure DHCP................................................................................................................... |
328 |
Option 82.................................................................................................................................... |
328 |
DHCP Snooping.......................................................................................................................... |
329 |
Drop DHCP Packets on Snooped VLANs Only.......................................................................... |
332 |
Dynamic ARP Inspection............................................................................................................ |
333 |
Configuring Dynamic ARP Inspection........................................................................................ |
334 |
Source Address Validation.......................................................................................................... |
335 |
15 Equal Cost Multi-Path (ECMP)...................................................................... |
337 |
ECMP for Flow-Based Affinity.......................................................................................................... |
337 |
Enabling Deterministic ECMP Next Hop.................................................................................... |
337 |
Link Bundle Monitoring.................................................................................................................... |
338 |
Managing ECMP Group Paths.......................................................................................................... |
338 |
16 FC FLEXIO FPORT........................................................................................... |
340 |
FC FLEXIO FPORT............................................................................................................................. |
340 |
Configuring Switch Mode to FCF Port Mode.................................................................................. |
340 |
Name Server...................................................................................................................................... |
341 |
FCoE Maps........................................................................................................................................ |
342 |
Creating an FCoE Map...................................................................................................................... |
342 |
Zoning............................................................................................................................................... |
344 |
Creating Zone and Adding Members............................................................................................... |
344 |
Creating Zone Alias and Adding Members...................................................................................... |
345 |
Creating Zonesets............................................................................................................................. |
345 |
Activating a Zoneset......................................................................................................................... |
346 |
Displaying the Fabric Parameters..................................................................................................... |
346 |
17 FCoE Transit.................................................................................................... |
349 |
11
Fibre Channel over Ethernet............................................................................................................ |
349 |
Ensure Robustness in a Converged Ethernet Network................................................................... |
349 |
FIP Snooping on Ethernet Bridges.................................................................................................... |
351 |
FIP Snooping in a Switch Stack........................................................................................................ |
354 |
Using FIP Snooping........................................................................................................................... |
354 |
Important Points to Remember................................................................................................. |
354 |
Enabling the FCoE Transit Feature............................................................................................. |
355 |
Enable FIP Snooping on VLANs.................................................................................................. |
355 |
Configure the FC-MAP Value..................................................................................................... |
355 |
Configure a Port for a Bridge-to-Bridge Link............................................................................ |
355 |
Configure a Port for a Bridge-to-FCF Link................................................................................ |
356 |
Impact on Other Software Features........................................................................................... |
356 |
FIP Snooping Prerequisites......................................................................................................... |
356 |
FIP Snooping Restrictions........................................................................................................... |
357 |
Configuring FIP Snooping........................................................................................................... |
357 |
Displaying FIP Snooping Information.............................................................................................. |
358 |
FCoE Transit Configuration Example............................................................................................... |
364 |
18 FIPS Cryptography......................................................................................... |
366 |
Preparing the System........................................................................................................................ |
366 |
Enabling FIPS Mode.......................................................................................................................... |
366 |
Generating Host-Keys...................................................................................................................... |
367 |
Monitoring FIPS Mode Status........................................................................................................... |
367 |
Disabling FIPS Mode......................................................................................................................... |
368 |
19 Force10 Resilient Ring Protocol (FRRP)..................................................... |
370 |
Protocol Overview............................................................................................................................ |
370 |
Ring Status................................................................................................................................... |
371 |
Multiple FRRP Rings..................................................................................................................... |
372 |
Important FRRP Points................................................................................................................ |
373 |
Important FRRP Concepts.......................................................................................................... |
374 |
Implementing FRRP.......................................................................................................................... |
375 |
FRRP Configuration........................................................................................................................... |
375 |
Creating the FRRP Group............................................................................................................ |
376 |
Configuring the Control VLAN................................................................................................... |
376 |
Configuring and Adding the Member VLANs............................................................................. |
377 |
Setting the FRRP Timers.............................................................................................................. |
379 |
Clearing the FRRP Counters....................................................................................................... |
379 |
Viewing the FRRP Configuration................................................................................................ |
379 |
Viewing the FRRP Information................................................................................................... |
380 |
Troubleshooting FRRP...................................................................................................................... |
380 |
Configuration Checks................................................................................................................. |
380 |
12
Sample Configuration and Topology............................................................................................... |
381 |
20 GARP VLAN Registration Protocol (GVRP)................................................ |
383 |
Important Points to Remember....................................................................................................... |
383 |
Configure GVRP................................................................................................................................ |
384 |
Related Configuration Tasks....................................................................................................... |
385 |
Enabling GVRP Globally.................................................................................................................... |
385 |
Enabling GVRP on a Layer 2 Interface............................................................................................. |
385 |
Configure GVRP Registration........................................................................................................... |
386 |
Configure a GARP Timer.................................................................................................................. |
386 |
21 Internet Group Management Protocol (IGMP)......................................... |
388 |
IGMP Protocol Overview.................................................................................................................. |
388 |
IGMP Version 2........................................................................................................................... |
388 |
IGMP Version 3........................................................................................................................... |
390 |
IGMP Snooping................................................................................................................................. |
393 |
IGMP Snooping Implementation Information........................................................................... |
393 |
Configuring IGMP Snooping...................................................................................................... |
394 |
Enabling IGMP Immediate-Leave............................................................................................... |
394 |
Disabling Multicast Flooding...................................................................................................... |
395 |
Specifying a Port as Connected to a Multicast Router.............................................................. |
395 |
Configuring the Switch as Querier............................................................................................. |
395 |
Fast Convergence after MSTP Topology Changes......................................................................... |
396 |
Designating a Multicast Router Interface........................................................................................ |
396 |
22 Interfaces......................................................................................................... |
397 |
Basic Interface Configuration........................................................................................................... |
397 |
Advanced Interface Configuration................................................................................................... |
397 |
Interface Types................................................................................................................................. |
398 |
View Basic Interface Information..................................................................................................... |
398 |
Enabling a Physical Interface........................................................................................................... |
400 |
Physical Interfaces............................................................................................................................ |
401 |
Configuration Task List for Physical Interfaces.......................................................................... |
401 |
Overview of Layer Modes........................................................................................................... |
