Dell MXL 10, MXL40GbE User Manual

Dell Networking Configuration Guide for the MXL 10/40GbE Switch I/O Module
9.8(0.0)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2015 - 05
Rev. A00
Contents
1 About this Guide................................................................................................. 33
Audience..............................................................................................................................................33
Conventions........................................................................................................................................ 33
Information Symbols...........................................................................................................................34
Related Documents............................................................................................................................ 34
2 Configuration Fundamentals........................................................................... 35
Accessing the Command Line............................................................................................................35
CLI Modes............................................................................................................................................35
Navigating CLI Modes................................................................................................................... 37
The do Command...............................................................................................................................40
Undoing Commands.......................................................................................................................... 40
Obtaining Help.................................................................................................................................... 41
Entering and Editing Commands....................................................................................................... 42
Command History...............................................................................................................................43
Filtering show Command Outputs.....................................................................................................43
Multiple Users in Configuration Mode............................................................................................... 44
3 Getting Started....................................................................................................46
Console Access................................................................................................................................... 47
Serial Console................................................................................................................................47
External Serial Port with a USB Connector.................................................................................. 49
Accessing the CLI Interface and Running Scripts Using SSH............................................................49
Entering CLI commands Using an SSH Connection................................................................... 49
Executing Local CLI Scripts Using an SSH Connection...............................................................49
Boot Process....................................................................................................................................... 50
Default Configuration......................................................................................................................... 52
Configuring a Host Name...................................................................................................................52
Configuring a Host Name...................................................................................................................52
Accessing the System Remotely.........................................................................................................53
Accessing the MXL Switch Remotely............................................................................................53
Configure the Management Port IP Address............................................................................... 53
Configure a Management Route.................................................................................................. 53
Configuring a Username and Password.......................................................................................54
Configuring the Enable Password......................................................................................................54
Configuration File Management.........................................................................................................55
Copy Files to and from the System.............................................................................................. 55
Save the Running-Configuration..................................................................................................56
3
Viewing Files.................................................................................................................................. 57
Managing the File System...................................................................................................................58
View the Command History............................................................................................................... 59
Using HTTP for File Transfers.............................................................................................................60
Upgrading and Downgrading the Dell Networking OS.....................................................................60
Using Hashes to Validate Software Images....................................................................................... 60
4 Management....................................................................................................... 62
Configuring Privilege Levels............................................................................................................... 62
Creating a Custom Privilege Level................................................................................................62
Customizing a Privilege Level.......................................................................................................63
Applying a Privilege Level to a Username.................................................................................... 64
Applying a Privilege Level to a Terminal Line...............................................................................65
Configuring Logging...........................................................................................................................65
Audit and Security Logs.................................................................................................................65
Configuring Logging Format .......................................................................................................67
Setting Up a Secure Connection to a Syslog Server....................................................................68
Display the Logging Buffer and the Logging Configuration............................................................. 69
Log Messages in the Internal Buffer...................................................................................................70
Configuration Task List for System Log Management.................................................................70
Disabling System Logging...................................................................................................................70
Sending System Messages to a Syslog Server....................................................................................70
Configuring a UNIX System as a Syslog Server.............................................................................71
Changing System Logging Settings.................................................................................................... 71
Display the Logging Buffer and the Logging Configuration..............................................................72
Configuring a UNIX Logging Facility Level.........................................................................................73
Synchronizing Log Messages..............................................................................................................74
Enabling Timestamp on Syslog Messages..........................................................................................74
File Transfer Services...........................................................................................................................75
Configuration Task List for File Transfer Services........................................................................ 75
Enabling the FTP Server.................................................................................................................75
Configuring FTP Server Parameters..............................................................................................76
Configuring FTP Client Parameters.............................................................................................. 76
Terminal Lines......................................................................................................................................77
Denying and Permitting Access to a Terminal Line..................................................................... 77
Configuring Login Authentication for Terminal Lines................................................................. 78
Setting Time Out of EXEC Privilege Mode......................................................................................... 79
Using Telnet to get to Another Network Device............................................................................... 79
Lock CONFIGURATION Mode........................................................................................................... 80
Viewing the Configuration Lock Status........................................................................................80
Limit Concurrent Login Sessions........................................................................................................81
Restrictions for Limiting the Number of Concurrent Sessions....................................................81
4
Configuring Concurrent Session Limit......................................................................................... 81
Enabling the System to Clear Existing Sessions...........................................................................82
Track Login Activity.............................................................................................................................83
Restrictions for Tracking Login Activity........................................................................................83
Configuring Login Activity Tracking............................................................................................. 83
Display Login Statistics..................................................................................................................84
Recovering from a Forgotten Password............................................................................................ 85
Recovering from a Forgotten Enable Password................................................................................86
Recovering from a Failed Start........................................................................................................... 86
5 802.1X...................................................................................................................88
The Port-Authentication Process.......................................................................................................90
EAP over RADIUS...........................................................................................................................92
Configuring 802.1X............................................................................................................................. 92
Related Configuration Tasks.........................................................................................................92
Important Points to Remember..........................................................................................................93
Enabling 802.1X...................................................................................................................................93
Configuring Request Identity Re-Transmissions......................................................................... 95
Configuring a Quiet Period after a Failed Authentication........................................................... 95
Forcibly Authorizing or Unauthorizing a Port....................................................................................96
Re-Authenticating a Port.................................................................................................................... 97
Configuring Timeouts.........................................................................................................................98
Configuring Dynamic VLAN Assignment with Port Authentication..................................................99
Guest and Authentication-Fail VLANs........................................................................................100
Configuring a Guest VLAN.......................................................................................................... 101
Configuring an Authentication-Fail VLAN.................................................................................. 101
6 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)......................................................................................................103
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................... 103
Guidelines for Configuring ACL VLAN groups.................................................................................104
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters........................105
Configuring ACL VLAN Groups...................................................................................................105
Configuring FP Blocks for VLAN Parameters............................................................................. 106
Viewing CAM Usage..........................................................................................................................107
Allocating FP Blocks for VLAN Processes........................................................................................ 108
7 Access Control Lists (ACLs).............................................................................110
IP Access Control Lists (ACLs)...........................................................................................................110
Implementing ACL on the Dell Networking OS................................................................................111
ACLs and VLANs.................................................................................................................................111
ACL Optimization...............................................................................................................................111
5
Determine the Order in which ACLs are Used to Classify Traffic.................................................... 111
Example of the order Keyword to Determine ACL Sequence................................................... 112
IP Fragment Handling........................................................................................................................112
IP Fragments ACL Examples..............................................................................................................113
Layer 4 ACL Rules Examples............................................................................................................. 113
Configure a Standard IP ACL.............................................................................................................114
Configuring a Standard IP ACL Filter.................................................................................................115
Configure an Extended IP ACL..........................................................................................................116
Configuring Filters with a Sequence Number.................................................................................. 116
Configuring Filters Without a Sequence Number............................................................................ 117
Established Flag................................................................................................................................. 118
Configure Layer 2 and Layer 3 ACLs.................................................................................................118
Assign an IP ACL to an Interface.......................................................................................................119
Applying an IP ACL............................................................................................................................ 119
Counting ACL Hits.............................................................................................................................120
Configure Ingress ACLs.................................................................................................................... 120
Configure Egress ACLs...................................................................................................................... 121
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................121
IP Prefix Lists......................................................................................................................................122
Implementation Information.......................................................................................................123
Configuration Task List for Prefix Lists............................................................................................. 123
