Dell MXL 10, MXL40GbE User Manual

5 (1)
Dell MXL 10, MXL40GbE User Manual

Dell Networking Configuration Guide for the MXL 10/40GbE Switch I/O Module

9.8(0.0)

Notes, cautions, and warnings

NOTE: A NOTE indicates important information that helps you make better use of your computer.

CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.

WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Delland the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.

2015 - 05

Rev. A00

Contents

 

1 About this Guide.................................................................................................

33

Audience..............................................................................................................................................

33

Conventions........................................................................................................................................

33

Information Symbols...........................................................................................................................

34

Related Documents............................................................................................................................

34

2 Configuration Fundamentals...........................................................................

35

Accessing the Command Line............................................................................................................

35

CLI Modes............................................................................................................................................

35

Navigating CLI Modes...................................................................................................................

37

The do Command...............................................................................................................................

40

Undoing Commands..........................................................................................................................

40

Obtaining Help....................................................................................................................................

41

Entering and Editing Commands.......................................................................................................

42

Command History...............................................................................................................................

43

Filtering show Command Outputs.....................................................................................................

43

Multiple Users in Configuration Mode...............................................................................................

44

3 Getting Started....................................................................................................

46

Console Access...................................................................................................................................

47

Serial Console................................................................................................................................

47

External Serial Port with a USB Connector..................................................................................

49

Accessing the CLI Interface and Running Scripts Using SSH............................................................

49

Entering CLI commands Using an SSH Connection...................................................................

49

Executing Local CLI Scripts Using an SSH Connection...............................................................

49

Boot Process.......................................................................................................................................

50

Default Configuration.........................................................................................................................

52

Configuring a Host Name...................................................................................................................

52

Configuring a Host Name...................................................................................................................

52

Accessing the System Remotely.........................................................................................................

53

Accessing the MXL Switch Remotely............................................................................................

53

Configure the Management Port IP Address...............................................................................

53

Configure a Management Route..................................................................................................

53

Configuring a Username and Password.......................................................................................

54

Configuring the Enable Password......................................................................................................

54

Configuration File Management.........................................................................................................

55

Copy Files to and from the System..............................................................................................

55

Save the Running-Configuration..................................................................................................

56

3

Viewing Files..................................................................................................................................

57

Managing the File System...................................................................................................................

58

View the Command History...............................................................................................................

59

Using HTTP for File Transfers.............................................................................................................

60

Upgrading and Downgrading the Dell Networking OS.....................................................................

60

Using Hashes to Validate Software Images.......................................................................................

60

4 Management.......................................................................................................

62

Configuring Privilege Levels...............................................................................................................

62

Creating a Custom Privilege Level................................................................................................

62

Customizing a Privilege Level.......................................................................................................

63

Applying a Privilege Level to a Username....................................................................................

64

Applying a Privilege Level to a Terminal Line...............................................................................

65

Configuring Logging...........................................................................................................................

65

Audit and Security Logs.................................................................................................................

65

Configuring Logging Format .......................................................................................................

67

Setting Up a Secure Connection to a Syslog Server....................................................................

68

Display the Logging Buffer and the Logging Configuration.............................................................

69

Log Messages in the Internal Buffer...................................................................................................

70

Configuration Task List for System Log Management.................................................................

70

Disabling System Logging...................................................................................................................

70

Sending System Messages to a Syslog Server....................................................................................

70

Configuring a UNIX System as a Syslog Server.............................................................................

71

Changing System Logging Settings....................................................................................................

71

Display the Logging Buffer and the Logging Configuration..............................................................

72

Configuring a UNIX Logging Facility Level.........................................................................................

73

Synchronizing Log Messages..............................................................................................................

74

Enabling Timestamp on Syslog Messages..........................................................................................

74

File Transfer Services...........................................................................................................................

75

Configuration Task List for File Transfer Services........................................................................

75

Enabling the FTP Server.................................................................................................................

75

Configuring FTP Server Parameters..............................................................................................

76

Configuring FTP Client Parameters..............................................................................................

76

Terminal Lines......................................................................................................................................

77

Denying and Permitting Access to a Terminal Line.....................................................................

77

Configuring Login Authentication for Terminal Lines.................................................................

78

Setting Time Out of EXEC Privilege Mode.........................................................................................

79

Using Telnet to get to Another Network Device...............................................................................

79

Lock CONFIGURATION Mode...........................................................................................................

80

Viewing the Configuration Lock Status........................................................................................

80

Limit Concurrent Login Sessions........................................................................................................

81

Restrictions for Limiting the Number of Concurrent Sessions....................................................

81

4

Configuring Concurrent Session Limit.........................................................................................

81

Enabling the System to Clear Existing Sessions...........................................................................

82

Track Login Activity.............................................................................................................................

83

Restrictions for Tracking Login Activity........................................................................................

83

Configuring Login Activity Tracking.............................................................................................

83

Display Login Statistics..................................................................................................................

84

Recovering from a Forgotten Password............................................................................................

85

Recovering from a Forgotten Enable Password................................................................................

86

Recovering from a Failed Start...........................................................................................................

86

5 802.1X...................................................................................................................

88

The Port-Authentication Process.......................................................................................................

90

EAP over RADIUS...........................................................................................................................

92

Configuring 802.1X.............................................................................................................................

92

Related Configuration Tasks.........................................................................................................

92

Important Points to Remember..........................................................................................................

93

Enabling 802.1X...................................................................................................................................

93

Configuring Request Identity Re-Transmissions.........................................................................

95

Configuring a Quiet Period after a Failed Authentication...........................................................

95

Forcibly Authorizing or Unauthorizing a Port....................................................................................

96

Re-Authenticating a Port....................................................................................................................

97

Configuring Timeouts.........................................................................................................................

98

Configuring Dynamic VLAN Assignment with Port Authentication..................................................

99

Guest and Authentication-Fail VLANs........................................................................................

100

Configuring a Guest VLAN..........................................................................................................

101

Configuring an Authentication-Fail VLAN..................................................................................

101

6 Access Control List (ACL) VLAN Groups and Content Addressable

 

Memory (CAM)......................................................................................................

103

Optimizing CAM Utilization During the Attachment of ACLs to VLANs.........................................

103

Guidelines for Configuring ACL VLAN groups.................................................................................

104

Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters........................

105

Configuring ACL VLAN Groups...................................................................................................

105

Configuring FP Blocks for VLAN Parameters.............................................................................

106

Viewing CAM Usage..........................................................................................................................

107

Allocating FP Blocks for VLAN Processes........................................................................................

108

7 Access Control Lists (ACLs).............................................................................

110

IP Access Control Lists (ACLs)...........................................................................................................

110

Implementing ACL on the Dell Networking OS................................................................................

111

ACLs and VLANs.................................................................................................................................

111

ACL Optimization...............................................................................................................................

111

5

Determine the Order in which ACLs are Used to Classify Traffic....................................................

111

Example of the order Keyword to Determine ACL Sequence...................................................

112

IP Fragment Handling........................................................................................................................

112

IP Fragments ACL Examples..............................................................................................................

113

Layer 4 ACL Rules Examples.............................................................................................................

113

Configure a Standard IP ACL.............................................................................................................

114

Configuring a Standard IP ACL Filter.................................................................................................

115

Configure an Extended IP ACL..........................................................................................................

116

Configuring Filters with a Sequence Number..................................................................................

116

Configuring Filters Without a Sequence Number............................................................................

117

Established Flag.................................................................................................................................

118

Configure Layer 2 and Layer 3 ACLs.................................................................................................

118

Assign an IP ACL to an Interface.......................................................................................................

119

Applying an IP ACL............................................................................................................................

119

Counting ACL Hits.............................................................................................................................

120

Configure Ingress ACLs....................................................................................................................

120

Configure Egress ACLs......................................................................................................................

121

Applying Egress Layer 3 ACLs (Control-Plane).................................................................................

121

IP Prefix Lists......................................................................................................................................

122

Implementation Information.......................................................................................................