401 |
Configuring Layer 2 (Data Link) Mode....................................................................................... |
402 |
Configuring Layer 2 (Interface) Mode........................................................................................ |
402 |
Configuring Layer 3 (Network) Mode........................................................................................ |
403 |
Configuring Layer 3 (Interface) Mode........................................................................................ |
403 |
Management Interfaces................................................................................................................... |
404 |
Configuring Management Interfaces on the MXL Switch......................................................... |
405 |
VLAN Interfaces................................................................................................................................ |
406 |
Loopback Interfaces......................................................................................................................... |
407 |
13
Null Interfaces................................................................................................................................... |
408 |
Port Channel Interfaces................................................................................................................... |
408 |
Port Channel Definition and Standards..................................................................................... |
408 |
Port Channel Benefits................................................................................................................. |
408 |
Port Channel Implementation................................................................................................... |
409 |
100/1000/10000 Mbps Interfaces in Port Channels................................................................. |
409 |
Configuration Tasks for Port Channel Interfaces...................................................................... |
410 |
Creating a Port Channel............................................................................................................. |
410 |
Adding a Physical Interface to a Port Channel.......................................................................... |
410 |
Reassigning an Interface to a New Port Channel...................................................................... |
412 |
Configuring the Minimum Oper Up Links in a Port Channel.................................................... |
413 |
Adding or Removing a Port Channel from a VLAN.................................................................... |
413 |
Assigning an IP Address to a Port Channel................................................................................ |
414 |
Deleting or Disabling a Port Channel......................................................................................... |
414 |
Load Balancing through Port Channels........................................................................................... |
415 |
Load-Balancing Method................................................................................................................... |
415 |
Hash Algorithm................................................................................................................................. |
416 |
Server Ports....................................................................................................................................... |
416 |
Default Configuration without Start-up Config......................................................................... |
417 |
Bulk Configuration............................................................................................................................ |
417 |
Interface Range........................................................................................................................... |
417 |
Bulk Configuration Examples..................................................................................................... |
418 |
Defining Interface Range Macros..................................................................................................... |
419 |
Define the Interface Range........................................................................................................ |
420 |
Choosing an Interface-Range Macro........................................................................................ |
420 |
Monitoring and Maintaining Interfaces............................................................................................ |
420 |
Maintenance Using TDR.............................................................................................................. |
421 |
Splitting QSFP Ports to SFP+ Ports.................................................................................................. |
422 |
Merging SFP+ Ports to QSFP 40G Ports.................................................................................... |
423 |
Configure the MTU Size on an Interface................................................................................... |
423 |
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................ |
424 |
Important Points to Remember................................................................................................. |
425 |
Example Scenarios...................................................................................................................... |
425 |
Layer 2 Flow Control Using Ethernet Pause Frames....................................................................... |
425 |
Enabling Pause Frames............................................................................................................... |
426 |
Configure MTU Size on an Interface................................................................................................ |
427 |
Port-Pipes......................................................................................................................................... |
428 |
Auto-Negotiation on Ethernet Interfaces........................................................................................ |
428 |
Setting the Speed and Duplex Mode of Ethernet Interfaces..................................................... |
428 |
View Advanced Interface Information............................................................................................. |
430 |
Configuring the Interface Sampling Size.................................................................................... |
431 |
Dynamic Counters...................................................................................................................... |
432 |
14
Enhanced Validation of Interface Ranges........................................................................................ |
434 |
Enhanced Control of Remote Fault Indication Processing............................................................ |
434 |
23 Internet Protocol Security (IPSec).............................................................. |
435 |
Configuring IPSec ............................................................................................................................ |
436 |
24 IPv4 Routing................................................................................................... |
437 |
IP Addresses...................................................................................................................................... |
437 |
Implementation Information...................................................................................................... |
437 |
Configuration Tasks for IP Addresses........................................................................................ |
438 |
IPv4 Path MTU Discovery Overview................................................................................................. |
441 |
Using the Configured Source IP Address in ICMP Messages.......................................................... |
441 |
Configuring the ICMP Source Interface..................................................................................... |
442 |
Configuring the Duration to Establish a TCP Connection.............................................................. |
442 |
Enabling Directed Broadcast............................................................................................................ |
443 |
Resolution of Host Names............................................................................................................... |
443 |
Enabling Dynamic Resolution of Host Names.......................................................................... |
443 |
Specifying the Local System Domain and a List of Domains.................................................... |
444 |
Configuring DNS with Traceroute............................................................................................. |
444 |
ARP.................................................................................................................................................... |
445 |
Configuration Tasks for ARP...................................................................................................... |
446 |
ARP Learning via Gratuitous ARP..................................................................................................... |
447 |
ARP Learning via ARP Request......................................................................................................... |
448 |
Configuring ARP Retries................................................................................................................... |
449 |
ICMP.................................................................................................................................................. |
449 |
Configuration Tasks for ICMP.................................................................................................... |
449 |
UDP Helper....................................................................................................................................... |
450 |
Configure UDP Helper................................................................................................................ |
450 |
Important Points to Remember................................................................................................. |
450 |
Enabling UDP Helper.................................................................................................................. |
450 |
Configurations Using UDP Helper.................................................................................................... |
451 |
UDP Helper with Broadcast-All Addresses................................................................................. |
451 |
UDP Helper with Subnet Broadcast Addresses.......................................................................... |
452 |
UDP Helper with Configured Broadcast Addresses.................................................................. |
453 |
UDP Helper with No Configured Broadcast Addresses............................................................ |
453 |
Troubleshooting UDP Helper........................................................................................................... |
453 |
25 IPv6 Addressing.............................................................................................. |
455 |
Protocol Overview............................................................................................................................ |
455 |
Extended Address Space............................................................................................................. |
455 |
Stateless Autoconfiguration....................................................................................................... |
455 |
IPv6 Header Fields............................................................................................................................. |
457 |
15
Version (4 bits)............................................................................................................................. |
457 |
Traffic Class (8 bits)..................................................................................................................... |
457 |
Flow Label (20 bits)..................................................................................................................... |
457 |
Payload Length (16 bits).............................................................................................................. |
458 |
Next Header (8 bits).................................................................................................................... |
458 |
Hop Limit (8 bits)......................................................................................................................... |
458 |
Source Address (128 bits)........................................................................................................... |
459 |
Destination Address (128 bits).................................................................................................... |
