Dell N3000, N1500, N2100-ON, N3100-ON, N2000 User Manual

...
Dell EMC Networking N-Series
N1100-ON, N1500, N2000,
N2100-ON, N3000, N3100-ON,
and N4000 Switches
User’s Configuration
Guide
Version 6.3.0.x - N2000/N3000/N4000 Series Switches
Version 6.3.5.x - N3100-ON Series Switches
Version 6.4.x.x - N1100-ON Series Switches
Regulatory Models: E04W, E05W, E06W, E07W, E15W, E16W, E17W, E18W, PowerConnect 8132, PowerConnect 8132F, PowerConnect 8164, PowerConnect 8164F
Notes and Cautions
NOTE: A NOTE indicates important information that helps you make better use of
your computer.
CAUTION: A CAUTION indicates potential damage to hardware or loss of data if
instructions are not followed.
____________
Information in this publication is subject to change without notice.
Copyright © 2017 Dell EMC Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell EMC™ and the Dell EMC logo are trademarks of Dell EMC Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
Marketing Models: N1108T-ON, N1108P-ON, N1124T-ON, N1124P-ON, N1148T-ON, N1148P-ON, N1524, N1524P, N15 48, N1548P, N2024, N2024P, N2048, N2048P, N2128PX-ON , N3024, N3024F, N3024P, N3048, N3048P, N3132PX-ON, N4032, N4032F, N4064 , N4064F
Regulatory Models: E04W, E05W, E06W, E07W, E15W, E16W, E17W, E18W, PowerConnect 8132, PowerConnect 8132F, PowerConnect 8164, PowerConnect 8164F
June 2017 Rev. A04
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 55
About This Document . . . . . . . . . . . . . . . . . . 55
Audience . . . . . . . . . . . . . . . . . . . . . . . . . 56
Document Conventions
Additional Documentation
. . . . . . . . . . . . . . . . . 56
. . . . . . . . . . . . . . . . 57
2 Switch Feature Overview . . . . . . . . . . . . 59
System Management Features . . . . . . . . . . . . . 60
Multiple Management Options
System Time Management . . . . . . . . . . . . . 60
Log Messages
. . . . . . . . . . . . . . . . . . . 61
Integrated DHCP Server
Management of Basic Network Information . . . . 61
IPv6 Management Features
Dual Software Images
File Management . . . . . . . . . . . . . . . . . . 62
Switch Database Management Templates
Automatic Installation of Firmware and
Configuration . . . . . . . . . . . . . . . . . . . . 63
sFlow
. . . . . . . . . . . . . . . . . . . . . . . . 64
SNMP Alarms and Trap Logs
CDP Interoperability Through ISDP . . . . . . . . 65
Remote Monitoring (RMON)
N3000 Series Access and Aggregation
Firmware Images . . . . . . . . . . . . . . . . . . 65
. . . . . . . . . . . 60
. . . . . . . . . . . . . . 61
. . . . . . . . . . . . 62
. . . . . . . . . . . . . . . 62
. . . . 63
. . . . . . . . . . . . 64
. . . . . . . . . . . . 65
Contents 3
Stacking Features . . . . . . . . . . . . . . . . . . . . 67
High Stack Count
Single IP Management
. . . . . . . . . . . . . . . . . . 67
. . . . . . . . . . . . . . . 67
Master Failover with Transparent Transition. . . . 68
Nonstop Forwarding on the Stack
. . . . . . . . . 68
Hot Add/Delete and Firmware
Synchronization. . . . . . . . . . . . . . . . . . . 68
Security Features . . . . . . . . . . . . . . . . . . . . 69
Configurable Access and Authentication
. . . . . . . . . . . . . . . . . . . . . . . 69
Profiles
Password-Protected Management Access
Strong Password Enforcement
. . . . . . . . . . . 69
. . . . 69
TACACS+ Client . . . . . . . . . . . . . . . . . . . 69
RADIUS Support
SSH/SSL
. . . . . . . . . . . . . . . . . . 70
. . . . . . . . . . . . . . . . . . . . . . . 70
Inbound Telnet Control . . . . . . . . . . . . . . . 70
Denial of Service
Port Protection Captive Portal