Creating a Prefix List..........................................................................................................................123
Creating a Prefix List Without a Sequence Number........................................................................ 124
Viewing Prefix Lists............................................................................................................................125
Applying a Prefix List for Route Redistribution.................................................................................125
Applying a Filter to a Prefix List (OSPF).............................................................................................126
ACL Resequencing............................................................................................................................ 127
Resequencing an ACL or Prefix List..................................................................................................127
Route Maps........................................................................................................................................129
Implementation Information...................................................................................................... 129
Important Points to Remember........................................................................................................129
Configuration Task List for Route Maps...........................................................................................130
Creating a Route Map....................................................................................................................... 130
Configure Route Map Filters............................................................................................................. 131
Configuring Match Routes................................................................................................................132
Configuring Set Conditions.............................................................................................................. 133
Configure a Route Map for Route Redistribution............................................................................ 134
Configure a Route Map for Route Tagging......................................................................................135
Continue Clause................................................................................................................................135
Logging of ACL Processes................................................................................................................ 136
Guidelines for Configuring ACL Logging..........................................................................................137
Configuring ACL Logging..................................................................................................................137
6
Flow-Based Monitoring Support for ACLs....................................................................................... 138
Behavior of Flow-Based Monitoring...........................................................................................138
Enabling Flow-Based Monitoring.....................................................................................................140
8 Bidirectional Forwarding Detection (BFD).................................................. 142
How BFD Works................................................................................................................................ 142
BFD Packet Format......................................................................................................................143
BFD Sessions................................................................................................................................145
BFD Three-Way Handshake........................................................................................................145
Session State Changes................................................................................................................146
Important Points to Remember........................................................................................................147
Configure BFD...................................................................................................................................148
Configure BFD for Physical Ports............................................................................................... 148
Enabling BFD Globally.................................................................................................................148
Establishing a Session on Physical Ports.................................................................................... 149
Changing Physical Port Session Parameters..............................................................................150
Disabling and Re-Enabling BFD.................................................................................................. 151
Configure BFD for Static Routes.......................................................................................................152
Related Configuration Tasks....................................................................................................... 152
Establishing Sessions for Static Routes.......................................................................................152
Changing Static Route Session Parameters............................................................................... 153
Disabling BFD for Static Routes.................................................................................................. 153
Configure BFD for OSPF................................................................................................................... 154
Related Configuration Tasks.......................................................................................................154
Establishing Sessions with OSPF Neighbors...............................................................................155
Changing OSPF Session Parameters.......................................................................................... 156
Disabling BFD for OSPF............................................................................................................... 157
Configure BFD for OSPFv3................................................................................................................157
Related Configuration Tasks....................................................................................................... 157
Establishing Sessions with OSPFv3 Neighbors........................................................................... 157
Changing OSPFv3 Session Parameters...................................................................................... 158
Disabling BFD for OSPFv3...........................................................................................................158
Configure BFD for BGP.....................................................................................................................159
Prerequisites................................................................................................................................ 159
Establishing Sessions with BGP Neighbors................................................................................ 159
Disabling BFD for BGP.................................................................................................................161
Use BFD in a BGP Peer Group.................................................................................................... 162
Displaying BFD for BGP Information.......................................................................................... 162
Configure BFD for VRRP................................................................................................................... 166
Related Configuration Tasks....................................................................................................... 167
Establishing Sessions with All VRRP Neighbors..........................................................................167
Establishing VRRP Sessions on VRRP Neighbors....................................................................... 167
7
Changing VRRP Session Parameters.......................................................................................... 168
Disabling BFD for VRRP...............................................................................................................169
Configure BFD for VLANs................................................................................................................. 169
Related Configuration Task.........................................................................................................170
Establish Sessions with VLAN Neighbors....................................................................................170
Changing VLAN Session Parameters...........................................................................................171
Disabling BFD for VLANs..............................................................................................................171
Configure BFD for Port-Channels.....................................................................................................171
Related Configuration Tasks....................................................................................................... 172
Establish Sessions on Port-Channels..........................................................................................172
Changing Physical Port Session Parameters.............................................................................. 173
Disabling BFD for Port-Channels................................................................................................173
Configuring Protocol Liveness..........................................................................................................173
Troubleshooting BFD........................................................................................................................ 174
9 Border Gateway Protocol IPv4 (BGPv4).......................................................175
Autonomous Systems (AS)................................................................................................................ 175
Sessions and Peers............................................................................................................................ 177
Establish a Session.......................................................................................................................178
Route Reflectors................................................................................................................................179
Communities............................................................................................................................... 179
BGP Attributes...................................................................................................................................180
Best Path Selection Criteria........................................................................................................ 180
Weight..........................................................................................................................................182
Local Preference......................................................................................................................... 182
Multi-Exit Discriminators (MEDs)................................................................................................ 183
Origin........................................................................................................................................... 184
AS Path.........................................................................................................................................185
Next Hop......................................................................................................................................185
Multiprotocol BGP............................................................................................................................ 186
Implement BGP with the Dell Networking OS.................................................................................186
Additional Path (Add-Path) Support........................................................................................... 186
Advertise IGP Cost as MED for Redistributed Routes................................................................ 186
Ignore Router-ID for Some Best-Path Calculations..................................................................187
Four-Byte AS Numbers................................................................................................................187
AS4 Number Representation...................................................................................................... 188
AS Number Migration..................................................................................................................190
BGP4 Management Information Base (MIB)...............................................................................191
Important Points to Remember.................................................................................................. 191
Configuration Information................................................................................................................192
BGP Configuration............................................................................................................................ 193
Enabling BGP...............................................................................................................................194
8
Enabling MBGP Configurations.................................................................................................. 227
BGP Regular Expression Optimization.............................................................................................228
Debugging BGP................................................................................................................................ 228
Storing Last and Bad PDUs......................................................................................................... 229
PDU Counters............................................................................................................................. 230
Sample Configurations.....................................................................................................................230
10 Content Addressable Memory (CAM).........................................................240
CAM Allocation.................................................................................................................................240
Test CAM Usage................................................................................................................................ 241
View CAM-ACL Settings................................................................................................................... 242
CAM Optimization............................................................................................................................ 242
11 Control Plane Policing (CoPP)..................................................................... 243
Configure Control Plane Policing....................................................................................................244
Configuring CoPP for Protocols................................................................................................ 245
Configuring CoPP for CPU Queues........................................................................................... 247
Show Commands....................................................................................................................... 248
12 Data Center Bridging (DCB)......................................................................... 250
Ethernet Enhancements in Data Center Bridging........................................................................... 250
Priority-Based Flow Control........................................................................................................251
Enhanced Transmission Selection..............................................................................................252
Data Center Bridging Exchange Protocol (DCBx)..................................................................... 254
Data Center Bridging in a Traffic Flow.......................................................................................254
Enabling Data Center Bridging.........................................................................................................255
Configuring DCB Maps and its Attributes.................................................................................. 256
Data Center Bridging: Default Configuration.................................................................................. 259
Interworking of DCB Map With DCB Buffer Threshold Settings.................................................... 260
Configuring Priority-Based Flow Control........................................................................................ 261
Configuring Lossless Queues.....................................................................................................262
Configuring the PFC Buffer in a Switch Stack........................................................................... 263
Priority-Based Flow Control Using Dynamic Buffer Method....................................................264
Configure Enhanced Transmission Selection..................................................................................265
ETS Prerequisites and Restrictions............................................................................................. 266
Creating an ETS Priority Group.................................................................................................. 266
ETS Operation with DCBx...........................................................................................................267