459 |
Extension Header Fields................................................................................................................... |
459 |
Hop-by-Hop Options Header.................................................................................................... |
459 |
Addressing........................................................................................................................................ |
460 |
Link-local Addresses................................................................................................................... |
461 |
Static and Dynamic Addressing.................................................................................................. |
461 |
Implementing IPv6 with the Dell Networking OS............................................................................ |
461 |
ICMPv6.............................................................................................................................................. |
464 |
Path MTU Discovery......................................................................................................................... |
464 |
IPv6 Neighbor Discovery.................................................................................................................. |
465 |
IPv6 Neighbor Discovery of MTU Packets................................................................................. |
466 |
Configuring the IPv6 Recursive DNS Server.............................................................................. |
466 |
Debugging IPv6 RDNSS Information Sent to the Host ............................................................. |
467 |
Displaying IPv6 RDNSS Information........................................................................................... |
467 |
IPv6 Multicast.................................................................................................................................... |
467 |
Secure Shell (SSH) Over an IPv6 Transport..................................................................................... |
468 |
Configuration Task List for IPv6....................................................................................................... |
468 |
Adjusting Your CAM-Profile....................................................................................................... |
468 |
Assigning an IPv6 Address to an Interface................................................................................. |
469 |
Assigning a Static IPv6 Route..................................................................................................... |
470 |
Configuring Telnet with IPv6...................................................................................................... |
470 |
SNMP over IPv6........................................................................................................................... |
471 |
Showing IPv6 Information........................................................................................................... |
471 |
Showing an IPv6 Interface.......................................................................................................... |
471 |
Showing IPv6 Routes.................................................................................................................. |
472 |
Showing the Running-Configuration for an Interface.............................................................. |
473 |
Clearing IPv6 Routes................................................................................................................... |
474 |
26 iSCSI Optimization......................................................................................... |
475 |
iSCSI Optimization Overview............................................................................................................ |
475 |
Monitoring iSCSI Traffic Flows.................................................................................................... |
477 |
Information Monitored in iSCSI Traffic Flows............................................................................ |
477 |
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................. |
477 |
Configuring Detection and Ports for Dell Compellent Arrays.................................................. |
478 |
iSCSI Optimization: Operation................................................................................................... |
478 |
16
Default iSCSI Optimization Values............................................................................................. |
479 |
Displaying iSCSI Optimization Information..................................................................................... |
479 |
27 Intermediate System to Intermediate System.......................................... |
481 |
IS-IS Protocol Overview.................................................................................................................... |
481 |
IS-IS Addressing................................................................................................................................ |
481 |
Multi-Topology IS-IS........................................................................................................................ |
482 |
Transition Mode.......................................................................................................................... |
483 |
Interface Support........................................................................................................................ |
483 |
Adjacencies................................................................................................................................. |
483 |
Graceful Restart................................................................................................................................ |
483 |
Timers.......................................................................................................................................... |
484 |
Implementation Information............................................................................................................ |
484 |
Configuration Information............................................................................................................... |
485 |
Configuration Tasks for IS-IS...................................................................................................... |
485 |
IS-IS Metric Styles............................................................................................................................. |
502 |
Configure Metric Values................................................................................................................... |
502 |
Maximum Values in the Routing Table...................................................................................... |
502 |
Change the IS-IS Metric Style in One Level Only...................................................................... |
502 |
Leaks from One Level to Another.............................................................................................. |
504 |
Sample Configurations..................................................................................................................... |
505 |
28 Link Aggregation Control Protocol (LACP)............................................... |
510 |
Introduction to Dynamic LAGs and LACP........................................................................................ |
510 |
Important Points to Remember.................................................................................................. |
510 |
LACP Modes................................................................................................................................. |
511 |
Configuring LACP Commands.................................................................................................... |
511 |
LACP Configuration Tasks................................................................................................................ |
512 |
Creating a LAG............................................................................................................................. |
512 |
Configuring the LAG Interfaces as Dynamic.............................................................................. |
513 |
Setting the LACP Long Timeout................................................................................................. |
513 |
Shared LAG State Tracking............................................................................................................... |
514 |
Configuring Shared LAG State Tracking........................................................................................... |
515 |
Important Points about Shared LAG State Tracking................................................................... |
517 |
LACP Basic Configuration Example.................................................................................................. |
517 |
Configure a LAG on ALPHA......................................................................................................... |
517 |
29 Layer 2.............................................................................................................. |
526 |
Manage the MAC Address Table...................................................................................................... |
526 |
Clearing the MAC Address Table................................................................................................ |
526 |
Setting the Aging Time for Dynamic Entries.............................................................................. |
526 |
Configuring a Static MAC Address.............................................................................................. |
527 |
17
Displaying the MAC Address Table............................................................................................. |
527 |
MAC Learning Limit........................................................................................................................... |
527 |
Setting the MAC Learning Limit.................................................................................................. |
528 |
mac learning-limit Dynamic....................................................................................................... |
528 |
mac learning-limit station-move............................................................................................... |
529 |
Learning Limit Violation Actions................................................................................................. |
529 |
Setting Station Move Violation Actions...................................................................................... |
529 |
Recovering from Learning Limit and Station Move Violations.................................................. |
530 |
NIC Teaming..................................................................................................................................... |
530 |
MAC Move Optimization............................................................................................................. |
532 |
30 Link Layer Discovery Protocol (LLDP)........................................................ |
533 |
802.1AB (LLDP) Overview................................................................................................................. |
533 |
Protocol Data Units..................................................................................................................... |
533 |
Optional TLVs.................................................................................................................................... |
534 |
Management TLVs....................................................................................................................... |
535 |
TIA-1057 (LLDP-MED) Overview...................................................................................................... |
537 |
TIA Organizationally Specific TLVs............................................................................................. |
537 |
Extended Power via MDI TLV...................................................................................................... |
541 |
Configure LLDP................................................................................................................................. |
542 |
Related Configuration Tasks....................................................................................................... |
542 |
Important Points to Remember................................................................................................. |
542 |
LLDP Compatibility..................................................................................................................... |
542 |
CONFIGURATION versus INTERFACE Configurations.................................................................... |
542 |
Enabling LLDP................................................................................................................................... |