123

Configuration Task List for Prefix Lists.............................................................................................

123

Creating a Prefix List..........................................................................................................................

123

Creating a Prefix List Without a Sequence Number........................................................................

124

Viewing Prefix Lists............................................................................................................................

125

Applying a Prefix List for Route Redistribution.................................................................................

125

Applying a Filter to a Prefix List (OSPF).............................................................................................

126

ACL Resequencing............................................................................................................................

127

Resequencing an ACL or Prefix List..................................................................................................

127

Route Maps........................................................................................................................................

129

Implementation Information......................................................................................................

129

Important Points to Remember........................................................................................................

129

Configuration Task List for Route Maps...........................................................................................

130

Creating a Route Map.......................................................................................................................

130

Configure Route Map Filters.............................................................................................................

131

Configuring Match Routes................................................................................................................

132

Configuring Set Conditions..............................................................................................................

133

Configure a Route Map for Route Redistribution............................................................................

134

Configure a Route Map for Route Tagging......................................................................................

135

Continue Clause................................................................................................................................

135

Logging of ACL Processes................................................................................................................

136

Guidelines for Configuring ACL Logging..........................................................................................

137

Configuring ACL Logging..................................................................................................................

137

6

Flow-Based Monitoring Support for ACLs.......................................................................................

138

Behavior of Flow-Based Monitoring...........................................................................................

138

Enabling Flow-Based Monitoring.....................................................................................................

140

8 Bidirectional Forwarding Detection (BFD)..................................................

142

How BFD Works................................................................................................................................

142

BFD Packet Format......................................................................................................................

143

BFD Sessions................................................................................................................................

145

BFD Three-Way Handshake........................................................................................................

145

Session State Changes................................................................................................................

146

Important Points to Remember........................................................................................................

147

Configure BFD...................................................................................................................................

148

Configure BFD for Physical Ports...............................................................................................

148

Enabling BFD Globally.................................................................................................................

148

Establishing a Session on Physical Ports....................................................................................

149

Changing Physical Port Session Parameters..............................................................................

150

Disabling and Re-Enabling BFD..................................................................................................

151

Configure BFD for Static Routes.......................................................................................................

152

Related Configuration Tasks.......................................................................................................

152

Establishing Sessions for Static Routes.......................................................................................

152

Changing Static Route Session Parameters...............................................................................

153

Disabling BFD for Static Routes..................................................................................................

153

Configure BFD for OSPF...................................................................................................................

154

Related Configuration Tasks.......................................................................................................

154

Establishing Sessions with OSPF Neighbors...............................................................................

155

Changing OSPF Session Parameters..........................................................................................

156

Disabling BFD for OSPF...............................................................................................................

157

Configure BFD for OSPFv3................................................................................................................

157

Related Configuration Tasks.......................................................................................................

157

Establishing Sessions with OSPFv3 Neighbors...........................................................................

157

Changing OSPFv3 Session Parameters......................................................................................

158

Disabling BFD for OSPFv3...........................................................................................................

158

Configure BFD for BGP.....................................................................................................................

159

Prerequisites................................................................................................................................

159

Establishing Sessions with BGP Neighbors................................................................................

159

Disabling BFD for BGP.................................................................................................................

161

Use BFD in a BGP Peer Group....................................................................................................

162

Displaying BFD for BGP Information..........................................................................................

162

Configure BFD for VRRP...................................................................................................................

166

Related Configuration Tasks.......................................................................................................

167

Establishing Sessions with All VRRP Neighbors..........................................................................

167

Establishing VRRP Sessions on VRRP Neighbors.......................................................................

167

7

Changing VRRP Session Parameters..........................................................................................

168

Disabling BFD for VRRP...............................................................................................................

169

Configure BFD for VLANs.................................................................................................................

169

Related Configuration Task.........................................................................................................

170

Establish Sessions with VLAN Neighbors....................................................................................

170

Changing VLAN Session Parameters...........................................................................................

171

Disabling BFD for VLANs..............................................................................................................

171

Configure BFD for Port-Channels.....................................................................................................

171

Related Configuration Tasks.......................................................................................................

172

Establish Sessions on Port-Channels..........................................................................................

172

Changing Physical Port Session Parameters..............................................................................

173

Disabling BFD for Port-Channels................................................................................................

173

Configuring Protocol Liveness..........................................................................................................

173

Troubleshooting BFD........................................................................................................................

174

9 Border Gateway Protocol IPv4 (BGPv4).......................................................

175

Autonomous Systems (AS)................................................................................................................

175

Sessions and Peers............................................................................................................................

177

Establish a Session.......................................................................................................................

178

Route Reflectors................................................................................................................................

179

Communities...............................................................................................................................

179

BGP Attributes...................................................................................................................................

180

Best Path Selection Criteria........................................................................................................

180

Weight..........................................................................................................................................

182

Local Preference.........................................................................................................................

182

Multi-Exit Discriminators (MEDs)................................................................................................

183

Origin...........................................................................................................................................

184

AS Path.........................................................................................................................................

185

Next Hop......................................................................................................................................

185

Multiprotocol BGP............................................................................................................................

186

Implement BGP with the Dell Networking OS.................................................................................

186

Additional Path (Add-Path) Support...........................................................................................

186

Advertise IGP Cost as MED for Redistributed Routes................................................................

186

Ignore Router-ID for Some Best-Path Calculations..................................................................

187

Four-Byte AS Numbers................................................................................................................

187

AS4 Number Representation......................................................................................................

188

AS Number Migration..................................................................................................................

190

BGP4 Management Information Base (MIB)...............................................................................

191

Important Points to Remember..................................................................................................

191

Configuration Information................................................................................................................

192

BGP Configuration............................................................................................................................

193

Enabling BGP...............................................................................................................................

194

8

Enabling MBGP Configurations..................................................................................................

227

BGP Regular Expression Optimization.............................................................................................

228

Debugging BGP................................................................................................................................

228

Storing Last and Bad PDUs.........................................................................................................

229

PDU Counters.............................................................................................................................

230

Sample Configurations.....................................................................................................................

230

10 Content Addressable Memory (CAM).........................................................

240

CAM Allocation.................................................................................................................................

240

Test CAM Usage................................................................................................................................

241

View CAM-ACL Settings...................................................................................................................

242

CAM Optimization............................................................................................................................

242

11 Control Plane Policing (CoPP).....................................................................

243

Configure Control Plane Policing....................................................................................................

244

Configuring CoPP for Protocols................................................................................................

245

Configuring CoPP for CPU Queues...........................................................................................

247

Show Commands.......................................................................................................................

248

12 Data Center Bridging (DCB).........................................................................

250

Ethernet Enhancements in Data Center Bridging...........................................................................

250

Priority-Based Flow Control........................................................................................................

251

Enhanced Transmission Selection..............................................................................................

252

Data Center Bridging Exchange Protocol (DCBx).....................................................................

254

Data Center Bridging in a Traffic Flow.......................................................................................

254

Enabling Data Center Bridging.........................................................................................................

255

Configuring DCB Maps and its Attributes..................................................................................

256

Data Center Bridging: Default Configuration..................................................................................

259

Interworking of DCB Map With DCB Buffer Threshold Settings....................................................

260

Configuring Priority-Based Flow Control........................................................................................

261

Configuring Lossless Queues.....................................................................................................

262

Configuring the PFC Buffer in a Switch Stack...........................................................................

263

Priority-Based Flow Control Using Dynamic Buffer Method....................................................

264

Configure Enhanced Transmission Selection..................................................................................

265

ETS Prerequisites and Restrictions.............................................................................................

266

Creating an ETS Priority Group..................................................................................................

266

ETS Operation with DCBx...........................................................................................................

267

Configuring Bandwidth Allocation for DCBx CIN.....................................................................

268

Hierarchical Scheduling in ETS Output Policies........................................................................

269

Applying DCB Policies with an ETS Configuration..........................................................................

269

PFC and ETS Configuration Examples.............................................................................................

270

Using PFC and ETS to Manage Data Center Traffic...................................................................