802.1X Authentication (IEEE 802.1X)
. . . . . . . . . . . . . . . . . . 70
. . . . . . . . . . . . . . . . . . . 71
. . . . . . . . . . . . . . . . . . . . 72
. . . . . . . . 72
MAC-Based 802.1X Authentication . . . . . . . . . 73
802.1X Monitor Mode
MAC-Based Port Security
. . . . . . . . . . . . . . . . 73
. . . . . . . . . . . . . 73
Access Control Lists (ACLs) . . . . . . . . . . . . 74
Time-Based ACLs
IP Source Guard (IPSG)
. . . . . . . . . . . . . . . . . . 74
. . . . . . . . . . . . . . . 74
DHCP Snooping . . . . . . . . . . . . . . . . . . . 75
Dynamic ARP Inspection
Protected Ports (Private VLAN Edge)
. . . . . . . . . . . . . . 75
. . . . . . . . 75
4 Contents
Green Technology Features
Energy Detect Mode
Energy Efficient Ethernet
. . . . . . . . . . . . . . . 76
. . . . . . . . . . . . . . . . 76
. . . . . . . . . . . . . . 76
Power Utilization Reporting . . . . . . . . . . . . 76
Power over Ethernet (PoE) Plus Features
. . . . . . . . 77
Key PoE Plus Features for the Dell EMC Networking N1108P-ON, N1124P-ON, N1148P-ON, N2024P, N2048P, N2128PX-ON, N3024P, N3048P, and N3132PX-ON Switches
. . . . . . . . . . . . . 77
Power Over Ethernet (PoE) Plus Configuration
PoE Plus Support
. . . . . . . . . . . . . . . . . . 78
PoE 60W Support . . . . . . . . . . . . . . . . . . 79
Powered Device Detection . . . . . . . . . . . . . 79
PoE Power Management Modes. . . . . . . . . . 79
Power Management in Guard Band
PoE Plus Default Settings
Switching Features
. . . . . . . . . . . . . . . . . . . 83
Flow Control Support (IEEE 802.3x)
Head of Line Blocking Prevention
. . . . . . . . . . . . . . 82
. . . . . . . . 81
. . . . . . . . . 83
. . . . . . . . . 83
Alternate Store and Forward (ASF). . . . . . . . . 83
Jumbo Frames Support
Auto-MDI/MDIX Support
. . . . . . . . . . . . . . . 83
. . . . . . . . . . . . . . 84
VLAN-Aware MAC-based Switching. . . . . . . . 84
Back Pressure Support
Auto-negotiation
. . . . . . . . . . . . . . . 84
. . . . . . . . . . . . . . . . . . 85
Storm Control . . . . . . . . . . . . . . . . . . . . 85
Port Mirroring
Static and Dynamic MAC Address Tables
. . . . . . . . . . . . . . . . . . . . 85
. . . . . 86
Link Layer Discovery Protocol (LLDP) . . . . . . . 86
Link Layer Discovery Protocol (LLDP) for Media Endpoint Devices
. . . . . . . . . . . . . . . . . . 86
Connectivity Fault Management (IEEE 802.1ag) . . 87
Priority-based Flow Control (PFC) . . . . . . . . . 87
Data Center Bridging Exchange (DBCx)
Protocol. . . . . . . . . . . . . . . . . . . . . . . 88
Enhanced Transmission Selection
. . . . . . . . . 88
. . 78
Contents 5
Cisco Protocol Filtering . . . . . . . . . . . . . . . 88
DHCP Layer-2 Relay
. . . . . . . . . . . . . . . . . 89
Virtual Local Area Network Supported Features
VLAN Support
Port-Based VLANs
. . . . . . . . . . . . . . . . . . . . 90
. . . . . . . . . . . . . . . . . 90
IP Subnet-based VLAN . . . . . . . . . . . . . . . 90
MAC-based VLAN
IEEE 802.1v Protocol-Based VLANs
. . . . . . . . . . . . . . . . . . 90
. . . . . . . . . 90
Voice VLAN . . . . . . . . . . . . . . . . . . . . . 90
GARP and GVRP Support
Guest VLAN
. . . . . . . . . . . . . . . . . . . . . 91
. . . . . . . . . . . . . . 91
Unauthorized VLAN . . . . . . . . . . . . . . . . . 91
Double VLANs
Spanning Tree Protocol Features
Spanning Tree Protocol (STP)
Spanning Tree Port Settings
Rapid Spanning Tree
. . . . . . . . . . . . . . . . . . . . 91
. . . . . . . . . . . . 92
. . . . . . . . . . . 92
. . . . . . . . . . . . 92
. . . . . . . . . . . . . . . . 92
Multiple Spanning Tree . . . . . . . . . . . . . . . 92