543 |
Disabling and Undoing LLDP...................................................................................................... |
543 |
Advertising TLVs................................................................................................................................ |
544 |
Viewing the LLDP Configuration...................................................................................................... |
545 |
Viewing Information Advertised by Adjacent LLDP Agents............................................................ |
546 |
Configuring LLDPDU Intervals.......................................................................................................... |
547 |
Configuring Transmit and Receive Mode........................................................................................ |
548 |
Configuring a Time to Live............................................................................................................... |
549 |
Debugging LLDP............................................................................................................................... |
549 |
Relevant Management Objects........................................................................................................ |
550 |
31 Microsoft Network Load Balancing............................................................ |
557 |
NLB Unicast Mode Scenario............................................................................................................. |
557 |
NLB Multicast Mode Scenario.......................................................................................................... |
558 |
Limitations With Enabling NLB on Switches.................................................................................... |
558 |
Benefits and Working of Microsoft Clustering................................................................................ |
558 |
Enable and Disable VLAN Flooding ................................................................................................. |
559 |
Configuring a Switch for NLB .......................................................................................................... |
559 |
18
..................................................................................................................................................... |
559 |
32 Multicast Source Discovery Protocol (MSDP)........................................... |
560 |
Protocol Overview............................................................................................................................ |
560 |
Anycast RP......................................................................................................................................... |
562 |
Implementation Information............................................................................................................ |
562 |
Configure the Multicast Source Discovery Protocol....................................................................... |
563 |
Related Configuration Tasks....................................................................................................... |
563 |
Enabling MSDP.................................................................................................................................. |
567 |
Manage the Source-Active Cache................................................................................................... |
568 |
Viewing the Source-Active Cache............................................................................................. |
568 |
Limiting the Source-Active Cache............................................................................................. |
569 |
Clearing the Source-Active Cache............................................................................................. |
569 |
Enabling the Rejected Source-Active Cache............................................................................. |
569 |
Accept Source-Active Messages that Fail the RFP Check.............................................................. |
569 |
Specifying Source-Active Messages................................................................................................. |
573 |
Limiting the Source-Active Messages from a Peer.......................................................................... |
574 |
Preventing MSDP from Caching a Local Source............................................................................. |
574 |
Preventing MSDP from Caching a Remote Source......................................................................... |
575 |
Preventing MSDP from Advertising a Local Source......................................................................... |
576 |
Logging Changes in Peership States................................................................................................ |
577 |
Terminating a Peership..................................................................................................................... |
577 |
Clearing Peer Statistics..................................................................................................................... |
578 |
Debugging MSDP.............................................................................................................................. |
578 |
MSDP with Anycast RP...................................................................................................................... |
579 |
Configuring Anycast RP.................................................................................................................... |
580 |
Reducing Source-Active Message Flooding.............................................................................. |
581 |
Specifying the RP Address Used in SA Messages....................................................................... |
581 |
MSDP Sample Configurations.......................................................................................................... |
584 |
33 Multiple Spanning Tree Protocol (MSTP)................................................... |
587 |
Protocol Overview............................................................................................................................ |
587 |
Spanning Tree Variations.................................................................................................................. |
588 |
Implementation Information............................................................................................................ |
588 |
Configure Multiple Spanning Tree Protocol.................................................................................... |
588 |
Related Configuration Tasks...................................................................................................... |
588 |
Enable Multiple Spanning Tree Globally.......................................................................................... |
589 |
Creating Multiple Spanning Tree Instances..................................................................................... |
589 |
Influencing MSTP Root Selection.................................................................................................... |
590 |
Interoperate with Non-Dell Networking OS Bridges....................................................................... |
591 |
Changing the Region Name or Revision.......................................................................................... |
591 |
Modifying Global Parameters........................................................................................................... |
592 |
19
Enable BPDU Filtering Globally........................................................................................................ |
593 |
Modifying the Interface Parameters................................................................................................. |
594 |
Configuring an EdgePort.................................................................................................................. |
595 |
Flush MAC Addresses after a Topology Change............................................................................. |
596 |
MSTP Sample Configurations........................................................................................................... |
596 |
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running- |
|
ConfigurationSFTOS Example Running-Configuration............................................................. |
597 |
Debugging and Verifying MSTP Configurations............................................................................. |
600 |
34 Multicast Features......................................................................................... |
603 |
Enabling IP Multicast........................................................................................................................ |
603 |
Implementation Information............................................................................................................ |
603 |
First Packet Forwarding for Lossless Multicast................................................................................ |
604 |
Multicast Policies.............................................................................................................................. |
604 |
IPv4 Multicast Policies...................................................................................................................... |
604 |
Limiting the Number of Multicast Routes.................................................................................. |
605 |
Preventing a Host from Joining a Group................................................................................... |
605 |
Rate Limiting IGMP Join Requests............................................................................................. |
609 |
Preventing a PIM Router from Forming an Adjacency.............................................................. |
609 |
Preventing a Source from Registering with the RP................................................................... |
609 |
Preventing a PIM Router from Processing a Join...................................................................... |
612 |
35 Open Shortest Path First (OSPFv2 and OSPFv3)....................................... |
613 |
Protocol Overview............................................................................................................................ |
613 |
Autonomous System (AS) Areas.................................................................................................. |
613 |
Area Types................................................................................................................................... |
614 |
Networks and Neighbors............................................................................................................ |
615 |
Router Types................................................................................................................................ |
615 |
Link-State Advertisements (LSAs)................................................................................................ |
617 |
Router Priority and Cost.............................................................................................................. |
619 |
OSPF with the Dell Networking OS.................................................................................................. |
619 |
Graceful Restart.......................................................................................................................... |
620 |
Fast Convergence (OSPFv2, IPv4 Only)...................................................................................... |
621 |
Multi-Process OSPFv2 (IPv4 only).............................................................................................. |
621 |
RFC-2328 Compliant OSPF Flooding........................................................................................ |
622 |
OSPF ACK Packing...................................................................................................................... |
623 |
Setting OSPF Adjacency with Cisco Routers............................................................................. |
623 |
Configuration Information............................................................................................................... |
624 |
Configuration Task List for OSPFv2 (OSPF for IPv4).................................................................. |
624 |
Troubleshooting OSPFv2............................................................................................................ |
638 |
Configuration Task List for OSPFv3 (OSPF for IPv6)....................................................................... |
642 |
Enabling IPv6 Unicast Routing................................................................................................... |
643 |
20
Assigning IPv6 Addresses on an Interface................................................................................. |
643 |
Assigning Area ID on an Interface.............................................................................................. |