Configuring Bandwidth Allocation for DCBx CIN..................................................................... 268
Hierarchical Scheduling in ETS Output Policies........................................................................ 269
Applying DCB Policies with an ETS Configuration..........................................................................269
PFC and ETS Configuration Examples............................................................................................. 270
Using PFC and ETS to Manage Data Center Traffic...................................................................270
9
Using PFC and ETS to Manage Converged Ethernet Traffic in a Switch Stack........................ 272
Applying DCB Policies in a Switch Stack..........................................................................................273
Configure a DCBx Operation............................................................................................................273
DCBx Operation.......................................................................................................................... 273
DCBx Port Roles..........................................................................................................................274
DCB Configuration Exchange.................................................................................................... 276
Configuration Source Election................................................................................................... 276
Propagation of DCB Information............................................................................................... 276
Auto-Detection and Manual Configuration of the DCBx Version.............................................277
DCBx Example............................................................................................................................. 277
DCBx Prerequisites and Restrictions.......................................................................................... 278
Configuring DCBx....................................................................................................................... 279
Verifying the DCB Configuration..................................................................................................... 283
QoS dot1p Traffic Classification and Queue Assignment...............................................................293
Configuring the Dynamic Buffer Method........................................................................................294
13 Debugging and Diagnostics.........................................................................296
Offline Diagnostics........................................................................................................................... 296
Important Points to Remember................................................................................................. 296
Running Offline Diagnostics.......................................................................................................296
Trace Logs.........................................................................................................................................299
Auto Save on Crash or Rollover................................................................................................. 299
Using the Show Hardware Commands...........................................................................................300
Enabling Environmental Monitoring.................................................................................................301
Recognize an Over-Temperature Condition.............................................................................303
Troubleshoot an Over-Temperature Condition........................................................................303
Recognize an Under-Voltage Condition................................................................................... 304
Troubleshoot an Under-Voltage Condition.............................................................................. 304
Troubleshooting Packet Loss...........................................................................................................305
Displaying Drop Counters.......................................................................................................... 305
Dataplane Statistics.....................................................................................................................306
Display Stack Port Statistics........................................................................................................ 307
Displaying Stack Member Counters...........................................................................................307
Enabling Application Core Dumps...................................................................................................308
Mini Core Dumps..............................................................................................................................308
Enabling TCP Dumps........................................................................................................................309
Enabling Buffer Statistics Tracking .................................................................................................. 310
14 Dynamic Host Configuration Protocol (DHCP)........................................ 311
DHCP Packet Format and Options................................................................................................... 311
Assign an IP Address using DHCP...............................................................................................313
Implementation Information............................................................................................................ 314
10
Configure the System to be a DHCP Server.................................................................................... 315
Configuring the Server for Automatic Address Allocation.........................................................315
Configuration Tasks.................................................................................................................... 316
Specifying a Default Gateway..................................................................................................... 317
Enabling the DHCP Server...........................................................................................................317
Configure a Method of Hostname Resolution...........................................................................318
Creating Manual Binding Entries.................................................................................................319
Debugging the DHCP Server...................................................................................................... 319
Using DHCP Clear Commands...................................................................................................319
Configure the System to be a Relay Agent......................................................................................320
Configure the System to be a DHCP Client.....................................................................................322
Configuring the DHCP Client System........................................................................................ 322
DHCP Client on a Management Interface................................................................................. 326
DHCP Client Operation with Other Features.............................................................................327
Configure Secure DHCP...................................................................................................................328
Option 82.................................................................................................................................... 328
DHCP Snooping..........................................................................................................................329
Drop DHCP Packets on Snooped VLANs Only..........................................................................332
Dynamic ARP Inspection............................................................................................................ 333
Configuring Dynamic ARP Inspection........................................................................................334
Source Address Validation.......................................................................................................... 335
15 Equal Cost Multi-Path (ECMP)......................................................................337
ECMP for Flow-Based Affinity.......................................................................................................... 337
Enabling Deterministic ECMP Next Hop.................................................................................... 337
Link Bundle Monitoring.................................................................................................................... 338
Managing ECMP Group Paths..........................................................................................................338
16 FC FLEXIO FPORT...........................................................................................340
FC FLEXIO FPORT.............................................................................................................................340
Configuring Switch Mode to FCF Port Mode..................................................................................340
Name Server...................................................................................................................................... 341
FCoE Maps........................................................................................................................................ 342
Creating an FCoE Map......................................................................................................................342
Zoning............................................................................................................................................... 344
Creating Zone and Adding Members...............................................................................................344
Creating Zone Alias and Adding Members...................................................................................... 345
Creating Zonesets.............................................................................................................................345
Activating a Zoneset......................................................................................................................... 346
Displaying the Fabric Parameters.....................................................................................................346
17 FCoE Transit.................................................................................................... 349
11
Fibre Channel over Ethernet............................................................................................................ 349
Ensure Robustness in a Converged Ethernet Network...................................................................349
FIP Snooping on Ethernet Bridges....................................................................................................351
FIP Snooping in a Switch Stack........................................................................................................ 354
Using FIP Snooping...........................................................................................................................354
Important Points to Remember................................................................................................. 354
Enabling the FCoE Transit Feature............................................................................................. 355
Enable FIP Snooping on VLANs.................................................................................................. 355
Configure the FC-MAP Value..................................................................................................... 355
Configure a Port for a Bridge-to-Bridge Link............................................................................ 355
Configure a Port for a Bridge-to-FCF Link................................................................................ 356
Impact on Other Software Features...........................................................................................356
FIP Snooping Prerequisites.........................................................................................................356
FIP Snooping Restrictions........................................................................................................... 357
Configuring FIP Snooping...........................................................................................................357
Displaying FIP Snooping Information.............................................................................................. 358
FCoE Transit Configuration Example...............................................................................................364
18 FIPS Cryptography......................................................................................... 366
Preparing the System........................................................................................................................366
Enabling FIPS Mode..........................................................................................................................366
Generating Host-Keys...................................................................................................................... 367
Monitoring FIPS Mode Status........................................................................................................... 367
Disabling FIPS Mode......................................................................................................................... 368
19 Force10 Resilient Ring Protocol (FRRP).....................................................370
Protocol Overview............................................................................................................................370
Ring Status................................................................................................................................... 371
Multiple FRRP Rings.....................................................................................................................372
Important FRRP Points................................................................................................................ 373
Important FRRP Concepts.......................................................................................................... 374
Implementing FRRP.......................................................................................................................... 375
FRRP Configuration...........................................................................................................................375
Creating the FRRP Group............................................................................................................376
Configuring the Control VLAN................................................................................................... 376
Configuring and Adding the Member VLANs.............................................................................377
Setting the FRRP Timers..............................................................................................................379
Clearing the FRRP Counters....................................................................................................... 379
Viewing the FRRP Configuration................................................................................................ 379
Viewing the FRRP Information................................................................................................... 380
Troubleshooting FRRP......................................................................................................................380
Configuration Checks.................................................................................................................380
12
Sample Configuration and Topology...............................................................................................381
20 GARP VLAN Registration Protocol (GVRP)................................................383
Important Points to Remember....................................................................................................... 383
Configure GVRP................................................................................................................................384
Related Configuration Tasks.......................................................................................................385
Enabling GVRP Globally....................................................................................................................385
Enabling GVRP on a Layer 2 Interface............................................................................................. 385
Configure GVRP Registration...........................................................................................................386
Configure a GARP Timer.................................................................................................................. 386
21 Internet Group Management Protocol (IGMP).........................................388
IGMP Protocol Overview..................................................................................................................388
IGMP Version 2........................................................................................................................... 388
IGMP Version 3........................................................................................................................... 390
IGMP Snooping.................................................................................................................................393
IGMP Snooping Implementation Information........................................................................... 393