270

9

Using PFC and ETS to Manage Converged Ethernet Traffic in a Switch Stack

........................ 272

Applying DCB Policies in a Switch Stack..........................................................................................

273

Configure a DCBx Operation............................................................................................................

273

DCBx Operation..........................................................................................................................

273

DCBx Port Roles..........................................................................................................................

274

DCB Configuration Exchange....................................................................................................

276

Configuration Source Election...................................................................................................

276

Propagation of DCB Information...............................................................................................

276

Auto-Detection and Manual Configuration of the DCBx Version.............................................

277

DCBx Example.............................................................................................................................

277

DCBx Prerequisites and Restrictions..........................................................................................

278

Configuring DCBx.......................................................................................................................

279

Verifying the DCB Configuration.....................................................................................................

283

QoS dot1p Traffic Classification and Queue Assignment...............................................................

293

Configuring the Dynamic Buffer Method........................................................................................

294

13 Debugging and Diagnostics.........................................................................

296

Offline Diagnostics...........................................................................................................................

296

Important Points to Remember.................................................................................................

296

Running Offline Diagnostics.......................................................................................................

296

Trace Logs.........................................................................................................................................

299

Auto Save on Crash or Rollover.................................................................................................

299

Using the Show Hardware Commands...........................................................................................

300

Enabling Environmental Monitoring.................................................................................................

301

Recognize an Over-Temperature Condition.............................................................................

303

Troubleshoot an Over-Temperature Condition........................................................................

303

Recognize an Under-Voltage Condition...................................................................................

304

Troubleshoot an Under-Voltage Condition..............................................................................

304

Troubleshooting Packet Loss...........................................................................................................

305

Displaying Drop Counters..........................................................................................................

305

Dataplane Statistics.....................................................................................................................

306

Display Stack Port Statistics........................................................................................................

307

Displaying Stack Member Counters...........................................................................................

307

Enabling Application Core Dumps...................................................................................................

308

Mini Core Dumps..............................................................................................................................

308

Enabling TCP Dumps........................................................................................................................

309

Enabling Buffer Statistics Tracking ..................................................................................................

310

14 Dynamic Host Configuration Protocol (DHCP)........................................

311

DHCP Packet Format and Options...................................................................................................

311

Assign an IP Address using DHCP...............................................................................................

313

Implementation Information............................................................................................................

314

10

Configure the System to be a DHCP Server....................................................................................

315

Configuring the Server for Automatic Address Allocation.........................................................

315

Configuration Tasks....................................................................................................................

316

Specifying a Default Gateway.....................................................................................................

317

Enabling the DHCP Server...........................................................................................................

317

Configure a Method of Hostname Resolution...........................................................................

318

Creating Manual Binding Entries.................................................................................................

319

Debugging the DHCP Server......................................................................................................

319

Using DHCP Clear Commands...................................................................................................

319

Configure the System to be a Relay Agent......................................................................................

320

Configure the System to be a DHCP Client.....................................................................................

322

Configuring the DHCP Client System........................................................................................

322

DHCP Client on a Management Interface.................................................................................

326

DHCP Client Operation with Other Features.............................................................................

327

Configure Secure DHCP...................................................................................................................

328

Option 82....................................................................................................................................

328

DHCP Snooping..........................................................................................................................

329

Drop DHCP Packets on Snooped VLANs Only..........................................................................

332

Dynamic ARP Inspection............................................................................................................

333

Configuring Dynamic ARP Inspection........................................................................................

334

Source Address Validation..........................................................................................................

335

15 Equal Cost Multi-Path (ECMP)......................................................................

337

ECMP for Flow-Based Affinity..........................................................................................................

337

Enabling Deterministic ECMP Next Hop....................................................................................

337

Link Bundle Monitoring....................................................................................................................

338

Managing ECMP Group Paths..........................................................................................................

338

16 FC FLEXIO FPORT...........................................................................................

340

FC FLEXIO FPORT.............................................................................................................................

340

Configuring Switch Mode to FCF Port Mode..................................................................................

340

Name Server......................................................................................................................................

341

FCoE Maps........................................................................................................................................

342

Creating an FCoE Map......................................................................................................................

342

Zoning...............................................................................................................................................

344

Creating Zone and Adding Members...............................................................................................

344

Creating Zone Alias and Adding Members......................................................................................

345

Creating Zonesets.............................................................................................................................

345

Activating a Zoneset.........................................................................................................................

346

Displaying the Fabric Parameters.....................................................................................................

346

17 FCoE Transit....................................................................................................

349

11

Fibre Channel over Ethernet............................................................................................................

349

Ensure Robustness in a Converged Ethernet Network...................................................................

349

FIP Snooping on Ethernet Bridges....................................................................................................

351

FIP Snooping in a Switch Stack........................................................................................................

354

Using FIP Snooping...........................................................................................................................

354

Important Points to Remember.................................................................................................

354

Enabling the FCoE Transit Feature.............................................................................................

355

Enable FIP Snooping on VLANs..................................................................................................

355

Configure the FC-MAP Value.....................................................................................................

355

Configure a Port for a Bridge-to-Bridge Link............................................................................

355

Configure a Port for a Bridge-to-FCF Link................................................................................

356

Impact on Other Software Features...........................................................................................

356

FIP Snooping Prerequisites.........................................................................................................

356

FIP Snooping Restrictions...........................................................................................................

357

Configuring FIP Snooping...........................................................................................................

357

Displaying FIP Snooping Information..............................................................................................

358

FCoE Transit Configuration Example...............................................................................................

364

18 FIPS Cryptography.........................................................................................

366

Preparing the System........................................................................................................................

366

Enabling FIPS Mode..........................................................................................................................

366

Generating Host-Keys......................................................................................................................

367

Monitoring FIPS Mode Status...........................................................................................................

367

Disabling FIPS Mode.........................................................................................................................

368

19 Force10 Resilient Ring Protocol (FRRP).....................................................

370

Protocol Overview............................................................................................................................

370

Ring Status...................................................................................................................................

371

Multiple FRRP Rings.....................................................................................................................

372

Important FRRP Points................................................................................................................

373

Important FRRP Concepts..........................................................................................................

374

Implementing FRRP..........................................................................................................................

375

FRRP Configuration...........................................................................................................................

375

Creating the FRRP Group............................................................................................................

376

Configuring the Control VLAN...................................................................................................

376

Configuring and Adding the Member VLANs.............................................................................

377

Setting the FRRP Timers..............................................................................................................

379

Clearing the FRRP Counters.......................................................................................................

379

Viewing the FRRP Configuration................................................................................................

379

Viewing the FRRP Information...................................................................................................

380

Troubleshooting FRRP......................................................................................................................

380

Configuration Checks.................................................................................................................

380

12

Sample Configuration and Topology...............................................................................................

381

20 GARP VLAN Registration Protocol (GVRP)................................................

383

Important Points to Remember.......................................................................................................

383

Configure GVRP................................................................................................................................

384

Related Configuration Tasks.......................................................................................................

385

Enabling GVRP Globally....................................................................................................................

385

Enabling GVRP on a Layer 2 Interface.............................................................................................

385

Configure GVRP Registration...........................................................................................................

386

Configure a GARP Timer..................................................................................................................

386

21 Internet Group Management Protocol (IGMP).........................................

388

IGMP Protocol Overview..................................................................................................................

388

IGMP Version 2...........................................................................................................................

388

IGMP Version 3...........................................................................................................................

390

IGMP Snooping.................................................................................................................................

393

IGMP Snooping Implementation Information...........................................................................

393

Configuring IGMP Snooping......................................................................................................

394

Enabling IGMP Immediate-Leave...............................................................................................

394

Disabling Multicast Flooding......................................................................................................

395

Specifying a Port as Connected to a Multicast Router..............................................................

395

Configuring the Switch as Querier.............................................................................................

395

Fast Convergence after MSTP Topology Changes.........................................................................

396

Designating a Multicast Router Interface........................................................................................