643 |
Assigning OSPFv3 Process ID and Router ID Globally.............................................................. |
644 |
Configuring Stub Areas............................................................................................................... |
644 |
Configuring Passive-Interface.................................................................................................... |
644 |
Redistributing Routes.................................................................................................................. |
645 |
Configuring a Default Route...................................................................................................... |
645 |
Enabling OSPFv3 Graceful Restart............................................................................................. |
646 |
Displaying Graceful Restart........................................................................................................ |
647 |
OSPFv3 Authentication Using IPsec........................................................................................... |
648 |
36 Policy-based Routing (PBR)......................................................................... |
658 |
Overview........................................................................................................................................... |
658 |
Implementing Policy-based Routing with Dell Networking OS..................................................... |
660 |
Configuration Task List for Policy-based Routing.......................................................................... |
660 |
PBR Exceptions (Permit)............................................................................................................. |
663 |
Sample Configuration...................................................................................................................... |
666 |
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View |
|
Redirect-List GOLD.................................................................................................................... |
666 |
37 PIM Sparse-Mode (PIM-SM).......................................................................... |
671 |
Implementation Information............................................................................................................ |
671 |
Protocol Overview............................................................................................................................. |
671 |
Requesting Multicast Traffic........................................................................................................ |
671 |
Refuse Multicast Traffic............................................................................................................... |
672 |
Send Multicast Traffic.................................................................................................................. |
672 |
Configuring PIM-SM......................................................................................................................... |
673 |
Related Configuration Tasks....................................................................................................... |
673 |
Enable PIM-SM.................................................................................................................................. |
673 |
Configuring S,G Expiry Timers.......................................................................................................... |
675 |
Configuring a Static Rendezvous Point........................................................................................... |
676 |
Overriding Bootstrap Router Updates........................................................................................ |
676 |
Configuring a Designated Router..................................................................................................... |
677 |
Creating Multicast Boundaries and Domains................................................................................... |
677 |
Enabling PIM-SM Graceful Restart................................................................................................... |
678 |
38 PIM Source-Specific Mode (PIM-SSM)....................................................... |
679 |
Configure PIM-SMM......................................................................................................................... |
679 |
Related Configuration Tasks....................................................................................................... |
679 |
Implementation Information........................................................................................................... |
680 |
Important Points to Remember................................................................................................. |
680 |
Enabling PIM-SSM............................................................................................................................ |
680 |
21
Use PIM-SSM with IGMP Version 2 Hosts........................................................................................ |
681 |
Configuring PIM-SSM with IGMPv2............................................................................................ |
681 |
39 Port Monitoring.............................................................................................. |
683 |
Important Points to Remember....................................................................................................... |
683 |
Configuring Port Monitoring............................................................................................................ |
684 |
Enabling Flow-Based Monitoring.................................................................................................... |
686 |
Remote Port Mirroring...................................................................................................................... |
687 |
Remote Port Mirroring Example................................................................................................. |
687 |
Configuring Remote Port Mirroring........................................................................................... |
688 |
Displaying Remote-Port Mirroring Configurations................................................................... |
690 |
Configuring the Sample Remote Port Mirroring....................................................................... |
690 |
Configuring the Encapsulated Remote Port Mirroring................................................................... |
693 |
Configuration steps for ERPM ................................................................................................... |
693 |
ERPM Behavior on a typical Dell Networking OS ........................................................................... |
695 |
Decapsulation of ERPM packets at the Destination IP/ Analyzer............................................. |
695 |
40 Private VLANs (PVLAN).................................................................................. |
697 |
Private VLAN Concepts..................................................................................................................... |
697 |
Using the Private VLAN Commands.......................................................................................... |
698 |
Configuration Task List............................................................................................................... |
699 |
Private VLAN Configuration Example......................................................................................... |
703 |
41 Per-VLAN Spanning Tree Plus (PVST+)....................................................... |
707 |
Protocol Overview............................................................................................................................ |
707 |
Implementation Information...................................................................................................... |
708 |
Configure Per-VLAN Spanning Tree Plus........................................................................................ |
708 |
Related Configuration Tasks...................................................................................................... |
708 |
Enabling PVST+................................................................................................................................. |
708 |
Disabling PVST+................................................................................................................................ |
709 |
Influencing PVST+ Root Selection............................................................................................. |
709 |
Modifying Global PVST+ Parameters................................................................................................ |
711 |
Modifying Interface PVST+ Parameters............................................................................................ |
712 |
Configuring an EdgePort................................................................................................................... |
713 |
PVST+ in Multi-Vendor Networks..................................................................................................... |
714 |
Enabling PVST+ Extend System ID................................................................................................... |
714 |
PVST+ Sample Configurations.......................................................................................................... |
715 |
Enable BPDU Filtering globally.......................................................................................................... |
717 |
42 Quality of Service (QoS)................................................................................ |
719 |
Implementation Information............................................................................................................. |
721 |
Port-Based QoS Configurations....................................................................................................... |
721 |
22
Setting dot1p Priorities for Incoming Traffic.............................................................................. |
721 |
Honoring dot1p Priorities on Ingress Traffic.............................................................................. |
722 |
Configuring Port-Based Rate Policing....................................................................................... |
723 |
Configuring Port-Based Rate Shaping....................................................................................... |
723 |
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................ |
724 |
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class.......... |
724 |
Classifying Incoming Packets Using ECN and Color-Marking.................................................. |
725 |
Sample configuration to mark non-ecn packets as “yellow” with single traffic class.............. |
727 |
Policy-Based QoS Configurations.................................................................................................... |
729 |
DSCP Color Maps........................................................................................................................ |
729 |
Classify Traffic.............................................................................................................................. |
731 |
Create a QoS Policy.................................................................................................................... |
736 |
Create Policy Maps...................................................................................................................... |
739 |
Enabling QoS Rate Adjustment........................................................................................................ |
744 |
Enabling Strict-Priority Queueing.................................................................................................... |
745 |
Weighted Random Early Detection.................................................................................................. |
745 |
Creating WRED Profiles.............................................................................................................. |
746 |
Applying a WRED Profile to Traffic............................................................................................. |
747 |
Displaying Default and Configured WRED Profiles.................................................................... |
747 |
Displaying WRED Drop Statistics................................................................................................ |
747 |
Displaying egress-queue Statistics............................................................................................. |
748 |
Classifying Layer 2 Traffic on Layer 3 Interfaces ...................................................................... |
748 |
Classifying Packets Based on a Combination of DSCP Code Points and VLAN IDs................ |
749 |
43 Routing Information Protocol (RIP)............................................................ |