Bridge Protocol Data Unit (BPDU) Guard BPDU Filtering
RSTP-PV and STP-PV
Link Aggregation Features
Link Aggregation
. . . . . . . . . . . . . . . . . . . 93
. . . . . . . . . . . . . . . . 93
. . . . . . . . . . . . . . . . 94
. . . . . . . . . . . . . . . . . . 94
Link Aggregate Control Protocol (LACP)
Multi-Switch LAG (MLAG)
. . . . . . . . . . . . . 95
. . . . . . 93
. . . . . . 95
. . . . 90
6 Contents
Routing Features
. . . . . . . . . . . . . . . . . . . . . 96
Address Resolution Protocol (ARP) Table Management
. . . . . . . . . . . . . . . . . . . . 96
VLAN Routing . . . . . . . . . . . . . . . . . . . . 96
IP Configuration
Open Shortest Path First (OSPF)
. . . . . . . . . . . . . . . . . . . 96
. . . . . . . . . . 97
Border Gateway Protocol (BGP) . . . . . . . . . . 97
Virtual Routing and Forwarding (VRF)
. . . . . . . 97
BOOTP/DHCP Relay Agent . . . . . . . . . . . . . 98
IP Helper and DHCP Relay . . . . . . . . . . . . . 98
Routing Information Protocol. . . . . . . . . . . . 98
Router Discovery
Routing Table
. . . . . . . . . . . . . . . . . . 98
. . . . . . . . . . . . . . . . . . . . 98
Virtual Router Redundancy Protocol (VRRP) . . . . 99
Tunnel and Loopback Interfaces
. . . . . . . . . . 99
IPv6 Routing Features
IPv6 Configuration
IPv6 Routes
OSPFv3
. . . . . . . . . . . . . . . . . . . . . . . 100
. . . . . . . . . . . . . . . . . . 100
. . . . . . . . . . . . . . . . . 100
. . . . . . . . . . . . . . . . . . . . . 100
DHCPv6 . . . . . . . . . . . . . . . . . . . . . . . 100
Quality of Service (QoS) Features . . . . . . . . . . . . 101
Differentiated Services (DiffServ)
. . . . . . . . . 101
Class Of Service (CoS) . . . . . . . . . . . . . . . 101
Auto Voice over IP (VoIP)
. . . . . . . . . . . . . . 101
Internet Small Computer System Interface
(iSCSI) Optimization. . . . . . . . . . . . . . . . . 102
Layer-2 Multicast Features . . . . . . . . . . . . . . . 102
MAC Multicast Support
. . . . . . . . . . . . . . . 102
IGMP Snooping . . . . . . . . . . . . . . . . . . . 102
IGMP Snooping Querier
MLD Snooping
. . . . . . . . . . . . . . . . . . . 103
. . . . . . . . . . . . . . 103
Multicast VLAN Registration . . . . . . . . . . . . 103
Layer-3 Multicast Features . . . . . . . . . . . . . . . 104
Distance Vector Multicast Routing Protocol
. . . . 104
Internet Group Management Protocol . . . . . . . 104
IGMP Proxy
. . . . . . . . . . . . . . . . . . . . . 104
Contents 7
Protocol Independent Multicast—Dense
Mode . . . . . . . . . . . . . . . . . . . . . . . 104
Protocol Independent Multicast—Sparse
Mode . . . . . . . . . . . . . . . . . . . . . . . 105
Protocol Independent Multicast—Source
Specific Multicast. . . . . . . . . . . . . . . . . 105
Protocol Independent Multicast IPv6 Support
. . . . . . . . . . . . . . . . . . . . . . 105
MLD/MLDv2 (RFC2710/RFC3810) . . . . . . . . . 105
3 Hardware Overview . . . . . . . . . . . . . . . . 107
Dell EMC Networking N1100-ON Series Switch Hardware
. . . . . . . . . . . . . . . . . . . . . . . . 107
Front Panel
Power Supply Ventilation System
Thermal Shutdown
LED Definitions
. . . . . . . . . . . . . . . . . . . . 107
. . . . . . . . . . . . . . . . . . . 110
. . . . . . . . . . . . . . . . 110
. . . . . . . . . . . . . . . . 110
. . . . . . . . . . . . . . . . . . 110
Power Consumption for PoE Switches . . . . . . 114
Wall Installation. . . . . . . . . . . . . . . . . . 115
8 Contents
Dell EMC Networking N1500 Series Switch Hardware
. . . . . . . . . . . . . . . . . . . . . . . . 117
Front Panel
. . . . . . . . . . . . . . . . . . . . 117