Configuring IGMP Snooping...................................................................................................... 394
Enabling IGMP Immediate-Leave...............................................................................................394
Disabling Multicast Flooding...................................................................................................... 395
Specifying a Port as Connected to a Multicast Router..............................................................395
Configuring the Switch as Querier.............................................................................................395
Fast Convergence after MSTP Topology Changes......................................................................... 396
Designating a Multicast Router Interface........................................................................................ 396
22 Interfaces......................................................................................................... 397
Basic Interface Configuration...........................................................................................................397
Advanced Interface Configuration...................................................................................................397
Interface Types................................................................................................................................. 398
View Basic Interface Information.....................................................................................................398
Enabling a Physical Interface........................................................................................................... 400
Physical Interfaces............................................................................................................................ 401
Configuration Task List for Physical Interfaces..........................................................................401
Overview of Layer Modes........................................................................................................... 401
Configuring Layer 2 (Data Link) Mode....................................................................................... 402
Configuring Layer 2 (Interface) Mode........................................................................................402
Configuring Layer 3 (Network) Mode........................................................................................ 403
Configuring Layer 3 (Interface) Mode........................................................................................403
Management Interfaces................................................................................................................... 404
Configuring Management Interfaces on the MXL Switch.........................................................405
VLAN Interfaces................................................................................................................................ 406
Loopback Interfaces......................................................................................................................... 407
13
Null Interfaces...................................................................................................................................408
Port Channel Interfaces................................................................................................................... 408
Port Channel Definition and Standards..................................................................................... 408
Port Channel Benefits.................................................................................................................408
Port Channel Implementation................................................................................................... 409
100/1000/10000 Mbps Interfaces in Port Channels.................................................................409
Configuration Tasks for Port Channel Interfaces...................................................................... 410
Creating a Port Channel............................................................................................................. 410
Adding a Physical Interface to a Port Channel.......................................................................... 410
Reassigning an Interface to a New Port Channel...................................................................... 412
Configuring the Minimum Oper Up Links in a Port Channel.................................................... 413
Adding or Removing a Port Channel from a VLAN....................................................................413
Assigning an IP Address to a Port Channel................................................................................ 414
Deleting or Disabling a Port Channel.........................................................................................414
Load Balancing through Port Channels........................................................................................... 415
Load-Balancing Method................................................................................................................... 415
Hash Algorithm................................................................................................................................. 416
Server Ports....................................................................................................................................... 416
Default Configuration without Start-up Config......................................................................... 417
Bulk Configuration............................................................................................................................ 417
Interface Range........................................................................................................................... 417
Bulk Configuration Examples..................................................................................................... 418
Defining Interface Range Macros.....................................................................................................419
Define the Interface Range........................................................................................................ 420
Choosing an Interface-Range Macro........................................................................................ 420
Monitoring and Maintaining Interfaces............................................................................................420
Maintenance Using TDR..............................................................................................................421
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 422
Merging SFP+ Ports to QSFP 40G Ports.................................................................................... 423
Configure the MTU Size on an Interface................................................................................... 423
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................424
Important Points to Remember................................................................................................. 425
Example Scenarios......................................................................................................................425
Layer 2 Flow Control Using Ethernet Pause Frames.......................................................................425
Enabling Pause Frames...............................................................................................................426
Configure MTU Size on an Interface................................................................................................427
Port-Pipes......................................................................................................................................... 428
Auto-Negotiation on Ethernet Interfaces........................................................................................428
Setting the Speed and Duplex Mode of Ethernet Interfaces.....................................................428
View Advanced Interface Information.............................................................................................430
Configuring the Interface Sampling Size....................................................................................431
Dynamic Counters......................................................................................................................432
14
Enhanced Validation of Interface Ranges........................................................................................434
Enhanced Control of Remote Fault Indication Processing............................................................ 434
23 Internet Protocol Security (IPSec).............................................................. 435
Configuring IPSec ............................................................................................................................436
24 IPv4 Routing................................................................................................... 437
IP Addresses...................................................................................................................................... 437
Implementation Information...................................................................................................... 437
Configuration Tasks for IP Addresses........................................................................................ 438
IPv4 Path MTU Discovery Overview.................................................................................................441
Using the Configured Source IP Address in ICMP Messages..........................................................441
Configuring the ICMP Source Interface.....................................................................................442
Configuring the Duration to Establish a TCP Connection..............................................................442
Enabling Directed Broadcast............................................................................................................443
Resolution of Host Names............................................................................................................... 443
Enabling Dynamic Resolution of Host Names.......................................................................... 443
Specifying the Local System Domain and a List of Domains....................................................444
Configuring DNS with Traceroute............................................................................................. 444
ARP.................................................................................................................................................... 445
Configuration Tasks for ARP...................................................................................................... 446
ARP Learning via Gratuitous ARP..................................................................................................... 447
ARP Learning via ARP Request.........................................................................................................448
Configuring ARP Retries...................................................................................................................449
ICMP..................................................................................................................................................449
Configuration Tasks for ICMP.................................................................................................... 449
UDP Helper....................................................................................................................................... 450
Configure UDP Helper................................................................................................................450
Important Points to Remember................................................................................................. 450
Enabling UDP Helper..................................................................................................................450
Configurations Using UDP Helper....................................................................................................451
UDP Helper with Broadcast-All Addresses.................................................................................451
UDP Helper with Subnet Broadcast Addresses..........................................................................452
UDP Helper with Configured Broadcast Addresses.................................................................. 453
UDP Helper with No Configured Broadcast Addresses............................................................ 453
Troubleshooting UDP Helper...........................................................................................................453
25 IPv6 Addressing.............................................................................................. 455
Protocol Overview............................................................................................................................455
Extended Address Space.............................................................................................................455
Stateless Autoconfiguration....................................................................................................... 455
IPv6 Header Fields.............................................................................................................................457
15
Version (4 bits).............................................................................................................................457
Traffic Class (8 bits)..................................................................................................................... 457
Flow Label (20 bits)..................................................................................................................... 457
Payload Length (16 bits)..............................................................................................................458
Next Header (8 bits).................................................................................................................... 458
Hop Limit (8 bits).........................................................................................................................458
Source Address (128 bits)........................................................................................................... 459
Destination Address (128 bits).................................................................................................... 459
Extension Header Fields................................................................................................................... 459
Hop-by-Hop Options Header....................................................................................................459
Addressing........................................................................................................................................ 460
Link-local Addresses................................................................................................................... 461
Static and Dynamic Addressing.................................................................................................. 461
Implementing IPv6 with the Dell Networking OS............................................................................461
ICMPv6..............................................................................................................................................464
Path MTU Discovery......................................................................................................................... 464
IPv6 Neighbor Discovery..................................................................................................................465
IPv6 Neighbor Discovery of MTU Packets.................................................................................466
Configuring the IPv6 Recursive DNS Server..............................................................................466
Debugging IPv6 RDNSS Information Sent to the Host .............................................................467
Displaying IPv6 RDNSS Information...........................................................................................467
IPv6 Multicast....................................................................................................................................467
Secure Shell (SSH) Over an IPv6 Transport..................................................................................... 468
Configuration Task List for IPv6.......................................................................................................468
Adjusting Your CAM-Profile....................................................................................................... 468
Assigning an IPv6 Address to an Interface.................................................................................469
Assigning a Static IPv6 Route..................................................................................................... 470
Configuring Telnet with IPv6......................................................................................................470
SNMP over IPv6........................................................................................................................... 471
Showing IPv6 Information...........................................................................................................471
Showing an IPv6 Interface.......................................................................................................... 471
Showing IPv6 Routes.................................................................................................................. 472
Showing the Running-Configuration for an Interface.............................................................. 473
Clearing IPv6 Routes...................................................................................................................474