396

22 Interfaces.........................................................................................................

397

Basic Interface Configuration...........................................................................................................

397

Advanced Interface Configuration...................................................................................................

397

Interface Types.................................................................................................................................

398

View Basic Interface Information.....................................................................................................

398

Enabling a Physical Interface...........................................................................................................

400

Physical Interfaces............................................................................................................................

401

Configuration Task List for Physical Interfaces..........................................................................

401

Overview of Layer Modes...........................................................................................................

401

Configuring Layer 2 (Data Link) Mode.......................................................................................

402

Configuring Layer 2 (Interface) Mode........................................................................................

402

Configuring Layer 3 (Network) Mode........................................................................................

403

Configuring Layer 3 (Interface) Mode........................................................................................

403

Management Interfaces...................................................................................................................

404

Configuring Management Interfaces on the MXL Switch.........................................................

405

VLAN Interfaces................................................................................................................................

406

Loopback Interfaces.........................................................................................................................

407

13

Null Interfaces...................................................................................................................................

408

Port Channel Interfaces...................................................................................................................

408

Port Channel Definition and Standards.....................................................................................

408

Port Channel Benefits.................................................................................................................

408

Port Channel Implementation...................................................................................................

409

100/1000/10000 Mbps Interfaces in Port Channels.................................................................

409

Configuration Tasks for Port Channel Interfaces......................................................................

410

Creating a Port Channel.............................................................................................................

410

Adding a Physical Interface to a Port Channel..........................................................................

410

Reassigning an Interface to a New Port Channel......................................................................

412

Configuring the Minimum Oper Up Links in a Port Channel....................................................

413

Adding or Removing a Port Channel from a VLAN....................................................................

413

Assigning an IP Address to a Port Channel................................................................................

414

Deleting or Disabling a Port Channel.........................................................................................

414

Load Balancing through Port Channels...........................................................................................

415

Load-Balancing Method...................................................................................................................

415

Hash Algorithm.................................................................................................................................

416

Server Ports.......................................................................................................................................

416

Default Configuration without Start-up Config.........................................................................

417

Bulk Configuration............................................................................................................................

417

Interface Range...........................................................................................................................

417

Bulk Configuration Examples.....................................................................................................

418

Defining Interface Range Macros.....................................................................................................

419

Define the Interface Range........................................................................................................

420

Choosing an Interface-Range Macro........................................................................................

420

Monitoring and Maintaining Interfaces............................................................................................

420

Maintenance Using TDR..............................................................................................................

421

Splitting QSFP Ports to SFP+ Ports..................................................................................................

422

Merging SFP+ Ports to QSFP 40G Ports....................................................................................

423

Configure the MTU Size on an Interface...................................................................................

423

Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................

424

Important Points to Remember.................................................................................................

425

Example Scenarios......................................................................................................................

425

Layer 2 Flow Control Using Ethernet Pause Frames.......................................................................

425

Enabling Pause Frames...............................................................................................................

426

Configure MTU Size on an Interface................................................................................................

427

Port-Pipes.........................................................................................................................................

428

Auto-Negotiation on Ethernet Interfaces........................................................................................

428

Setting the Speed and Duplex Mode of Ethernet Interfaces.....................................................

428

View Advanced Interface Information.............................................................................................

430

Configuring the Interface Sampling Size....................................................................................

431

Dynamic Counters......................................................................................................................

432

14

Enhanced Validation of Interface Ranges........................................................................................

434

Enhanced Control of Remote Fault Indication Processing............................................................

434

23 Internet Protocol Security (IPSec)..............................................................

435

Configuring IPSec ............................................................................................................................

436

24 IPv4 Routing...................................................................................................

437

IP Addresses......................................................................................................................................

437

Implementation Information......................................................................................................

437

Configuration Tasks for IP Addresses........................................................................................

438

IPv4 Path MTU Discovery Overview.................................................................................................

441

Using the Configured Source IP Address in ICMP Messages..........................................................

441

Configuring the ICMP Source Interface.....................................................................................

442

Configuring the Duration to Establish a TCP Connection..............................................................

442

Enabling Directed Broadcast............................................................................................................

443

Resolution of Host Names...............................................................................................................

443

Enabling Dynamic Resolution of Host Names..........................................................................

443

Specifying the Local System Domain and a List of Domains....................................................

444

Configuring DNS with Traceroute.............................................................................................

444

ARP....................................................................................................................................................

445

Configuration Tasks for ARP......................................................................................................

446

ARP Learning via Gratuitous ARP.....................................................................................................

447

ARP Learning via ARP Request.........................................................................................................

448

Configuring ARP Retries...................................................................................................................

449

ICMP..................................................................................................................................................

449

Configuration Tasks for ICMP....................................................................................................

449

UDP Helper.......................................................................................................................................

450

Configure UDP Helper................................................................................................................

450

Important Points to Remember.................................................................................................

450

Enabling UDP Helper..................................................................................................................

450

Configurations Using UDP Helper....................................................................................................

451

UDP Helper with Broadcast-All Addresses.................................................................................

451

UDP Helper with Subnet Broadcast Addresses..........................................................................

452

UDP Helper with Configured Broadcast Addresses..................................................................

453

UDP Helper with No Configured Broadcast Addresses............................................................

453

Troubleshooting UDP Helper...........................................................................................................

453

25 IPv6 Addressing..............................................................................................

455

Protocol Overview............................................................................................................................

455

Extended Address Space.............................................................................................................

455

Stateless Autoconfiguration.......................................................................................................

455

IPv6 Header Fields.............................................................................................................................

457

15

Version (4 bits).............................................................................................................................

457

Traffic Class (8 bits).....................................................................................................................

457

Flow Label (20 bits).....................................................................................................................

457

Payload Length (16 bits)..............................................................................................................

458

Next Header (8 bits)....................................................................................................................

458

Hop Limit (8 bits).........................................................................................................................

458

Source Address (128 bits)...........................................................................................................

459

Destination Address (128 bits)....................................................................................................

459

Extension Header Fields...................................................................................................................

459

Hop-by-Hop Options Header....................................................................................................

459

Addressing........................................................................................................................................

460

Link-local Addresses...................................................................................................................

461

Static and Dynamic Addressing..................................................................................................

461

Implementing IPv6 with the Dell Networking OS............................................................................

461

ICMPv6..............................................................................................................................................

464

Path MTU Discovery.........................................................................................................................

464

IPv6 Neighbor Discovery..................................................................................................................

465

IPv6 Neighbor Discovery of MTU Packets.................................................................................

466

Configuring the IPv6 Recursive DNS Server..............................................................................

466

Debugging IPv6 RDNSS Information Sent to the Host .............................................................

467

Displaying IPv6 RDNSS Information...........................................................................................

467

IPv6 Multicast....................................................................................................................................

467

Secure Shell (SSH) Over an IPv6 Transport.....................................................................................

468

Configuration Task List for IPv6.......................................................................................................

468

Adjusting Your CAM-Profile.......................................................................................................

468

Assigning an IPv6 Address to an Interface.................................................................................

469

Assigning a Static IPv6 Route.....................................................................................................

470

Configuring Telnet with IPv6......................................................................................................

470

SNMP over IPv6...........................................................................................................................

471

Showing IPv6 Information...........................................................................................................

471

Showing an IPv6 Interface..........................................................................................................

471

Showing IPv6 Routes..................................................................................................................

472

Showing the Running-Configuration for an Interface..............................................................

473

Clearing IPv6 Routes...................................................................................................................

474

26 iSCSI Optimization.........................................................................................

475

iSCSI Optimization Overview............................................................................................................

475

Monitoring iSCSI Traffic Flows....................................................................................................

477

Information Monitored in iSCSI Traffic Flows............................................................................

477

Detection and Auto-Configuration for Dell EqualLogic Arrays.................................................

477

Configuring Detection and Ports for Dell Compellent Arrays..................................................

478

iSCSI Optimization: Operation...................................................................................................

478

16

Default iSCSI Optimization Values.............................................................................................