Back Panel . . . . . . . . . . . . . . . . . . . . 121
LED Definitions
Power Consumption for PoE Switches
. . . . . . . . . . . . . . . . . . 122
. . . . . . 125
Dell EMC Networking N2000 Series Switch Hardware
. . . . . . . . . . . . . . . . . . . . . . . . 127
Front Panel
. . . . . . . . . . . . . . . . . . . . 127
Back Panel . . . . . . . . . . . . . . . . . . . . 130
LED Definitions
Power Consumption for PoE Switches
. . . . . . . . . . . . . . . . . . 132
. . . . . . 135
Dell EMC Networking N2100-ON Series Switch
Hardware . . . . . . . . . . . . . . . . . . . . . . . . 137
Front Panel
. . . . . . . . . . . . . . . . . . . . . 137
Back Panel . . . . . . . . . . . . . . . . . . . . . 139
LED Definitions
Power Consumption for PoE Switches
. . . . . . . . . . . . . . . . . . . 139
. . . . . . . 143
Dell EMC Networking N3000 Series Switch Hardware
. . . . . . . . . . . . . . . . . . . . . . . . 146
Front Panel
. . . . . . . . . . . . . . . . . . . . . 146
Back Panel . . . . . . . . . . . . . . . . . . . . . 151
LED Definitions
Power Consumption for PoE Switches
. . . . . . . . . . . . . . . . . . . 153
. . . . . . . 158
Dell EMC Networking N3100-ON Series Switch Hardware
. . . . . . . . . . . . . . . . . . . . . . . . 160
Front Panel
. . . . . . . . . . . . . . . . . . . . . 160
Back Panel . . . . . . . . . . . . . . . . . . . . . 162
LED Definitions
Power Consumption for PoE Switches
. . . . . . . . . . . . . . . . . . . 163
. . . . . . . 168
PoE Power Budget Limit . . . . . . . . . . . . . . 170
Dell EMC Networking N4000 Series Switch Hardware
. . . . . . . . . . . . . . . . . . . . . . . . 171
Front Panel
Back Panel
LED Definitions
. . . . . . . . . . . . . . . . . . . . . 171
. . . . . . . . . . . . . . . . . . . . . 175
. . . . . . . . . . . . . . . . . . . 177
Switch MAC Addresses
. . . . . . . . . . . . . . . . . 181
4 Using Dell EMC OpenManage Switch
Administrator . . . . . . . . . . . . . . . . . . . . 183
About Dell EMC OpenManage Switch
Administrator . . . . . . . . . . . . . . . . . . . . . . 183
Contents 9
Starting the Application . . . . . . . . . . . . . . . . 184
Understanding the Interface
. . . . . . . . . . . . . . 185
Using the Switch Administrator Buttons and
. . . . . . . . . . . . . . . . . . . . . . . . . . 187
Links
Defining Fields . . . . . . . . . . . . . . . . . . . . . 188
Understanding the Device View
Using the Device View Port Features
. . . . . . . . . . . . 188
. . . . . . . 188
Using the Device View Switch Locator
Feature . . . . . . . . . . . . . . . . . . . . . . 189
5 Using the Command-Line Interface . . . . 191
Accessing the Switch Through the CLI . . . . . . . . 191
Console Connection
Telnet Connection. . . . . . . . . . . . . . . . . 192
Understanding Command Modes . . . . . . . . . . . 193
Entering CLI Commands
Using the Question Mark to Get Help
Using Command Completion
Entering Abbreviated Commands. . . . . . . . . 196
Negating Commands
Command Output Paging
Understanding Error Messages . . . . . . . . . 197
Recalling Commands from the History Buffer
. . . . . . . . . . . . . . . . . . . . . . . 197
. . . . . . . . . . . . . . . . 191
. . . . . . . . . . . . . . . . 195
. . . . . . . 195
. . . . . . . . . . . 196
. . . . . . . . . . . . . . . 196
. . . . . . . . . . . . . 196
10 Contents
6 Default Settings. . . . . . . . . . . . . . . . . . . 199
7 Setting the IP Address and Other
Basic Network Information
IP Address and Network Information Overview . . . . 203
What Is the Basic Network Information?
Why Is Basic Network Information Needed?