26 iSCSI Optimization.........................................................................................475
iSCSI Optimization Overview............................................................................................................475
Monitoring iSCSI Traffic Flows....................................................................................................477
Information Monitored in iSCSI Traffic Flows............................................................................ 477
Detection and Auto-Configuration for Dell EqualLogic Arrays.................................................477
Configuring Detection and Ports for Dell Compellent Arrays.................................................. 478
iSCSI Optimization: Operation................................................................................................... 478
16
Default iSCSI Optimization Values............................................................................................. 479
Displaying iSCSI Optimization Information..................................................................................... 479
27 Intermediate System to Intermediate System.......................................... 481
IS-IS Protocol Overview....................................................................................................................481
IS-IS Addressing................................................................................................................................ 481
Multi-Topology IS-IS........................................................................................................................ 482
Transition Mode..........................................................................................................................483
Interface Support........................................................................................................................ 483
Adjacencies................................................................................................................................. 483
Graceful Restart................................................................................................................................ 483
Timers..........................................................................................................................................484
Implementation Information............................................................................................................484
Configuration Information............................................................................................................... 485
Configuration Tasks for IS-IS......................................................................................................485
IS-IS Metric Styles............................................................................................................................. 502
Configure Metric Values...................................................................................................................502
Maximum Values in the Routing Table...................................................................................... 502
Change the IS-IS Metric Style in One Level Only...................................................................... 502
Leaks from One Level to Another.............................................................................................. 504
Sample Configurations.....................................................................................................................505
28 Link Aggregation Control Protocol (LACP)...............................................510
Introduction to Dynamic LAGs and LACP........................................................................................510
Important Points to Remember..................................................................................................510
LACP Modes.................................................................................................................................511
Configuring LACP Commands....................................................................................................511
LACP Configuration Tasks................................................................................................................ 512
Creating a LAG.............................................................................................................................512
Configuring the LAG Interfaces as Dynamic.............................................................................. 513
Setting the LACP Long Timeout................................................................................................. 513
Shared LAG State Tracking............................................................................................................... 514
Configuring Shared LAG State Tracking...........................................................................................515
Important Points about Shared LAG State Tracking...................................................................517
LACP Basic Configuration Example..................................................................................................517
Configure a LAG on ALPHA.........................................................................................................517
29 Layer 2..............................................................................................................526
Manage the MAC Address Table...................................................................................................... 526
Clearing the MAC Address Table................................................................................................526
Setting the Aging Time for Dynamic Entries..............................................................................526
Configuring a Static MAC Address..............................................................................................527
17
Displaying the MAC Address Table.............................................................................................527
MAC Learning Limit...........................................................................................................................527
Setting the MAC Learning Limit..................................................................................................528
mac learning-limit Dynamic.......................................................................................................528
mac learning-limit station-move............................................................................................... 529
Learning Limit Violation Actions.................................................................................................529
Setting Station Move Violation Actions......................................................................................529
Recovering from Learning Limit and Station Move Violations..................................................530
NIC Teaming.....................................................................................................................................530
MAC Move Optimization.............................................................................................................532
30 Link Layer Discovery Protocol (LLDP)........................................................ 533
802.1AB (LLDP) Overview................................................................................................................. 533
Protocol Data Units.....................................................................................................................533
Optional TLVs....................................................................................................................................534
Management TLVs.......................................................................................................................535
TIA-1057 (LLDP-MED) Overview...................................................................................................... 537
TIA Organizationally Specific TLVs............................................................................................. 537
Extended Power via MDI TLV......................................................................................................541
Configure LLDP.................................................................................................................................542
Related Configuration Tasks.......................................................................................................542
Important Points to Remember................................................................................................. 542
LLDP Compatibility..................................................................................................................... 542
CONFIGURATION versus INTERFACE Configurations....................................................................542
Enabling LLDP................................................................................................................................... 543
Disabling and Undoing LLDP......................................................................................................543
Advertising TLVs................................................................................................................................544
Viewing the LLDP Configuration......................................................................................................545
Viewing Information Advertised by Adjacent LLDP Agents............................................................ 546
Configuring LLDPDU Intervals..........................................................................................................547
Configuring Transmit and Receive Mode........................................................................................548
Configuring a Time to Live...............................................................................................................549
Debugging LLDP...............................................................................................................................549
Relevant Management Objects........................................................................................................550
31 Microsoft Network Load Balancing............................................................ 557
NLB Unicast Mode Scenario............................................................................................................. 557
NLB Multicast Mode Scenario.......................................................................................................... 558
Limitations With Enabling NLB on Switches....................................................................................558
Benefits and Working of Microsoft Clustering................................................................................ 558
Enable and Disable VLAN Flooding .................................................................................................559
Configuring a Switch for NLB ..........................................................................................................559
18
..................................................................................................................................................... 559
32 Multicast Source Discovery Protocol (MSDP)...........................................560
Protocol Overview............................................................................................................................560
Anycast RP.........................................................................................................................................562
Implementation Information............................................................................................................562
Configure the Multicast Source Discovery Protocol.......................................................................563
Related Configuration Tasks.......................................................................................................563
Enabling MSDP..................................................................................................................................567
Manage the Source-Active Cache...................................................................................................568
Viewing the Source-Active Cache............................................................................................. 568
Limiting the Source-Active Cache............................................................................................. 569
Clearing the Source-Active Cache.............................................................................................569
Enabling the Rejected Source-Active Cache.............................................................................569
Accept Source-Active Messages that Fail the RFP Check.............................................................. 569
Specifying Source-Active Messages.................................................................................................573
Limiting the Source-Active Messages from a Peer..........................................................................574
Preventing MSDP from Caching a Local Source............................................................................. 574
Preventing MSDP from Caching a Remote Source......................................................................... 575
Preventing MSDP from Advertising a Local Source.........................................................................576
Logging Changes in Peership States................................................................................................ 577
Terminating a Peership..................................................................................................................... 577
Clearing Peer Statistics..................................................................................................................... 578
Debugging MSDP..............................................................................................................................578
MSDP with Anycast RP......................................................................................................................579
Configuring Anycast RP....................................................................................................................580
Reducing Source-Active Message Flooding.............................................................................. 581
Specifying the RP Address Used in SA Messages.......................................................................581
MSDP Sample Configurations..........................................................................................................584
33 Multiple Spanning Tree Protocol (MSTP)...................................................587
Protocol Overview............................................................................................................................ 587
Spanning Tree Variations..................................................................................................................588
Implementation Information............................................................................................................588
Configure Multiple Spanning Tree Protocol....................................................................................588
Related Configuration Tasks...................................................................................................... 588
Enable Multiple Spanning Tree Globally..........................................................................................589
Creating Multiple Spanning Tree Instances.....................................................................................589
Influencing MSTP Root Selection.................................................................................................... 590
Interoperate with Non-Dell Networking OS Bridges.......................................................................591
Changing the Region Name or Revision..........................................................................................591
Modifying Global Parameters...........................................................................................................592
19
Enable BPDU Filtering Globally........................................................................................................ 593
Modifying the Interface Parameters.................................................................................................594
Configuring an EdgePort..................................................................................................................595
Flush MAC Addresses after a Topology Change............................................................................. 596
MSTP Sample Configurations...........................................................................................................596
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration.............................................................597
Debugging and Verifying MSTP Configurations............................................................................. 600
34 Multicast Features......................................................................................... 603
Enabling IP Multicast........................................................................................................................ 603
Implementation Information............................................................................................................603
First Packet Forwarding for Lossless Multicast................................................................................604
Multicast Policies..............................................................................................................................604