751 |
Protocol Overview............................................................................................................................. |
751 |
RIPv1............................................................................................................................................. |
751 |
RIPv2............................................................................................................................................ |
752 |
Implementation Information............................................................................................................ |
752 |
Configuration Information................................................................................................................ |
752 |
Configuration Task List............................................................................................................... |
752 |
RIP Configuration Example......................................................................................................... |
759 |
44 Remote Monitoring (RMON)........................................................................ |
765 |
Implementation Information............................................................................................................ |
765 |
Fault Recovery................................................................................................................................... |
766 |
Setting the rmon Alarm............................................................................................................... |
766 |
Configuring an RMON Event...................................................................................................... |
767 |
Configuring RMON Collection Statistics.................................................................................... |
768 |
Configuring the RMON Collection History................................................................................ |
768 |
Enabling an RMON MIB Collection History Group.................................................................... |
769 |
23
45 Rapid Spanning Tree Protocol (RSTP)........................................................ |
770 |
Protocol Overview............................................................................................................................ |
770 |
Configuring Rapid Spanning Tree.................................................................................................... |
770 |
Related Configuration Tasks....................................................................................................... |
770 |
Important Points to Remember.................................................................................................. |
771 |
Configuring Interfaces for Layer 2 Mode.......................................................................................... |
771 |
Enabling Rapid Spanning Tree Protocol Globally............................................................................ |
771 |
Adding and Removing Interfaces..................................................................................................... |
774 |
Modifying Global Parameters........................................................................................................... |
775 |
Enable BPDU Filtering Globally......................................................................................................... |
776 |
Modifying Interface Parameters........................................................................................................ |
777 |
Configuring an EdgePort.................................................................................................................. |
778 |
Influencing RSTP Root Selection...................................................................................................... |
779 |
SNMP Traps for Root Elections and Topology Changes................................................................. |
779 |
Configuring Fast Hellos for Link State Detection............................................................................ |
779 |
46 Security............................................................................................................ |
781 |
AAA Accounting................................................................................................................................. |
781 |
Configuration Task List for AAA Accounting.............................................................................. |
781 |
AAA Authentication........................................................................................................................... |
783 |
Configuration Task List for AAA Authentication........................................................................ |
784 |
AAA Authorization............................................................................................................................. |
786 |
Privilege Levels Overview........................................................................................................... |
786 |
Configuration Task List for Privilege Levels................................................................................ |
787 |
RADIUS............................................................................................................................................... |
791 |
RADIUS Authentication and Authorization................................................................................. |
792 |
Configuration Task List for RADIUS............................................................................................ |
793 |
TACACS+........................................................................................................................................... |
796 |
Configuration Task List for TACACS+........................................................................................ |
796 |
Choosing TACACS+ as the Authentication Method.................................................................. |
796 |
Monitoring TACACS+.................................................................................................................. |
798 |
TACACS+ Remote Authentication and Authorization............................................................... |
798 |
Specifying a TACACS+ Server Host............................................................................................ |
799 |
Command Authorization............................................................................................................ |
799 |
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... |
800 |
Enabling SCP and SSH...................................................................................................................... |
800 |
Using SCP with SSH to Copy a Software Image........................................................................ |
801 |
Removing the RSA Host Keys and Zeroizing Storage .............................................................. |
802 |
Configuring When to Re-generate an SSH Key ........................................................................ |
802 |
Configuring the SSH Server Key Exchange Algorithm.............................................................. |
803 |
Configuring the HMAC Algorithm for the SSH Server............................................................... |
803 |
24
Configuring the SSH Server Cipher List..................................................................................... |
804 |
Secure Shell Authentication....................................................................................................... |
805 |
Troubleshooting SSH.................................................................................................................. |
807 |
Telnet................................................................................................................................................ |
808 |
VTY Line and Access-Class Configuration...................................................................................... |
808 |
VTY Line Local Authentication and Authorization.................................................................... |
808 |
VTY Line Remote Authentication and Authorization................................................................ |
809 |
VTY MAC-SA Filter Support......................................................................................................... |
810 |
Role-Based Access Control.............................................................................................................. |
810 |
Overview of RBAC....................................................................................................................... |
811 |
User Roles.................................................................................................................................... |
814 |
AAA Authentication and Authorization for Roles....................................................................... |
817 |
Role Accounting......................................................................................................................... |
820 |
Display Information About User Roles....................................................................................... |
822 |
47 Service Provider Bridging............................................................................. |
824 |
VLAN Stacking................................................................................................................................... |
824 |
Important Points to Remember................................................................................................. |
825 |
Configure VLAN Stacking........................................................................................................... |
826 |
Creating Access and Trunk Ports............................................................................................... |
826 |
Enable VLAN-Stacking for a VLAN............................................................................................. |
827 |
Configuring the Protocol Type Value for the Outer VLAN Tag................................................ |
827 |
Configuring Options for Trunk Ports......................................................................................... |
828 |
Debugging VLAN Stacking.......................................................................................................... |
829 |
VLAN Stacking in Multi-Vendor Networks................................................................................. |
829 |
VLAN Stacking Packet Drop Precedence......................................................................................... |
833 |
Enabling Drop Eligibility.............................................................................................................. |
833 |
Honoring the Incoming DEI Value............................................................................................. |
834 |
Marking Egress Packets with a DEI Value.................................................................................. |
834 |
Dynamic Mode CoS for VLAN Stacking........................................................................................... |
835 |
Mapping C-Tag to S-Tag dot1p Values..................................................................................... |
836 |
Layer 2 Protocol Tunneling.............................................................................................................. |
837 |
Implementation Information...................................................................................................... |
839 |
Enabling Layer 2 Protocol Tunneling........................................................................................ |
840 |
Specifying a Destination MAC Address for BPDUs.................................................................... |
840 |
Setting Rate-Limit BPDUs.......................................................................................................... |
840 |
Debugging Layer 2 Protocol Tunneling..................................................................................... |
841 |
Provider Backbone Bridging............................................................................................................. |
841 |
48 sFlow................................................................................................................ |
842 |
Overview........................................................................................................................................... |
842 |
Implementation Information............................................................................................................ |
842 |
25
Important Points to Remember................................................................................................. |
843 |
Enabling and Disabling sFlow........................................................................................................... |
843 |