How Is Basic Network Information
Configured? . . . . . . . . . . . . . . . . . . . . . 205
What Is Out-of-Band Management and In-Band
Management? . . . . . . . . . . . . . . . . . . . 205
Default Network Information . . . . . . . . . . . . . . 208
. . . . . . . . . . 203
. . . . . 203
. . . 204
Configuring Basic Network Information (Web)
Out-of-Band Interface
. . . . . . . . . . . . . . . 209
. . . . . 209
IP Interface Configuration (Default VLAN IP
Address) . . . . . . . . . . . . . . . . . . . . . . 210
Route Entry Configuration (Switch Default Gateway)
. . . . . . . . . . . . . . . . . . . . . . 212
Domain Name Server. . . . . . . . . . . . . . . . 214
Default Domain Name . . . . . . . . . . . . . . . 215
Host Name Mapping Dynamic Host Name Mapping
. . . . . . . . . . . . . . . . 216
. . . . . . . . . . . 217
Configuring Basic Network Information (CLI). . . . . . 218
Enabling the DHCP Client on the OOB Port
. . . . . 218
Enabling the DHCP Client on the Default
VLAN . . . . . . . . . . . . . . . . . . . . . . . . 218
Managing DHCP Leases
. . . . . . . . . . . . . . 219
Configuring Static Network Information on
the OOB Port . . . . . . . . . . . . . . . . . . . . 220
Configuring Static Network Information on the Default VLAN
. . . . . . . . . . . . . . . . . . 221
Contents 11
Configuring and Viewing Additional Network
Information . . . . . . . . . . . . . . . . . . . . 222
Basic Network Information Configuration Examples
. . . . . . . . . . . . . . . . . . . . . . . . 224
Configuring Network Information Using the OOB Port
. . . . . . . . . . . . . . . . . . . . . 224
Configuring Network Information Using the Serial Interface
. . . . . . . . . . . . . . . . . . 226
8 Managing QSFP Ports . . . . . . . . . . . . . . 229
9 Stacking . . . . . . . . . . . . . . . . . . . . . . . . . 231
Stacking Overview. . . . . . . . . . . . . . . . . . . 231
Dell EMC Networking N1124-ON/N1148-ON, N1500, N2000, N2100-ON, N3000, N3100-ON, and N4000 Stacking Compatibility
How is the Stack Master Selected?
Adding a Switch to the Stack
Removing a Switch from the Stack . . . . . . . . 238
How is the Firmware Updated on the Stack?
What is Stacking Standby?
What is Nonstop Forwarding? . . . . . . . . . . 240
Switch Stack MAC Addressing and Stack Design Considerations
. . . . . . . . . . . . . . 243
NSF Network Design Considerations. . . . . . . 243
Why is Stacking Needed?
. . . . . . . . 236
. . . . . . . 236
. . . . . . . . . . . 237
. . . 239
. . . . . . . . . . . . 239
. . . . . . . . . . . . 244
12 Contents
Default Stacking Values
. . . . . . . . . . . . . . . . 244
Managing and Monitoring the Stack (Web). . . . . . 246
Unit Configuration
. . . . . . . . . . . . . . . . . 246
Stack Summary . . . . . . . . . . . . . . . . . . 247
Stack Firmware Synchronization
. . . . . . . . . 248
Supported Switches . . . . . . . . . . . . . . . . 249
Stack Port Summary
. . . . . . . . . . . . . . . . 250
Stack Port Counters . . . . . . . . . . . . . . . . 251
Stack Port Diagnostics
NSF Summary
. . . . . . . . . . . . . . . . . . . . 252
. . . . . . . . . . . . . . . 251
Checkpoint Statistics . . . . . . . . . . . . . . . . 253
Managing the Stack (CLI) . . . . . . . . . . . . . . . . 254
Configuring Stack Member, Stack Port, and NSF Settings
. . . . . . . . . . . . . . . . . . . . 254
Viewing and Clearing Stacking and NSF Information
. . . . . . . . . . . . . . . . . . . . . 256
Connecting to the Management Console
from a Stack Member . . . . . . . . . . . . . . . 257
Stacking and NSF Usage Scenarios
Basic Failover
. . . . . . . . . . . . . . . . . . . . 257
Preconfiguring a Stack Member
NSF in the Data Center NSF and VoIP
. . . . . . . . . . . . . . . . . . . . 262
NSF and DHCP Snooping
. . . . . . . . . . . 257
. . . . . . . . . . 259
. . . . . . . . . . . . . . . 261
. . . . . . . . . . . . . . 263
NSF and the Storage Access Network. . . . . . . 264
NSF and Routed Access . . . . . . . . . . . . . . 266
10 Authentication, Authorization, and
Accounting . . . . . . . . . . . . . . . . . . . . . . 269
AAA Introduction . . . . . . . . . . . . . . . . . . . . 269
Methods
Method Lists
Access Lines
Enabling SSH Access. . . . . . . . . . . . . . . . 273
Access Lines (AAA)
Access Lines (Non-AAA)
. . . . . . . . . . . . . . . . . . . . . . 270
. . . . . . . . . . . . . . . . . . . . 271
. . . . . . . . . . . . . . . . . . . . 272
. . . . . . . . . . . . . . . . 274
. . . . . . . . . . . . . . 274
Contents 13
Authentication . . . . . . . . . . . . . . . . . . . . . 275
Authentication Types
Authentication Manager
. . . . . . . . . . . . . . . 275
. . . . . . . . . . . . . 276
Using RADIUS. . . . . . . . . . . . . . . . . . . 281
Using TACACS+ Servers to Control Management Access
Authentication Examples Public Key SSH Authentication Example
Associating a User With an SSH Key
. . . . . . . . . . . . . . . 286
. . . . . . . . . . . . . 288
. . . . . 296
. . . . . . . 304
Authorization
Exec Authorization Capabilities
Authorization Examples
RADIUS Change of Authorization
. . . . . . . . . . . . . . . . . . . . . . 306
. . . . . . . . . . 306
. . . . . . . . . . . . . . 308
. . . . . . . . . 310
TACACS Authorization . . . . . . . . . . . . . . 314
Accounting . . . . . . . . . . . . . . . . . . . . . . . 318
RADIUS Accounting
IEEE 802.1X
. . . . . . . . . . . . . . . . . . . . . . . 320
What is IEEE 802.1X?