479

Displaying iSCSI Optimization Information.....................................................................................

479

27 Intermediate System to Intermediate System..........................................

481

IS-IS Protocol Overview....................................................................................................................

481

IS-IS Addressing................................................................................................................................

481

Multi-Topology IS-IS........................................................................................................................

482

Transition Mode..........................................................................................................................

483

Interface Support........................................................................................................................

483

Adjacencies.................................................................................................................................

483

Graceful Restart................................................................................................................................

483

Timers..........................................................................................................................................

484

Implementation Information............................................................................................................

484

Configuration Information...............................................................................................................

485

Configuration Tasks for IS-IS......................................................................................................

485

IS-IS Metric Styles.............................................................................................................................

502

Configure Metric Values...................................................................................................................

502

Maximum Values in the Routing Table......................................................................................

502

Change the IS-IS Metric Style in One Level Only......................................................................

502

Leaks from One Level to Another..............................................................................................

504

Sample Configurations.....................................................................................................................

505

28 Link Aggregation Control Protocol (LACP)...............................................

510

Introduction to Dynamic LAGs and LACP........................................................................................

510

Important Points to Remember..................................................................................................

510

LACP Modes.................................................................................................................................

511

Configuring LACP Commands....................................................................................................

511

LACP Configuration Tasks................................................................................................................

512

Creating a LAG.............................................................................................................................

512

Configuring the LAG Interfaces as Dynamic..............................................................................

513

Setting the LACP Long Timeout.................................................................................................

513

Shared LAG State Tracking...............................................................................................................

514

Configuring Shared LAG State Tracking...........................................................................................

515

Important Points about Shared LAG State Tracking...................................................................

517

LACP Basic Configuration Example..................................................................................................

517

Configure a LAG on ALPHA.........................................................................................................

517

29 Layer 2..............................................................................................................

526

Manage the MAC Address Table......................................................................................................

526

Clearing the MAC Address Table................................................................................................

526

Setting the Aging Time for Dynamic Entries..............................................................................

526

Configuring a Static MAC Address..............................................................................................

527

17

Displaying the MAC Address Table.............................................................................................

527

MAC Learning Limit...........................................................................................................................

527

Setting the MAC Learning Limit..................................................................................................

528

mac learning-limit Dynamic.......................................................................................................

528

mac learning-limit station-move...............................................................................................

529

Learning Limit Violation Actions.................................................................................................

529

Setting Station Move Violation Actions......................................................................................

529

Recovering from Learning Limit and Station Move Violations..................................................

530

NIC Teaming.....................................................................................................................................

530

MAC Move Optimization.............................................................................................................

532

30 Link Layer Discovery Protocol (LLDP)........................................................

533

802.1AB (LLDP) Overview.................................................................................................................

533

Protocol Data Units.....................................................................................................................

533

Optional TLVs....................................................................................................................................

534

Management TLVs.......................................................................................................................

535

TIA-1057 (LLDP-MED) Overview......................................................................................................

537

TIA Organizationally Specific TLVs.............................................................................................

537

Extended Power via MDI TLV......................................................................................................

541

Configure LLDP.................................................................................................................................

542

Related Configuration Tasks.......................................................................................................

542

Important Points to Remember.................................................................................................

542

LLDP Compatibility.....................................................................................................................

542

CONFIGURATION versus INTERFACE Configurations....................................................................

542

Enabling LLDP...................................................................................................................................

543

Disabling and Undoing LLDP......................................................................................................

543

Advertising TLVs................................................................................................................................

544

Viewing the LLDP Configuration......................................................................................................

545

Viewing Information Advertised by Adjacent LLDP Agents............................................................

546

Configuring LLDPDU Intervals..........................................................................................................

547

Configuring Transmit and Receive Mode........................................................................................

548

Configuring a Time to Live...............................................................................................................

549

Debugging LLDP...............................................................................................................................

549

Relevant Management Objects........................................................................................................

550

31 Microsoft Network Load Balancing............................................................

557

NLB Unicast Mode Scenario.............................................................................................................

557

NLB Multicast Mode Scenario..........................................................................................................

558

Limitations With Enabling NLB on Switches....................................................................................

558

Benefits and Working of Microsoft Clustering................................................................................

558

Enable and Disable VLAN Flooding .................................................................................................

559

Configuring a Switch for NLB ..........................................................................................................

559

18

.....................................................................................................................................................

559

32 Multicast Source Discovery Protocol (MSDP)...........................................

560

Protocol Overview............................................................................................................................

560

Anycast RP.........................................................................................................................................

562

Implementation Information............................................................................................................

562

Configure the Multicast Source Discovery Protocol.......................................................................

563

Related Configuration Tasks.......................................................................................................

563

Enabling MSDP..................................................................................................................................

567

Manage the Source-Active Cache...................................................................................................

568

Viewing the Source-Active Cache.............................................................................................

568

Limiting the Source-Active Cache.............................................................................................

569

Clearing the Source-Active Cache.............................................................................................

569

Enabling the Rejected Source-Active Cache.............................................................................

569

Accept Source-Active Messages that Fail the RFP Check..............................................................

569

Specifying Source-Active Messages.................................................................................................

573

Limiting the Source-Active Messages from a Peer..........................................................................

574

Preventing MSDP from Caching a Local Source.............................................................................

574

Preventing MSDP from Caching a Remote Source.........................................................................

575

Preventing MSDP from Advertising a Local Source.........................................................................

576

Logging Changes in Peership States................................................................................................

577

Terminating a Peership.....................................................................................................................

577

Clearing Peer Statistics.....................................................................................................................

578

Debugging MSDP..............................................................................................................................

578

MSDP with Anycast RP......................................................................................................................

579

Configuring Anycast RP....................................................................................................................

580

Reducing Source-Active Message Flooding..............................................................................

581

Specifying the RP Address Used in SA Messages.......................................................................

581

MSDP Sample Configurations..........................................................................................................

584

33 Multiple Spanning Tree Protocol (MSTP)...................................................

587

Protocol Overview............................................................................................................................

587

Spanning Tree Variations..................................................................................................................

588

Implementation Information............................................................................................................

588

Configure Multiple Spanning Tree Protocol....................................................................................

588

Related Configuration Tasks......................................................................................................

588

Enable Multiple Spanning Tree Globally..........................................................................................

589

Creating Multiple Spanning Tree Instances.....................................................................................

589

Influencing MSTP Root Selection....................................................................................................

590

Interoperate with Non-Dell Networking OS Bridges.......................................................................

591

Changing the Region Name or Revision..........................................................................................

591

Modifying Global Parameters...........................................................................................................

592

19

Enable BPDU Filtering Globally........................................................................................................

593

Modifying the Interface Parameters.................................................................................................

594

Configuring an EdgePort..................................................................................................................

595

Flush MAC Addresses after a Topology Change.............................................................................

596

MSTP Sample Configurations...........................................................................................................

596

Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-

 

ConfigurationSFTOS Example Running-Configuration.............................................................

597

Debugging and Verifying MSTP Configurations.............................................................................

600

34 Multicast Features.........................................................................................

603

Enabling IP Multicast........................................................................................................................

603

Implementation Information............................................................................................................

603

First Packet Forwarding for Lossless Multicast................................................................................

604

Multicast Policies..............................................................................................................................

604

IPv4 Multicast Policies......................................................................................................................

604

Limiting the Number of Multicast Routes..................................................................................

605

Preventing a Host from Joining a Group...................................................................................

605

Rate Limiting IGMP Join Requests.............................................................................................

609

Preventing a PIM Router from Forming an Adjacency..............................................................

609

Preventing a Source from Registering with the RP...................................................................

609

Preventing a PIM Router from Processing a Join......................................................................

612

35 Open Shortest Path First (OSPFv2 and OSPFv3).......................................

613

Protocol Overview............................................................................................................................

613

Autonomous System (AS) Areas..................................................................................................

613

Area Types...................................................................................................................................

614

Networks and Neighbors............................................................................................................

615

Router Types................................................................................................................................