Enabling and Disabling sFlow on an Interface........................................................................... |
843 |
Enabling sFlow Max-Header Size Extended.................................................................................... |
844 |
sFlow Show Commands................................................................................................................... |
845 |
Displaying Show sFlow Global................................................................................................... |
845 |
Displaying Show sFlow on an Interface..................................................................................... |
846 |
Displaying Show sFlow on a Stack Unit..................................................................................... |
846 |
Configuring Specify Collectors........................................................................................................ |
846 |
Changing the Polling Intervals......................................................................................................... |
847 |
Changing the Sampling Rate............................................................................................................ |
847 |
Sub-Sampling............................................................................................................................. |
848 |
Back-Off Mechanism....................................................................................................................... |
848 |
sFlow on LAG ports.......................................................................................................................... |
849 |
Enabling Extended sFlow................................................................................................................. |
849 |
49 Simple Network Management Protocol (SNMP)...................................... |
851 |
Implementation Information............................................................................................................ |
851 |
Configuration Task List for SNMP............................................................................................... |
851 |
Important Points to Remember................................................................................................. |
852 |
SNMPv3 Compliance With FIPS....................................................................................................... |
852 |
Set up SNMP...................................................................................................................................... |
853 |
Creating a Community............................................................................................................... |
854 |
Setting Up User-Based Security (SNMPv3)...................................................................................... |
854 |
Reading Managed Object Values..................................................................................................... |
856 |
Writing Managed Object Values....................................................................................................... |
857 |
Configuring Contact and Location Information using SNMP......................................................... |
857 |
Subscribing to Managed Object Value Updates using SNMP......................................................... |
858 |
Enabling a Subset of SNMP Traps.................................................................................................... |
859 |
Enabling an SNMP Agent to Notify Syslog Server Failure................................................................ |
861 |
Copy Configuration Files Using SNMP............................................................................................ |
862 |
Copying a Configuration File........................................................................................................... |
864 |
Copying Configuration Files via SNMP............................................................................................ |
865 |
Copying the Startup-Config Files to the Running-Config.............................................................. |
866 |
Copying the Startup-Config Files to the Server via FTP................................................................. |
866 |
Copying the Startup-Config Files to the Server via TFTP................................................................ |
867 |
Copying a Binary File to the Startup-Configuration........................................................................ |
867 |
Additional MIB Objects to View Copy Statistics.............................................................................. |
868 |
MIB Support to Display the Available Memory Size on Flash.......................................................... |
869 |
Viewing the Available Flash Memory Size.................................................................................. |
869 |
MIB Support to Display the Software Core Files Generated by the System.................................. |
869 |
Viewing the Software Core Files Generated by the System...................................................... |
870 |
26
Obtaining a Value for MIB Objects................................................................................................... |
870 |
Manage VLANs using SNMP.............................................................................................................. |
871 |
Creating a VLAN........................................................................................................................... |
871 |
Assigning a VLAN Alias................................................................................................................. |
871 |
Displaying the Ports in a VLAN................................................................................................... |
872 |
Add Tagged and Untagged Ports to a VLAN.............................................................................. |
873 |
Enabling and Disabling a Port using SNMP...................................................................................... |
874 |
Fetch Dynamic MAC Entries using SNMP........................................................................................ |
875 |
Deriving Interface Indices................................................................................................................. |
877 |
Monitor Port-Channels..................................................................................................................... |
878 |
BMP Functionality Using SNMP SET................................................................................................. |
879 |
Entity MIBS........................................................................................................................................ |
880 |
Physical Entity............................................................................................................................. |
880 |
Containment Tree...................................................................................................................... |
880 |
Troubleshooting SNMP Operation................................................................................................... |
881 |
50 Stacking........................................................................................................... |
882 |
Stacking MXL 10/40GbE Switches................................................................................................... |
882 |
Stack Management Roles........................................................................................................... |
883 |
Stack Master Election................................................................................................................. |
884 |
Failover Roles.............................................................................................................................. |
885 |
MAC Addressing.......................................................................................................................... |
885 |
Stacking LAG............................................................................................................................... |
885 |
Supported Stacking Topologies................................................................................................. |
885 |
Stack Group/Port Numbers.............................................................................................................. |
887 |
Configuring a Switch Stack.............................................................................................................. |
888 |
Stacking Prerequisites................................................................................................................. |
888 |
Master Selection Criteria............................................................................................................ |
889 |
Configuring Priority and stack-group........................................................................................ |
889 |
Cabling Stacked Switches.......................................................................................................... |
890 |
Accessing the CLI........................................................................................................................ |
891 |
Configuring and Bringing Up a Stack......................................................................................... |
891 |
Removing a Switch from a Stack............................................................................................... |
894 |
Adding a Stack Unit..................................................................................................................... |
895 |
Merging Two Stacks................................................................................................................... |
896 |
Splitting a Stack........................................................................................................................... |
896 |
Managing Redundant Stack Management................................................................................. |
896 |
Resetting a Unit on a Stack......................................................................................................... |
897 |
Verify a Stack Configuration............................................................................................................. |
897 |
Using Show Commands............................................................................................................. |
898 |
Troubleshooting a Switch Stack...................................................................................................... |
900 |
Failure Scenarios............................................................................................................................... |
902 |
27
Stack Member FailsUnplugged Stacking CableMaster Switch FailsStack-Link Flapping |
|
ErrorMaster Switch Recovers from FailureStack Unit in Card-Problem State Due to |
|
Incorrect Dell Networking OS VersionStack Unit in Card-Problem State Due to |
|
Configuration Mismatch............................................................................................................. |
902 |
Upgrading a Switch Stack................................................................................................................. |
905 |
Upgrading a Single Stack Unit.......................................................................................................... |
906 |
51 Storm Control................................................................................................. |
908 |
Configure Storm Control................................................................................................................. |
908 |
Configuring Storm Control from INTERFACE Mode................................................................. |
908 |
Configuring Storm Control from CONFIGURATION Mode...................................................... |
908 |
52 Spanning Tree Protocol (STP)..................................................................... |
909 |
Protocol Overview............................................................................................................................ |
909 |
Configure Spanning Tree................................................................................................................. |
909 |
Related Configuration Tasks...................................................................................................... |
909 |
Important Points to Remember.................................................................................................. |
910 |
Configuring Interfaces for Layer 2 Mode......................................................................................... |
911 |
Enabling Spanning Tree Protocol Globally...................................................................................... |
912 |
Adding an Interface to the Spanning Tree Group............................................................................ |
915 |