. . . . . . . . . . . . . . . 318
. . . . . . . . . . . . . . . 320
What are the 802.1X Port Authentication
Modes? . . . . . . . . . . . . . . . . . . . . . . 321
What is MAC-Based 802.1X Authentication?
. . . 322
What is the Role of 802.1X in VLAN
Assignment? . . . . . . . . . . . . . . . . . . . 323
What is Monitor Mode?
. . . . . . . . . . . . . . 326
How Does the Authentication Server Assign
DiffServ Policy? . . . . . . . . . . . . . . . . . . 327
What is the Internal Authentication Server?
Default 802.1X Values
. . . . . . . . . . . . . . . 328
. . . 328
Configuring IEEE 802.1X (Web) . . . . . . . . . . 329
14 Contents
Captive Portal . . . . . . . . . . . . . . . . . . . . . 354
Captive Portal Overview
. . . . . . . . . . . . . 354
Default Captive Portal Behavior and
Settings . . . . . . . . . . . . . . . . . . . . . . . 362
Configuring Captive Portal (Web) Configuring Captive Portal (CLI)
. . . . . . . . . 364
. . . . . . . . . . 382
Captive Portal Configuration Example . . . . . . . 388
In Case Of Problems in Captive Portal Deployment
. . . . . . . . . . . . . . . . . . . . . 392
11 Monitoring and Logging System
Information . . . . . . . . . . . . . . . . . . . . . . 393
System Monitoring Overview . . . . . . . . . . . . . . 393
What System Information Is Monitored?
Why Is System Information Needed? . . . . . . . 394
Where Are Log Messages Sent?
What Are the Severity Levels?
. . . . . . . . . . . 395
What Are the System Startup and Operation
. . . . . . . . . . . . . . . . . . . . . . . . 395
Logs?
What Is the Log Message Format? . . . . . . . . . 396
What Factors Should Be Considered When Configuring Logging?
. . . . . . . . . . . . . . . . 397
. . . . . . 393
. . . . . . . . . . 394
Default Log Settings
. . . . . . . . . . . . . . . . . . . 398
Monitoring System Information and Configuring Logging (Web)
Device Information
System Health System Resources Unit Power Usage History
. . . . . . . . . . . . . . . . . . . . . . 399
. . . . . . . . . . . . . . . . . 399
. . . . . . . . . . . . . . . . . . . 401
. . . . . . . . . . . . . . . . . 402
. . . . . . . . . . . . . 403
Integrated Cable Test for Copper Cables. . . . . . 404
Optical Transceiver Diagnostics
Log Global Settings
. . . . . . . . . . . . . . . . . 407
. . . . . . . . . . 405
RAM Log . . . . . . . . . . . . . . . . . . . . . . 408
Log File
. . . . . . . . . . . . . . . . . . . . . . . 409
Contents 15
Syslog Server . . . . . . . . . . . . . . . . . . . 409
Email Alert Global Configuration
. . . . . . . . . 412
Email Alert Mail Server Configuration . . . . . . 412
Email Alert Subject Configuration
Email Alert To Address Configuration
. . . . . . . . 414
. . . . . . 415
Email Alert Statistics . . . . . . . . . . . . . . . 416
Monitoring System Information and Configuring Logging (CLI)
. . . . . . . . . . . . . . . . . . . . . . 417
Viewing System Information and Enabling the Locator LED
Running Cable Diagnostics
. . . . . . . . . . . . . . . . . . 417
. . . . . . . . . . . . 417
Configuring Local Logging . . . . . . . . . . . . 419
Configuring Remote Logging . . . . . . . . . . . 420
Configuring Mail Server Settings . . . . . . . . . 421
Configuring Email Alerts for Log Messages . . . 422
12 Managing General System Settings . . . 429
16 Contents
Logging Configuration Examples
Configuring Local and Remote Logging
Configuring Email Alerting
. . . . . . . . . . . 424
. . . . . 424
. . . . . . . . . . . . 426
System Settings Overview . . . . . . . . . . . . . . . 429
Why Does System Information Need to Be Configured?