IPv4 Multicast Policies......................................................................................................................604
Limiting the Number of Multicast Routes..................................................................................605
Preventing a Host from Joining a Group...................................................................................605
Rate Limiting IGMP Join Requests.............................................................................................609
Preventing a PIM Router from Forming an Adjacency..............................................................609
Preventing a Source from Registering with the RP...................................................................609
Preventing a PIM Router from Processing a Join...................................................................... 612
35 Open Shortest Path First (OSPFv2 and OSPFv3).......................................613
Protocol Overview............................................................................................................................ 613
Autonomous System (AS) Areas..................................................................................................613
Area Types................................................................................................................................... 614
Networks and Neighbors............................................................................................................ 615
Router Types................................................................................................................................615
Link-State Advertisements (LSAs)................................................................................................617
Router Priority and Cost..............................................................................................................619
OSPF with the Dell Networking OS..................................................................................................619
Graceful Restart.......................................................................................................................... 620
Fast Convergence (OSPFv2, IPv4 Only)......................................................................................621
Multi-Process OSPFv2 (IPv4 only).............................................................................................. 621
RFC-2328 Compliant OSPF Flooding........................................................................................ 622
OSPF ACK Packing...................................................................................................................... 623
Setting OSPF Adjacency with Cisco Routers............................................................................. 623
Configuration Information............................................................................................................... 624
Configuration Task List for OSPFv2 (OSPF for IPv4)..................................................................624
Troubleshooting OSPFv2............................................................................................................638
Configuration Task List for OSPFv3 (OSPF for IPv6)....................................................................... 642
Enabling IPv6 Unicast Routing................................................................................................... 643
20
Assigning IPv6 Addresses on an Interface................................................................................. 643
Assigning Area ID on an Interface..............................................................................................643
Assigning OSPFv3 Process ID and Router ID Globally.............................................................. 644
Configuring Stub Areas...............................................................................................................644
Configuring Passive-Interface....................................................................................................644
Redistributing Routes..................................................................................................................645
Configuring a Default Route...................................................................................................... 645
Enabling OSPFv3 Graceful Restart............................................................................................. 646
Displaying Graceful Restart........................................................................................................ 647
OSPFv3 Authentication Using IPsec...........................................................................................648
36 Policy-based Routing (PBR).........................................................................658
Overview........................................................................................................................................... 658
Implementing Policy-based Routing with Dell Networking OS.....................................................660
Configuration Task List for Policy-based Routing.......................................................................... 660
PBR Exceptions (Permit)............................................................................................................. 663
Sample Configuration...................................................................................................................... 666
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View
Redirect-List GOLD.................................................................................................................... 666
37 PIM Sparse-Mode (PIM-SM)..........................................................................671
Implementation Information............................................................................................................ 671
Protocol Overview.............................................................................................................................671
Requesting Multicast Traffic........................................................................................................671
Refuse Multicast Traffic...............................................................................................................672
Send Multicast Traffic..................................................................................................................672
Configuring PIM-SM......................................................................................................................... 673
Related Configuration Tasks.......................................................................................................673
Enable PIM-SM..................................................................................................................................673
Configuring S,G Expiry Timers..........................................................................................................675
Configuring a Static Rendezvous Point........................................................................................... 676
Overriding Bootstrap Router Updates........................................................................................676
Configuring a Designated Router.....................................................................................................677
Creating Multicast Boundaries and Domains...................................................................................677
Enabling PIM-SM Graceful Restart...................................................................................................678
38 PIM Source-Specific Mode (PIM-SSM).......................................................679
Configure PIM-SMM......................................................................................................................... 679
Related Configuration Tasks.......................................................................................................679
Implementation Information........................................................................................................... 680
Important Points to Remember.................................................................................................680
Enabling PIM-SSM............................................................................................................................ 680
21
Use PIM-SSM with IGMP Version 2 Hosts........................................................................................681
Configuring PIM-SSM with IGMPv2............................................................................................681
39 Port Monitoring..............................................................................................683
Important Points to Remember....................................................................................................... 683
Configuring Port Monitoring............................................................................................................684
Enabling Flow-Based Monitoring.................................................................................................... 686
Remote Port Mirroring......................................................................................................................687
Remote Port Mirroring Example.................................................................................................687
Configuring Remote Port Mirroring...........................................................................................688
Displaying Remote-Port Mirroring Configurations...................................................................690
Configuring the Sample Remote Port Mirroring....................................................................... 690
Configuring the Encapsulated Remote Port Mirroring................................................................... 693
Configuration steps for ERPM ................................................................................................... 693
ERPM Behavior on a typical Dell Networking OS ...........................................................................695
Decapsulation of ERPM packets at the Destination IP/ Analyzer............................................. 695
40 Private VLANs (PVLAN)..................................................................................697
Private VLAN Concepts.....................................................................................................................697
Using the Private VLAN Commands.......................................................................................... 698
Configuration Task List...............................................................................................................699
Private VLAN Configuration Example.........................................................................................703
41 Per-VLAN Spanning Tree Plus (PVST+).......................................................707
Protocol Overview............................................................................................................................ 707
Implementation Information......................................................................................................708
Configure Per-VLAN Spanning Tree Plus........................................................................................ 708
Related Configuration Tasks...................................................................................................... 708
Enabling PVST+.................................................................................................................................708
Disabling PVST+................................................................................................................................709
Influencing PVST+ Root Selection.............................................................................................709
Modifying Global PVST+ Parameters................................................................................................711
Modifying Interface PVST+ Parameters............................................................................................712
Configuring an EdgePort...................................................................................................................713
PVST+ in Multi-Vendor Networks.....................................................................................................714
Enabling PVST+ Extend System ID................................................................................................... 714
PVST+ Sample Configurations..........................................................................................................715
Enable BPDU Filtering globally..........................................................................................................717
42 Quality of Service (QoS)................................................................................ 719
Implementation Information.............................................................................................................721
Port-Based QoS Configurations....................................................................................................... 721
22
Setting dot1p Priorities for Incoming Traffic.............................................................................. 721
Honoring dot1p Priorities on Ingress Traffic..............................................................................722
Configuring Port-Based Rate Policing....................................................................................... 723
Configuring Port-Based Rate Shaping....................................................................................... 723
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................ 724
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class..........724
Classifying Incoming Packets Using ECN and Color-Marking..................................................725
Sample configuration to mark non-ecn packets as “yellow” with single traffic class..............727
Policy-Based QoS Configurations....................................................................................................729
DSCP Color Maps........................................................................................................................729
Classify Traffic..............................................................................................................................731
Create a QoS Policy.................................................................................................................... 736
Create Policy Maps......................................................................................................................739
Enabling QoS Rate Adjustment........................................................................................................ 744
Enabling Strict-Priority Queueing.................................................................................................... 745
Weighted Random Early Detection..................................................................................................745
Creating WRED Profiles.............................................................................................................. 746
Applying a WRED Profile to Traffic............................................................................................. 747
Displaying Default and Configured WRED Profiles....................................................................747
Displaying WRED Drop Statistics................................................................................................ 747
Displaying egress-queue Statistics.............................................................................................748
Classifying Layer 2 Traffic on Layer 3 Interfaces ...................................................................... 748
Classifying Packets Based on a Combination of DSCP Code Points and VLAN IDs................ 749
43 Routing Information Protocol (RIP)............................................................751
Protocol Overview.............................................................................................................................751
RIPv1.............................................................................................................................................751
RIPv2............................................................................................................................................ 752
Implementation Information............................................................................................................ 752
Configuration Information................................................................................................................752
Configuration Task List............................................................................................................... 752
RIP Configuration Example.........................................................................................................759
44 Remote Monitoring (RMON)........................................................................765
Implementation Information............................................................................................................ 765
Fault Recovery...................................................................................................................................766
Setting the rmon Alarm...............................................................................................................766
Configuring an RMON Event...................................................................................................... 767
Configuring RMON Collection Statistics....................................................................................768