615

Link-State Advertisements (LSAs)................................................................................................

617

Router Priority and Cost..............................................................................................................

619

OSPF with the Dell Networking OS..................................................................................................

619

Graceful Restart..........................................................................................................................

620

Fast Convergence (OSPFv2, IPv4 Only)......................................................................................

621

Multi-Process OSPFv2 (IPv4 only)..............................................................................................

621

RFC-2328 Compliant OSPF Flooding........................................................................................

622

OSPF ACK Packing......................................................................................................................

623

Setting OSPF Adjacency with Cisco Routers.............................................................................

623

Configuration Information...............................................................................................................

624

Configuration Task List for OSPFv2 (OSPF for IPv4)..................................................................

624

Troubleshooting OSPFv2............................................................................................................

638

Configuration Task List for OSPFv3 (OSPF for IPv6).......................................................................

642

Enabling IPv6 Unicast Routing...................................................................................................

643

20

Assigning IPv6 Addresses on an Interface.................................................................................

643

Assigning Area ID on an Interface..............................................................................................

643

Assigning OSPFv3 Process ID and Router ID Globally..............................................................

644

Configuring Stub Areas...............................................................................................................

644

Configuring Passive-Interface....................................................................................................

644

Redistributing Routes..................................................................................................................

645

Configuring a Default Route......................................................................................................

645

Enabling OSPFv3 Graceful Restart.............................................................................................

646

Displaying Graceful Restart........................................................................................................

647

OSPFv3 Authentication Using IPsec...........................................................................................

648

36 Policy-based Routing (PBR).........................................................................

658

Overview...........................................................................................................................................

658

Implementing Policy-based Routing with Dell Networking OS.....................................................

660

Configuration Task List for Policy-based Routing..........................................................................

660

PBR Exceptions (Permit).............................................................................................................

663

Sample Configuration......................................................................................................................

666

Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View

 

Redirect-List GOLD....................................................................................................................

666

37 PIM Sparse-Mode (PIM-SM)..........................................................................

671

Implementation Information............................................................................................................

671

Protocol Overview.............................................................................................................................

671

Requesting Multicast Traffic........................................................................................................

671

Refuse Multicast Traffic...............................................................................................................

672

Send Multicast Traffic..................................................................................................................

672

Configuring PIM-SM.........................................................................................................................

673

Related Configuration Tasks.......................................................................................................

673

Enable PIM-SM..................................................................................................................................

673

Configuring S,G Expiry Timers..........................................................................................................

675

Configuring a Static Rendezvous Point...........................................................................................

676

Overriding Bootstrap Router Updates........................................................................................

676

Configuring a Designated Router.....................................................................................................

677

Creating Multicast Boundaries and Domains...................................................................................

677

Enabling PIM-SM Graceful Restart...................................................................................................

678

38 PIM Source-Specific Mode (PIM-SSM).......................................................

679

Configure PIM-SMM.........................................................................................................................

679

Related Configuration Tasks.......................................................................................................

679

Implementation Information...........................................................................................................

680

Important Points to Remember.................................................................................................

680

Enabling PIM-SSM............................................................................................................................

680

21

Use PIM-SSM with IGMP Version 2 Hosts........................................................................................

681

Configuring PIM-SSM with IGMPv2............................................................................................

681

39 Port Monitoring..............................................................................................

683

Important Points to Remember.......................................................................................................

683

Configuring Port Monitoring............................................................................................................

684

Enabling Flow-Based Monitoring....................................................................................................

686

Remote Port Mirroring......................................................................................................................

687

Remote Port Mirroring Example.................................................................................................

687

Configuring Remote Port Mirroring...........................................................................................

688

Displaying Remote-Port Mirroring Configurations...................................................................

690

Configuring the Sample Remote Port Mirroring.......................................................................

690

Configuring the Encapsulated Remote Port Mirroring...................................................................

693

Configuration steps for ERPM ...................................................................................................

693

ERPM Behavior on a typical Dell Networking OS ...........................................................................

695

Decapsulation of ERPM packets at the Destination IP/ Analyzer.............................................

695

40 Private VLANs (PVLAN)..................................................................................

697

Private VLAN Concepts.....................................................................................................................

697

Using the Private VLAN Commands..........................................................................................

698

Configuration Task List...............................................................................................................

699

Private VLAN Configuration Example.........................................................................................

703

41 Per-VLAN Spanning Tree Plus (PVST+).......................................................

707

Protocol Overview............................................................................................................................

707

Implementation Information......................................................................................................

708

Configure Per-VLAN Spanning Tree Plus........................................................................................

708

Related Configuration Tasks......................................................................................................

708

Enabling PVST+.................................................................................................................................

708

Disabling PVST+................................................................................................................................

709

Influencing PVST+ Root Selection.............................................................................................

709

Modifying Global PVST+ Parameters................................................................................................

711

Modifying Interface PVST+ Parameters............................................................................................

712

Configuring an EdgePort...................................................................................................................

713

PVST+ in Multi-Vendor Networks.....................................................................................................

714

Enabling PVST+ Extend System ID...................................................................................................

714

PVST+ Sample Configurations..........................................................................................................

715

Enable BPDU Filtering globally..........................................................................................................

717

42 Quality of Service (QoS)................................................................................

719

Implementation Information.............................................................................................................

721

Port-Based QoS Configurations.......................................................................................................

721

22

Setting dot1p Priorities for Incoming Traffic..............................................................................

721

Honoring dot1p Priorities on Ingress Traffic..............................................................................

722

Configuring Port-Based Rate Policing.......................................................................................

723

Configuring Port-Based Rate Shaping.......................................................................................

723

Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................

724

Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class..........

724

Classifying Incoming Packets Using ECN and Color-Marking..................................................

725

Sample configuration to mark non-ecn packets as “yellow” with single traffic class..............

727

Policy-Based QoS Configurations....................................................................................................

729

DSCP Color Maps........................................................................................................................

729

Classify Traffic..............................................................................................................................

731

Create a QoS Policy....................................................................................................................

736

Create Policy Maps......................................................................................................................

739

Enabling QoS Rate Adjustment........................................................................................................

744

Enabling Strict-Priority Queueing....................................................................................................

745

Weighted Random Early Detection..................................................................................................

745

Creating WRED Profiles..............................................................................................................

746

Applying a WRED Profile to Traffic.............................................................................................

747

Displaying Default and Configured WRED Profiles....................................................................

747

Displaying WRED Drop Statistics................................................................................................

747

Displaying egress-queue Statistics.............................................................................................

748

Classifying Layer 2 Traffic on Layer 3 Interfaces ......................................................................

748

Classifying Packets Based on a Combination of DSCP Code Points and VLAN IDs................

749

43 Routing Information Protocol (RIP)............................................................

751

Protocol Overview.............................................................................................................................

751

RIPv1.............................................................................................................................................

751

RIPv2............................................................................................................................................

752

Implementation Information............................................................................................................

752

Configuration Information................................................................................................................

752

Configuration Task List...............................................................................................................

752

RIP Configuration Example.........................................................................................................

759

44 Remote Monitoring (RMON)........................................................................

765

Implementation Information............................................................................................................

765

Fault Recovery...................................................................................................................................

766

Setting the rmon Alarm...............................................................................................................

766

Configuring an RMON Event......................................................................................................

767

Configuring RMON Collection Statistics....................................................................................

768

Configuring the RMON Collection History................................................................................

768

Enabling an RMON MIB Collection History Group....................................................................

769

23

45 Rapid Spanning Tree Protocol (RSTP)........................................................

770

Protocol Overview............................................................................................................................

770

Configuring Rapid Spanning Tree....................................................................................................

770

Related Configuration Tasks.......................................................................................................

770

Important Points to Remember..................................................................................................

771

Configuring Interfaces for Layer 2 Mode..........................................................................................

771

Enabling Rapid Spanning Tree Protocol Globally............................................................................

771

Adding and Removing Interfaces.....................................................................................................

774

Modifying Global Parameters...........................................................................................................