. . . . . . . . . . . . . . . . . . . . 431
What Are SDM Templates?. . . . . . . . . . . . 431
Why is the System Time Needed?
How Does SNTP Work?
. . . . . . . . . . . . . . 434
. . . . . . . . 434
What Configuration Is Required for Plug-In
Modules? . . . . . . . . . . . . . . . . . . . . . 435
Default General System Information
. . . . . . . . . 435
Configuring General System Settings (Web) . . . . . 436
System Information . . . . . . . . . . . . . . . . . 436
CLI Banner SDM Template Preference Clock
. . . . . . . . . . . . . . . . . . . . . 439
. . . . . . . . . . . . . 440
. . . . . . . . . . . . . . . . . . . . . . . . 441
SNTP Global Settings. . . . . . . . . . . . . . . . 442
SNTP Authentication SNTP Server
Summer Time Configuration Time Zone Configuration
Card Configuration Slot Summary
. . . . . . . . . . . . . . . . 443
. . . . . . . . . . . . . . . . . . . . 445
. . . . . . . . . . . . 448
. . . . . . . . . . . . . . 449
. . . . . . . . . . . . . . . . . 450
. . . . . . . . . . . . . . . . . . . . 451
Supported Cards . . . . . . . . . . . . . . . . . . 452
Power Over Ethernet Global Configuration Power Over Ethernet Unit Configuration
. . . . . 453
. . . . . . 454
Power Over Ethernet Interface Configuration . . . 455
Configuring System Settings (CLI)
Configuring System Information
Configuring the Banner Managing the SDM Template
. . . . . . . . . . . . 457
. . . . . . . . . . 457
. . . . . . . . . . . . . . . 458
. . . . . . . . . . . 459
Configuring SNTP Authentication and an SNTP Server
. . . . . . . . . . . . . . . . . . . . 459
Setting the System Time and Date Manually Configuring the Expansion Slots (Dell EMC
Networking N3000/N3100-ON/N4000 Series Only)
Viewing Slot Information (Dell EMC Networking
N4000 Series Only) . . . . . . . . . . . . . . . . . 463
Configuring PoE Settings (Dell EMC Networking N1108P-ON/ N1124P-ON/ N1148P-ON, N1524P/N1548P, N2024P/N2048P/N2128PX-ON,
N3024P/N3048P/N3132PX-ON Only) . . . . . . . . 463
General System Settings Configuration Examples
Configuring System and Banner Information
Configuring SNTP Configuring the Time Manually
. . . . . . . . . . . . . . . . . . 468
. . . . . . . . . . . 470
Contents 17
. . . . 461
. 462
. . . 465
. . . 465
13 SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
SNMP Overview . . . . . . . . . . . . . . . . . . . . 471
What Is SNMP?
What Are SNMP Traps?
Why Is SNMP Needed?
. . . . . . . . . . . . . . . . . . 471
. . . . . . . . . . . . . 472
. . . . . . . . . . . . . . 473
Default SNMP Values
Configuring SNMP (Web)
SNMP Global Parameters
SNMP View Settings Access Control Group
. . . . . . . . . . . . . . . . . 473
. . . . . . . . . . . . . . . 475
. . . . . . . . . . . . 475
. . . . . . . . . . . . . . . 476
. . . . . . . . . . . . . . 478
SNMPv3 User Security Model (USM) . . . . . . 480
Communities Notification Filter
. . . . . . . . . . . . . . . . . . . 483
. . . . . . . . . . . . . . . . . 485
Notification Recipients . . . . . . . . . . . . . . 486
Trap Flags . . . . . . . . . . . . . . . . . . . . . 488
OSPFv2 Trap Flags
OSPFv3 Trap Flags
. . . . . . . . . . . . . . . . 489
. . . . . . . . . . . . . . . . 490
Trap Log. . . . . . . . . . . . . . . . . . . . . . 491
Configuring SNMP (CLI) . . . . . . . . . . . . . . . . 493
Configuring the SNMPv3 Engine ID
. . . . . . . . 493
Configuring SNMP Views, Groups, and
Users . . . . . . . . . . . . . . . . . . . . . . . 494
Configuring Communities
. . . . . . . . . . . . . 497
Configuring SNMP Notifications (Traps and
Informs) . . . . . . . . . . . . . . . . . . . . . . 499
18 Contents
SNMP Configuration Examples
Configuring SNMPv1 and SNMPv2
Configuring SNMPv3
. . . . . . . . . . . . . . . 503
. . . . . . . . . . . . 502
. . . . . . . . 502
14 Images and File Management . . . . . . . . 507
Image and File Management Overview . . . . . . . . . 507
What Files Can Be Managed?