Removing an Interface from the Spanning Tree Group.................................................................. |
915 |
Modifying Global Parameters........................................................................................................... |
915 |
Modifying Interface STP Parameters................................................................................................ |
916 |
Enabling PortFast............................................................................................................................... |
917 |
Prevent Network Disruptions with BPDU Guard........................................................................ |
918 |
Global BPDU Filtering....................................................................................................................... |
920 |
Interface BPDU Filtering............................................................................................................. |
920 |
Selecting STP Root............................................................................................................................ |
921 |
STP Root Guard................................................................................................................................ |
922 |
Root Guard Scenario.................................................................................................................. |
922 |
Configuring Root Guard............................................................................................................. |
923 |
SNMP Traps for Root Elections and Topology Changes................................................................ |
924 |
Displaying STP Guard Configuration............................................................................................... |
924 |
53 System Time and Date................................................................................... |
925 |
Network Time Protocol.................................................................................................................... |
925 |
Protocol Overview...................................................................................................................... |
926 |
Configure the Network Time Protocol...................................................................................... |
927 |
Enabling NTP............................................................................................................................... |
927 |
Configuring NTP Broadcasts...................................................................................................... |
928 |
Disabling NTP on an Interface.................................................................................................... |
928 |
Configuring a Source IP Address for NTP Packets.................................................................... |
928 |
28
Configuring NTP Authentication................................................................................................ |
929 |
Dell Networking OS Time and Date................................................................................................. |
931 |
Configuration Task List ............................................................................................................... |
931 |
Set Daylight Saving Time............................................................................................................ |
933 |
54 Tunneling ....................................................................................................... |
936 |
Configuring a Tunnel........................................................................................................................ |
936 |
Configuring Tunnel keepalive.......................................................................................................... |
937 |
Configuring the ip and ipv6 unnumbered....................................................................................... |
938 |
Configuring the Tunnel allow-remote............................................................................................ |
938 |
Configuring the Tunnel Source Anylocal........................................................................................ |
939 |
55 Uplink Failure Detection (UFD)................................................................... |
940 |
Feature Description.......................................................................................................................... |
940 |
How Uplink Failure Detection Works............................................................................................... |
941 |
UFD and NIC Teaming...................................................................................................................... |
942 |
Important Points to Remember....................................................................................................... |
943 |
Configuring Uplink Failure Detection.............................................................................................. |
943 |
Clearing a UFD-Disabled Interface.................................................................................................. |
945 |
Displaying Uplink Failure Detection................................................................................................. |
946 |
Sample Configuration: Uplink Failure Detection............................................................................ |
948 |
56 Upgrade Procedures..................................................................................... |
950 |
Get Help with Upgrades................................................................................................................... |
950 |
57 Virtual LANs (VLANs)...................................................................................... |
951 |
Default VLAN..................................................................................................................................... |
951 |
Port-Based VLANs....................................................................................................................... |
952 |
VLANs and Port Tagging............................................................................................................. |
953 |
Configuration Task List............................................................................................................... |
953 |
Configuring Native VLANs.......................................................................................................... |
957 |
Enabling Null VLAN as the Default VLAN......................................................................................... |
958 |
58 Virtual Link Trunking (VLT).......................................................................... |
959 |
Overview........................................................................................................................................... |
959 |
Multi-domain VLT....................................................................................................................... |
960 |
VLT Terminology............................................................................................................................... |
961 |
Configure Virtual Link Trunking........................................................................................................ |
961 |
Important Points to Remember................................................................................................. |
962 |
Configuration Notes................................................................................................................... |
962 |
RSTP and VLT.............................................................................................................................. |
966 |
VLT Bandwidth Monitoring......................................................................................................... |
967 |
29
VLT and IGMP Snooping............................................................................................................. |
967 |
VLT Port Delayed Restoration.................................................................................................... |
967 |
PIM-Sparse Mode Support on VLT............................................................................................. |
968 |
VLT Multicast............................................................................................................................... |
969 |
VLT Unicast Routing................................................................................................................... |
970 |
Non-VLT ARP Sync...................................................................................................................... |
971 |
RSTP Configuration........................................................................................................................... |
972 |
Preventing Forwarding Loops in a VLT Domain........................................................................ |
972 |
Sample RSTP Configuration........................................................................................................ |
972 |
Configuring VLT.......................................................................................................................... |
973 |
Configuring a VLT Interconnect................................................................................................. |
973 |
Configuring a VLT Backup Link.................................................................................................. |
974 |
Configuring a VLT Port Delay Period......................................................................................... |
975 |
Reconfiguring the Default VLT Settings (Optional) ................................................................... |
975 |
Connecting a VLT Domain to an Attached Access Device (Switch or Server)......................... |
976 |
Configuring a VLT VLAN Peer-Down (Optional)........................................................................ |
977 |
Configure Multi-domain VLT (mVLT) (Optional)........................................................................ |
977 |
Verifying a VLT Configuration.................................................................................................... |
980 |
Connecting a VLT Domain......................................................................................................... |
983 |
PVST+ Configuration........................................................................................................................ |
988 |
Sample PVST+ Configuration..................................................................................................... |
988 |
mVLT Configuration Example.......................................................................................................... |
989 |
In Domain 1, configure the VLT domain and VLTi on Peer 1Configure mVLT on Peer 1Add |
|
links to the mVLT port-channel on Peer 1Next, configure the VLT domain and VLTi on |
|
Peer 2Configure mVLT on Peer 2Add links to the mVLT port-channel on Peer 2In |
|
Domain 2, configure the VLT domain and VLTi on Peer 3Configure mVLT on Peer 3Add |
|
links to the mVLT port-channel on Peer 3Configure the VLT domain and VLTi on Peer |
|
4Configure mVLT on Peer 4Add links to the mVLT port-channel on Peer 4.......................... |
990 |
PIM-Sparse Mode Configuration Example....................................................................................... |
991 |
Additional VLT Sample Configurations............................................................................................ |
992 |
Configuring Virtual Link Trunking (VLT Peer 1)Configuring Virtual Link Trunking (VLT Peer |
|
2)Verifying a Port-Channel Connection to a VLT Domain (From an Attached Access |
|
Switch)......................................................................................................................................... |
992 |
Troubleshooting VLT........................................................................................................................ |
994 |
Specifying VLT Nodes in a PVLAN................................................................................................... |
996 |
Association of VLTi as a Member of a PVLAN............................................................................ |
997 |
MAC Synchronization for VLT Nodes in a PVLAN..................................................................... |
998 |
PVLAN Operations When One VLT Peer is Down..................................................................... |
998 |
PVLAN Operations When a VLT Peer is Restarted..................................................................... |
998 |
Interoperation of VLT Nodes in a PVLAN with ARP Requests................................................... |
998 |
Scenarios for VLAN Membership and MAC Synchronization With VLT Nodes in PVLAN....... |
999 |
Configuring a VLT VLAN or LAG in a PVLAN................................................................................. |
1000 |
30