Configuring the RMON Collection History................................................................................768
Enabling an RMON MIB Collection History Group....................................................................769
23
45 Rapid Spanning Tree Protocol (RSTP)........................................................770
Protocol Overview............................................................................................................................ 770
Configuring Rapid Spanning Tree.................................................................................................... 770
Related Configuration Tasks.......................................................................................................770
Important Points to Remember.................................................................................................. 771
Configuring Interfaces for Layer 2 Mode..........................................................................................771
Enabling Rapid Spanning Tree Protocol Globally............................................................................ 771
Adding and Removing Interfaces..................................................................................................... 774
Modifying Global Parameters........................................................................................................... 775
Enable BPDU Filtering Globally.........................................................................................................776
Modifying Interface Parameters........................................................................................................777
Configuring an EdgePort.................................................................................................................. 778
Influencing RSTP Root Selection......................................................................................................779
SNMP Traps for Root Elections and Topology Changes.................................................................779
Configuring Fast Hellos for Link State Detection............................................................................ 779
46 Security............................................................................................................ 781
AAA Accounting.................................................................................................................................781
Configuration Task List for AAA Accounting.............................................................................. 781
AAA Authentication...........................................................................................................................783
Configuration Task List for AAA Authentication........................................................................ 784
AAA Authorization.............................................................................................................................786
Privilege Levels Overview........................................................................................................... 786
Configuration Task List for Privilege Levels................................................................................787
RADIUS...............................................................................................................................................791
RADIUS Authentication and Authorization.................................................................................792
Configuration Task List for RADIUS............................................................................................793
TACACS+...........................................................................................................................................796
Configuration Task List for TACACS+........................................................................................ 796
Choosing TACACS+ as the Authentication Method..................................................................796
Monitoring TACACS+..................................................................................................................798
TACACS+ Remote Authentication and Authorization...............................................................798
Specifying a TACACS+ Server Host............................................................................................799
Command Authorization............................................................................................................799
Protection from TCP Tiny and Overlapping Fragment Attacks......................................................800
Enabling SCP and SSH......................................................................................................................800
Using SCP with SSH to Copy a Software Image........................................................................ 801
Removing the RSA Host Keys and Zeroizing Storage .............................................................. 802
Configuring When to Re-generate an SSH Key ........................................................................802
Configuring the SSH Server Key Exchange Algorithm.............................................................. 803
Configuring the HMAC Algorithm for the SSH Server...............................................................803
24
Configuring the SSH Server Cipher List.....................................................................................804
Secure Shell Authentication....................................................................................................... 805
Troubleshooting SSH..................................................................................................................807
Telnet................................................................................................................................................ 808
VTY Line and Access-Class Configuration......................................................................................808
VTY Line Local Authentication and Authorization.................................................................... 808
VTY Line Remote Authentication and Authorization................................................................ 809
VTY MAC-SA Filter Support.........................................................................................................810
Role-Based Access Control..............................................................................................................810
Overview of RBAC....................................................................................................................... 811
User Roles....................................................................................................................................814
AAA Authentication and Authorization for Roles....................................................................... 817
Role Accounting......................................................................................................................... 820
Display Information About User Roles.......................................................................................822
47 Service Provider Bridging.............................................................................824
VLAN Stacking...................................................................................................................................824
Important Points to Remember................................................................................................. 825
Configure VLAN Stacking........................................................................................................... 826
Creating Access and Trunk Ports...............................................................................................826
Enable VLAN-Stacking for a VLAN............................................................................................. 827
Configuring the Protocol Type Value for the Outer VLAN Tag................................................ 827
Configuring Options for Trunk Ports......................................................................................... 828
Debugging VLAN Stacking..........................................................................................................829
VLAN Stacking in Multi-Vendor Networks.................................................................................829
VLAN Stacking Packet Drop Precedence.........................................................................................833
Enabling Drop Eligibility..............................................................................................................833
Honoring the Incoming DEI Value.............................................................................................834
Marking Egress Packets with a DEI Value.................................................................................. 834
Dynamic Mode CoS for VLAN Stacking...........................................................................................835
Mapping C-Tag to S-Tag dot1p Values..................................................................................... 836
Layer 2 Protocol Tunneling.............................................................................................................. 837
Implementation Information......................................................................................................839
Enabling Layer 2 Protocol Tunneling........................................................................................ 840
Specifying a Destination MAC Address for BPDUs....................................................................840
Setting Rate-Limit BPDUs.......................................................................................................... 840
Debugging Layer 2 Protocol Tunneling..................................................................................... 841
Provider Backbone Bridging.............................................................................................................841
48 sFlow................................................................................................................ 842
Overview........................................................................................................................................... 842
Implementation Information............................................................................................................842
25
Important Points to Remember................................................................................................. 843
Enabling and Disabling sFlow...........................................................................................................843
Enabling and Disabling sFlow on an Interface...........................................................................843
Enabling sFlow Max-Header Size Extended....................................................................................844
sFlow Show Commands...................................................................................................................845
Displaying Show sFlow Global................................................................................................... 845
Displaying Show sFlow on an Interface.....................................................................................846
Displaying Show sFlow on a Stack Unit.....................................................................................846
Configuring Specify Collectors........................................................................................................846
Changing the Polling Intervals......................................................................................................... 847
Changing the Sampling Rate............................................................................................................847
Sub-Sampling............................................................................................................................. 848
Back-Off Mechanism....................................................................................................................... 848
sFlow on LAG ports.......................................................................................................................... 849
Enabling Extended sFlow................................................................................................................. 849
49 Simple Network Management Protocol (SNMP)......................................851
Implementation Information............................................................................................................ 851
Configuration Task List for SNMP...............................................................................................851
Important Points to Remember................................................................................................. 852
SNMPv3 Compliance With FIPS....................................................................................................... 852
Set up SNMP......................................................................................................................................853
Creating a Community............................................................................................................... 854
Setting Up User-Based Security (SNMPv3)...................................................................................... 854
Reading Managed Object Values.....................................................................................................856
Writing Managed Object Values.......................................................................................................857
Configuring Contact and Location Information using SNMP.........................................................857
Subscribing to Managed Object Value Updates using SNMP.........................................................858
Enabling a Subset of SNMP Traps.................................................................................................... 859
Enabling an SNMP Agent to Notify Syslog Server Failure................................................................861
Copy Configuration Files Using SNMP............................................................................................ 862
Copying a Configuration File........................................................................................................... 864
Copying Configuration Files via SNMP............................................................................................ 865
Copying the Startup-Config Files to the Running-Config..............................................................866
Copying the Startup-Config Files to the Server via FTP................................................................. 866
Copying the Startup-Config Files to the Server via TFTP................................................................867
Copying a Binary File to the Startup-Configuration........................................................................867
Additional MIB Objects to View Copy Statistics.............................................................................. 868
MIB Support to Display the Available Memory Size on Flash..........................................................869
Viewing the Available Flash Memory Size..................................................................................869
MIB Support to Display the Software Core Files Generated by the System.................................. 869
Viewing the Software Core Files Generated by the System......................................................870
26
Obtaining a Value for MIB Objects...................................................................................................870
Manage VLANs using SNMP..............................................................................................................871
Creating a VLAN...........................................................................................................................871
Assigning a VLAN Alias.................................................................................................................871
Displaying the Ports in a VLAN................................................................................................... 872
Add Tagged and Untagged Ports to a VLAN..............................................................................873
Enabling and Disabling a Port using SNMP......................................................................................874
Fetch Dynamic MAC Entries using SNMP........................................................................................ 875
Deriving Interface Indices................................................................................................................. 877
Monitor Port-Channels.....................................................................................................................878
BMP Functionality Using SNMP SET.................................................................................................879
Entity MIBS........................................................................................................................................880
Physical Entity.............................................................................................................................880
Containment Tree...................................................................................................................... 880
Troubleshooting SNMP Operation...................................................................................................881
50 Stacking........................................................................................................... 882
Stacking MXL 10/40GbE Switches................................................................................................... 882