775

Enable BPDU Filtering Globally.........................................................................................................

776

Modifying Interface Parameters........................................................................................................

777

Configuring an EdgePort..................................................................................................................

778

Influencing RSTP Root Selection......................................................................................................

779

SNMP Traps for Root Elections and Topology Changes.................................................................

779

Configuring Fast Hellos for Link State Detection............................................................................

779

46 Security............................................................................................................

781

AAA Accounting.................................................................................................................................

781

Configuration Task List for AAA Accounting..............................................................................

781

AAA Authentication...........................................................................................................................

783

Configuration Task List for AAA Authentication........................................................................

784

AAA Authorization.............................................................................................................................

786

Privilege Levels Overview...........................................................................................................

786

Configuration Task List for Privilege Levels................................................................................

787

RADIUS...............................................................................................................................................

791

RADIUS Authentication and Authorization.................................................................................

792

Configuration Task List for RADIUS............................................................................................

793

TACACS+...........................................................................................................................................

796

Configuration Task List for TACACS+........................................................................................

796

Choosing TACACS+ as the Authentication Method..................................................................

796

Monitoring TACACS+..................................................................................................................

798

TACACS+ Remote Authentication and Authorization...............................................................

798

Specifying a TACACS+ Server Host............................................................................................

799

Command Authorization............................................................................................................

799

Protection from TCP Tiny and Overlapping Fragment Attacks......................................................

800

Enabling SCP and SSH......................................................................................................................

800

Using SCP with SSH to Copy a Software Image........................................................................

801

Removing the RSA Host Keys and Zeroizing Storage ..............................................................

802

Configuring When to Re-generate an SSH Key ........................................................................

802

Configuring the SSH Server Key Exchange Algorithm..............................................................

803

Configuring the HMAC Algorithm for the SSH Server...............................................................

803

24

Configuring the SSH Server Cipher List.....................................................................................

804

Secure Shell Authentication.......................................................................................................

805

Troubleshooting SSH..................................................................................................................

807

Telnet................................................................................................................................................

808

VTY Line and Access-Class Configuration......................................................................................

808

VTY Line Local Authentication and Authorization....................................................................

808

VTY Line Remote Authentication and Authorization................................................................

809

VTY MAC-SA Filter Support.........................................................................................................

810

Role-Based Access Control..............................................................................................................

810

Overview of RBAC.......................................................................................................................

811

User Roles....................................................................................................................................

814

AAA Authentication and Authorization for Roles.......................................................................

817

Role Accounting.........................................................................................................................

820

Display Information About User Roles.......................................................................................

822

47 Service Provider Bridging.............................................................................

824

VLAN Stacking...................................................................................................................................

824

Important Points to Remember.................................................................................................

825

Configure VLAN Stacking...........................................................................................................

826

Creating Access and Trunk Ports...............................................................................................

826

Enable VLAN-Stacking for a VLAN.............................................................................................

827

Configuring the Protocol Type Value for the Outer VLAN Tag................................................

827

Configuring Options for Trunk Ports.........................................................................................

828

Debugging VLAN Stacking..........................................................................................................

829

VLAN Stacking in Multi-Vendor Networks.................................................................................

829

VLAN Stacking Packet Drop Precedence.........................................................................................

833

Enabling Drop Eligibility..............................................................................................................

833

Honoring the Incoming DEI Value.............................................................................................

834

Marking Egress Packets with a DEI Value..................................................................................

834

Dynamic Mode CoS for VLAN Stacking...........................................................................................

835

Mapping C-Tag to S-Tag dot1p Values.....................................................................................

836

Layer 2 Protocol Tunneling..............................................................................................................

837

Implementation Information......................................................................................................

839

Enabling Layer 2 Protocol Tunneling........................................................................................

840

Specifying a Destination MAC Address for BPDUs....................................................................

840

Setting Rate-Limit BPDUs..........................................................................................................

840

Debugging Layer 2 Protocol Tunneling.....................................................................................

841

Provider Backbone Bridging.............................................................................................................

841

48 sFlow................................................................................................................

842

Overview...........................................................................................................................................

842

Implementation Information............................................................................................................

842

25

Important Points to Remember.................................................................................................

843

Enabling and Disabling sFlow...........................................................................................................

843

Enabling and Disabling sFlow on an Interface...........................................................................

843

Enabling sFlow Max-Header Size Extended....................................................................................

844

sFlow Show Commands...................................................................................................................

845

Displaying Show sFlow Global...................................................................................................

845

Displaying Show sFlow on an Interface.....................................................................................

846

Displaying Show sFlow on a Stack Unit.....................................................................................

846

Configuring Specify Collectors........................................................................................................

846

Changing the Polling Intervals.........................................................................................................

847

Changing the Sampling Rate............................................................................................................

847

Sub-Sampling.............................................................................................................................

848

Back-Off Mechanism.......................................................................................................................

848

sFlow on LAG ports..........................................................................................................................

849

Enabling Extended sFlow.................................................................................................................

849

49 Simple Network Management Protocol (SNMP)......................................

851

Implementation Information............................................................................................................

851

Configuration Task List for SNMP...............................................................................................

851

Important Points to Remember.................................................................................................

852

SNMPv3 Compliance With FIPS.......................................................................................................

852

Set up SNMP......................................................................................................................................

853

Creating a Community...............................................................................................................

854

Setting Up User-Based Security (SNMPv3)......................................................................................

854

Reading Managed Object Values.....................................................................................................

856

Writing Managed Object Values.......................................................................................................

857

Configuring Contact and Location Information using SNMP.........................................................

857

Subscribing to Managed Object Value Updates using SNMP.........................................................

858

Enabling a Subset of SNMP Traps....................................................................................................

859

Enabling an SNMP Agent to Notify Syslog Server Failure................................................................

861

Copy Configuration Files Using SNMP............................................................................................

862

Copying a Configuration File...........................................................................................................

864

Copying Configuration Files via SNMP............................................................................................

865

Copying the Startup-Config Files to the Running-Config..............................................................

866

Copying the Startup-Config Files to the Server via FTP.................................................................

866

Copying the Startup-Config Files to the Server via TFTP................................................................

867

Copying a Binary File to the Startup-Configuration........................................................................

867

Additional MIB Objects to View Copy Statistics..............................................................................

868

MIB Support to Display the Available Memory Size on Flash..........................................................

869

Viewing the Available Flash Memory Size..................................................................................

869

MIB Support to Display the Software Core Files Generated by the System..................................

869

Viewing the Software Core Files Generated by the System......................................................

870

26

Obtaining a Value for MIB Objects...................................................................................................

870

Manage VLANs using SNMP..............................................................................................................

871

Creating a VLAN...........................................................................................................................

871

Assigning a VLAN Alias.................................................................................................................

871

Displaying the Ports in a VLAN...................................................................................................

872

Add Tagged and Untagged Ports to a VLAN..............................................................................

873

Enabling and Disabling a Port using SNMP......................................................................................

874

Fetch Dynamic MAC Entries using SNMP........................................................................................

875

Deriving Interface Indices.................................................................................................................

877

Monitor Port-Channels.....................................................................................................................

878

BMP Functionality Using SNMP SET.................................................................................................

879

Entity MIBS........................................................................................................................................

880

Physical Entity.............................................................................................................................

880

Containment Tree......................................................................................................................

880

Troubleshooting SNMP Operation...................................................................................................

881

50 Stacking...........................................................................................................

882

Stacking MXL 10/40GbE Switches...................................................................................................

882

Stack Management Roles...........................................................................................................

883

Stack Master Election.................................................................................................................

884

Failover Roles..............................................................................................................................

885

MAC Addressing..........................................................................................................................

885

Stacking LAG...............................................................................................................................

885

Supported Stacking Topologies.................................................................................................

885

Stack Group/Port Numbers..............................................................................................................

887

Configuring a Switch Stack..............................................................................................................

888

Stacking Prerequisites.................................................................................................................

888

Master Selection Criteria............................................................................................................

889

Configuring Priority and stack-group........................................................................................