Stack Management Roles........................................................................................................... 883
Stack Master Election................................................................................................................. 884
Failover Roles.............................................................................................................................. 885
MAC Addressing..........................................................................................................................885
Stacking LAG............................................................................................................................... 885
Supported Stacking Topologies................................................................................................. 885
Stack Group/Port Numbers..............................................................................................................887
Configuring a Switch Stack..............................................................................................................888
Stacking Prerequisites.................................................................................................................888
Master Selection Criteria............................................................................................................ 889
Configuring Priority and stack-group........................................................................................889
Cabling Stacked Switches.......................................................................................................... 890
Accessing the CLI........................................................................................................................891
Configuring and Bringing Up a Stack......................................................................................... 891
Removing a Switch from a Stack............................................................................................... 894
Adding a Stack Unit.....................................................................................................................895
Merging Two Stacks................................................................................................................... 896
Splitting a Stack...........................................................................................................................896
Managing Redundant Stack Management.................................................................................896
Resetting a Unit on a Stack.........................................................................................................897
Verify a Stack Configuration.............................................................................................................897
Using Show Commands.............................................................................................................898
Troubleshooting a Switch Stack...................................................................................................... 900
Failure Scenarios...............................................................................................................................902
27
Stack Member FailsUnplugged Stacking CableMaster Switch FailsStack-Link Flapping ErrorMaster Switch Recovers from FailureStack Unit in Card-Problem State Due to Incorrect Dell Networking OS VersionStack Unit in Card-Problem State Due to
Configuration Mismatch.............................................................................................................902
Upgrading a Switch Stack.................................................................................................................905
Upgrading a Single Stack Unit..........................................................................................................906
51 Storm Control.................................................................................................908
Configure Storm Control................................................................................................................. 908
Configuring Storm Control from INTERFACE Mode.................................................................908
Configuring Storm Control from CONFIGURATION Mode......................................................908
52 Spanning Tree Protocol (STP)..................................................................... 909
Protocol Overview............................................................................................................................909
Configure Spanning Tree................................................................................................................. 909
Related Configuration Tasks...................................................................................................... 909
Important Points to Remember..................................................................................................910
Configuring Interfaces for Layer 2 Mode......................................................................................... 911
Enabling Spanning Tree Protocol Globally...................................................................................... 912
Adding an Interface to the Spanning Tree Group............................................................................915
Removing an Interface from the Spanning Tree Group..................................................................915
Modifying Global Parameters........................................................................................................... 915
Modifying Interface STP Parameters................................................................................................916
Enabling PortFast...............................................................................................................................917
Prevent Network Disruptions with BPDU Guard........................................................................918
Global BPDU Filtering.......................................................................................................................920
Interface BPDU Filtering............................................................................................................. 920
Selecting STP Root............................................................................................................................921
STP Root Guard................................................................................................................................ 922
Root Guard Scenario.................................................................................................................. 922
Configuring Root Guard............................................................................................................. 923
SNMP Traps for Root Elections and Topology Changes................................................................ 924
Displaying STP Guard Configuration............................................................................................... 924
53 System Time and Date...................................................................................925
Network Time Protocol....................................................................................................................925
Protocol Overview......................................................................................................................926
Configure the Network Time Protocol...................................................................................... 927
Enabling NTP...............................................................................................................................927
Configuring NTP Broadcasts......................................................................................................928
Disabling NTP on an Interface....................................................................................................928
Configuring a Source IP Address for NTP Packets....................................................................928
28
Configuring NTP Authentication................................................................................................929
Dell Networking OS Time and Date................................................................................................. 931
Configuration Task List ...............................................................................................................931
Set Daylight Saving Time............................................................................................................ 933
54 Tunneling ....................................................................................................... 936
Configuring a Tunnel........................................................................................................................936
Configuring Tunnel keepalive.......................................................................................................... 937
Configuring the ip and ipv6 unnumbered....................................................................................... 938
Configuring the Tunnel allow-remote............................................................................................ 938
Configuring the Tunnel Source Anylocal........................................................................................ 939
55 Uplink Failure Detection (UFD)................................................................... 940
Feature Description.......................................................................................................................... 940
How Uplink Failure Detection Works............................................................................................... 941
UFD and NIC Teaming......................................................................................................................942
Important Points to Remember....................................................................................................... 943
Configuring Uplink Failure Detection.............................................................................................. 943
Clearing a UFD-Disabled Interface.................................................................................................. 945
Displaying Uplink Failure Detection.................................................................................................946
Sample Configuration: Uplink Failure Detection............................................................................ 948
56 Upgrade Procedures..................................................................................... 950
Get Help with Upgrades...................................................................................................................950
57 Virtual LANs (VLANs)...................................................................................... 951
Default VLAN..................................................................................................................................... 951
Port-Based VLANs.......................................................................................................................952
VLANs and Port Tagging.............................................................................................................953
Configuration Task List............................................................................................................... 953
Configuring Native VLANs.......................................................................................................... 957
Enabling Null VLAN as the Default VLAN.........................................................................................958
58 Virtual Link Trunking (VLT).......................................................................... 959
Overview........................................................................................................................................... 959
Multi-domain VLT.......................................................................................................................960
VLT Terminology...............................................................................................................................961
Configure Virtual Link Trunking........................................................................................................961
Important Points to Remember................................................................................................. 962
Configuration Notes................................................................................................................... 962
RSTP and VLT..............................................................................................................................966
VLT Bandwidth Monitoring.........................................................................................................967
29
VLT and IGMP Snooping.............................................................................................................967
VLT Port Delayed Restoration.................................................................................................... 967
PIM-Sparse Mode Support on VLT.............................................................................................968
VLT Multicast...............................................................................................................................969
VLT Unicast Routing................................................................................................................... 970
Non-VLT ARP Sync......................................................................................................................971
RSTP Configuration...........................................................................................................................972
Preventing Forwarding Loops in a VLT Domain........................................................................ 972
Sample RSTP Configuration........................................................................................................972
Configuring VLT.......................................................................................................................... 973
Configuring a VLT Interconnect.................................................................................................973
Configuring a VLT Backup Link.................................................................................................. 974
Configuring a VLT Port Delay Period......................................................................................... 975
Reconfiguring the Default VLT Settings (Optional) ...................................................................975
Connecting a VLT Domain to an Attached Access Device (Switch or Server).........................976
Configuring a VLT VLAN Peer-Down (Optional)........................................................................977
Configure Multi-domain VLT (mVLT) (Optional)........................................................................977
Verifying a VLT Configuration.................................................................................................... 980
Connecting a VLT Domain......................................................................................................... 983
PVST+ Configuration........................................................................................................................988
Sample PVST+ Configuration.....................................................................................................988
mVLT Configuration Example..........................................................................................................989
In Domain 1, configure the VLT domain and VLTi on Peer 1Configure mVLT on Peer 1Add links to the mVLT port-channel on Peer 1Next, configure the VLT domain and VLTi on Peer 2Configure mVLT on Peer 2Add links to the mVLT port-channel on Peer 2In Domain 2, configure the VLT domain and VLTi on Peer 3Configure mVLT on Peer 3Add links to the mVLT port-channel on Peer 3Configure the VLT domain and VLTi on Peer
4Configure mVLT on Peer 4Add links to the mVLT port-channel on Peer 4..........................990
PIM-Sparse Mode Configuration Example.......................................................................................991
Additional VLT Sample Configurations............................................................................................ 992
Configuring Virtual Link Trunking (VLT Peer 1)Configuring Virtual Link Trunking (VLT Peer
2)Verifying a Port-Channel Connection to a VLT Domain (From an Attached Access
Switch).........................................................................................................................................992
Troubleshooting VLT........................................................................................................................994
Specifying VLT Nodes in a PVLAN................................................................................................... 996
Association of VLTi as a Member of a PVLAN............................................................................997
MAC Synchronization for VLT Nodes in a PVLAN..................................................................... 998
PVLAN Operations When One VLT Peer is Down..................................................................... 998
PVLAN Operations When a VLT Peer is Restarted.....................................................................998
Interoperation of VLT Nodes in a PVLAN with ARP Requests...................................................998
Scenarios for VLAN Membership and MAC Synchronization With VLT Nodes in PVLAN....... 999
Configuring a VLT VLAN or LAG in a PVLAN.................................................................................1000
30
Loading...
+ 1064 hidden pages