889

Cabling Stacked Switches..........................................................................................................

890

Accessing the CLI........................................................................................................................

891

Configuring and Bringing Up a Stack.........................................................................................

891

Removing a Switch from a Stack...............................................................................................

894

Adding a Stack Unit.....................................................................................................................

895

Merging Two Stacks...................................................................................................................

896

Splitting a Stack...........................................................................................................................

896

Managing Redundant Stack Management.................................................................................

896

Resetting a Unit on a Stack.........................................................................................................

897

Verify a Stack Configuration.............................................................................................................

897

Using Show Commands.............................................................................................................

898

Troubleshooting a Switch Stack......................................................................................................

900

Failure Scenarios...............................................................................................................................

902

27

Stack Member FailsUnplugged Stacking CableMaster Switch FailsStack-Link Flapping

 

ErrorMaster Switch Recovers from FailureStack Unit in Card-Problem State Due to

 

Incorrect Dell Networking OS VersionStack Unit in Card-Problem State Due to

 

Configuration Mismatch.............................................................................................................

902

Upgrading a Switch Stack.................................................................................................................

905

Upgrading a Single Stack Unit..........................................................................................................

906

51 Storm Control.................................................................................................

908

Configure Storm Control.................................................................................................................

908

Configuring Storm Control from INTERFACE Mode.................................................................

908

Configuring Storm Control from CONFIGURATION Mode......................................................

908

52 Spanning Tree Protocol (STP).....................................................................

909

Protocol Overview............................................................................................................................

909

Configure Spanning Tree.................................................................................................................

909

Related Configuration Tasks......................................................................................................

909

Important Points to Remember..................................................................................................

910

Configuring Interfaces for Layer 2 Mode.........................................................................................

911

Enabling Spanning Tree Protocol Globally......................................................................................

912

Adding an Interface to the Spanning Tree Group............................................................................

915

Removing an Interface from the Spanning Tree Group..................................................................

915

Modifying Global Parameters...........................................................................................................

915

Modifying Interface STP Parameters................................................................................................

916

Enabling PortFast...............................................................................................................................

917

Prevent Network Disruptions with BPDU Guard........................................................................

918

Global BPDU Filtering.......................................................................................................................

920

Interface BPDU Filtering.............................................................................................................

920

Selecting STP Root............................................................................................................................

921

STP Root Guard................................................................................................................................

922

Root Guard Scenario..................................................................................................................

922

Configuring Root Guard.............................................................................................................

923

SNMP Traps for Root Elections and Topology Changes................................................................

924

Displaying STP Guard Configuration...............................................................................................

924

53 System Time and Date...................................................................................

925

Network Time Protocol....................................................................................................................

925

Protocol Overview......................................................................................................................

926

Configure the Network Time Protocol......................................................................................

927

Enabling NTP...............................................................................................................................

927

Configuring NTP Broadcasts......................................................................................................

928

Disabling NTP on an Interface....................................................................................................

928

Configuring a Source IP Address for NTP Packets....................................................................

928

28

Configuring NTP Authentication................................................................................................

929

Dell Networking OS Time and Date.................................................................................................

931

Configuration Task List ...............................................................................................................

931

Set Daylight Saving Time............................................................................................................

933

54 Tunneling .......................................................................................................

936

Configuring a Tunnel........................................................................................................................

936

Configuring Tunnel keepalive..........................................................................................................

937

Configuring the ip and ipv6 unnumbered.......................................................................................

938

Configuring the Tunnel allow-remote............................................................................................

938

Configuring the Tunnel Source Anylocal........................................................................................

939

55 Uplink Failure Detection (UFD)...................................................................

940

Feature Description..........................................................................................................................

940

How Uplink Failure Detection Works...............................................................................................

941

UFD and NIC Teaming......................................................................................................................

942

Important Points to Remember.......................................................................................................

943

Configuring Uplink Failure Detection..............................................................................................

943

Clearing a UFD-Disabled Interface..................................................................................................

945

Displaying Uplink Failure Detection.................................................................................................

946

Sample Configuration: Uplink Failure Detection............................................................................

948

56 Upgrade Procedures.....................................................................................

950

Get Help with Upgrades...................................................................................................................

950

57 Virtual LANs (VLANs)......................................................................................

951

Default VLAN.....................................................................................................................................

951

Port-Based VLANs.......................................................................................................................

952

VLANs and Port Tagging.............................................................................................................

953

Configuration Task List...............................................................................................................

953

Configuring Native VLANs..........................................................................................................

957

Enabling Null VLAN as the Default VLAN.........................................................................................

958

58 Virtual Link Trunking (VLT)..........................................................................

959

Overview...........................................................................................................................................

959

Multi-domain VLT.......................................................................................................................

960

VLT Terminology...............................................................................................................................

961

Configure Virtual Link Trunking........................................................................................................

961

Important Points to Remember.................................................................................................

962

Configuration Notes...................................................................................................................

962

RSTP and VLT..............................................................................................................................

966

VLT Bandwidth Monitoring.........................................................................................................

967

29

VLT and IGMP Snooping.............................................................................................................

967

VLT Port Delayed Restoration....................................................................................................

967

PIM-Sparse Mode Support on VLT.............................................................................................

968

VLT Multicast...............................................................................................................................

969

VLT Unicast Routing...................................................................................................................

970

Non-VLT ARP Sync......................................................................................................................

971

RSTP Configuration...........................................................................................................................

972

Preventing Forwarding Loops in a VLT Domain........................................................................

972

Sample RSTP Configuration........................................................................................................

972

Configuring VLT..........................................................................................................................

973

Configuring a VLT Interconnect.................................................................................................

973

Configuring a VLT Backup Link..................................................................................................

974

Configuring a VLT Port Delay Period.........................................................................................

975

Reconfiguring the Default VLT Settings (Optional) ...................................................................

975

Connecting a VLT Domain to an Attached Access Device (Switch or Server).........................

976

Configuring a VLT VLAN Peer-Down (Optional)........................................................................

977

Configure Multi-domain VLT (mVLT) (Optional)........................................................................

977

Verifying a VLT Configuration....................................................................................................

980

Connecting a VLT Domain.........................................................................................................

983

PVST+ Configuration........................................................................................................................

988

Sample PVST+ Configuration.....................................................................................................

988

mVLT Configuration Example..........................................................................................................

989

In Domain 1, configure the VLT domain and VLTi on Peer 1Configure mVLT on Peer 1Add

links to the mVLT port-channel on Peer 1Next, configure the VLT domain and VLTi on

 

Peer 2Configure mVLT on Peer 2Add links to the mVLT port-channel on Peer 2In

 

Domain 2, configure the VLT domain and VLTi on Peer 3Configure mVLT on Peer 3Add

 

links to the mVLT port-channel on Peer 3Configure the VLT domain and VLTi on Peer

 

4Configure mVLT on Peer 4Add links to the mVLT port-channel on Peer 4..........................

990

PIM-Sparse Mode Configuration Example.......................................................................................

991

Additional VLT Sample Configurations............................................................................................

992

Configuring Virtual Link Trunking (VLT Peer 1)Configuring Virtual Link Trunking (VLT Peer

 

2)Verifying a Port-Channel Connection to a VLT Domain (From an Attached Access

 

Switch).........................................................................................................................................

992

Troubleshooting VLT........................................................................................................................

994

Specifying VLT Nodes in a PVLAN...................................................................................................

996

Association of VLTi as a Member of a PVLAN............................................................................

997

MAC Synchronization for VLT Nodes in a PVLAN.....................................................................

998

PVLAN Operations When One VLT Peer is Down.....................................................................

998

PVLAN Operations When a VLT Peer is Restarted.....................................................................

998

Interoperation of VLT Nodes in a PVLAN with ARP Requests...................................................

998

Scenarios for VLAN Membership and MAC Synchronization With VLT Nodes in PVLAN.......

999

Configuring a VLT VLAN or LAG in a PVLAN.................................................................................

1000

30

Loading...
+ 1064 hidden pages