Why Is File Management Needed?
What Methods Are Supported for File
Management? . . . . . . . . . . . . . . . . . . . 512
What Factors Should Be Considered When Managing Files?
. . . . . . . . . . . . . . . . . . 513
How Is the Running Configuration Saved? . . . . . 515
N3000 Dual Images. . . . . . . . . . . . . . . . . . . . 516
Access Router/Switch Role
Aggregation Router Role . . . . . . . . . . . . . . 517
Managing Images and Files (Web) . . . . . . . . . . . 518
File System
. . . . . . . . . . . . . . . . . . . . . 518
Active Images . . . . . . . . . . . . . . . . . . . 519
USB Flash Drive. . . . . . . . . . . . . . . . . . . 520
File Download File Upload
. . . . . . . . . . . . . . . . . . . . 521
. . . . . . . . . . . . . . . . . . . . . 523
Copy Files . . . . . . . . . . . . . . . . . . . . . . 525
. . . . . . . . . . . 507
. . . . . . . . . 509
. . . . . . . . . . . . 516
Managing Images and Files (CLI)
. . . . . . . . . . . . 526
Downloading and Activating a New Image
. . . . . . . . . . . . . . . . . . . . . . . . 527
(TFTP)
Managing Files in Internal Flash . . . . . . . . . . 528
Managing Files on a USB Flash Device . . . . . . 529
Uploading a Configuration File (SCP)
Managing Configuration Scripts (SFTP)
. . . . . . . . 530
. . . . . . 531
File and Image Management Configuration Examples
. . . . . . . . . . . . . . . . . . . . . . . . . 532
Upgrading the Firmware
. . . . . . . . . . . . . . 532
Managing Configuration Scripts . . . . . . . . . . 535
Contents 19
Managing Files by Using the USB Flash
Drive. . . . . . . . . . . . . . . . . . . . . . . . 537
15 DHCP and USB Auto-Configuration . . . . 539
Auto Configuration Overview . . . . . . . . . . . . . 539
What Is USB Auto Configuration?
What Files Does USB Auto Configuration
Use? . . . . . . . . . . . . . . . . . . . . . . . . 540
How Does USB Auto Configuration Use the Files on the USB Device?
What Is the Setup File Format? . . . . . . . . . . 543
What Is the DHCP Auto Configuration Process?
. . . . . . . . . . . . . . . . . . . . . 543
Monitoring and Completing the DHCP Auto
Configuration Process . . . . . . . . . . . . . . 549
What Are the Dependencies for DHCP Auto
Configuration? . . . . . . . . . . . . . . . . . . 550
Default Auto Configuration Values . . . . . . . . . . 551
. . . . . . . . 540
. . . . . . . . . . . . . 541
20 Contents
Managing Auto Configuration (Web)
Auto-Install Configuration
Managing Auto Configuration (CLI)
Managing Auto Configuration
. . . . . . . . . 552
. . . . . . . . . . . . 552
. . . . . . . . . . 553
. . . . . . . . . . 553
Auto Configuration Example . . . . . . . . . . . . . . 554
Enabling USB Auto Configuration and Auto Image Download
. . . . . . . . . . . . . . . . . 554
Enabling DHCP Auto Configuration and Auto Image Download
. . . . . . . . . . . . . . . . . 555
Easy Firmware Upgrade via USB . . . . . . . . . 557
16 Monitoring Switch Traffic . . . . . . . . . . . 559
Traffic Monitoring Overview . . . . . . . . . . . . . . 559
What is sFlow Technology?
What is RMON?
. . . . . . . . . . . . . . . . . . . 562
What is Port Mirroring?
Port Mirroring Behaviors . . . . . . . . . . . . . . 565
RSPAN
. . . . . . . . . . . . . . . . . . . . . . . 567
Remote Capture
. . . . . . . . . . . . . . . . . . . 568
Why is Traffic Monitoring Needed? . . . . . . . . 569
Default Traffic Monitoring Values. . . . . . . . . . . . 569
. . . . . . . . . . . . 559
. . . . . . . . . . . . . . . 563
Monitoring Switch Traffic (Web)
sFlow Agent Summary
sFlow Receiver Configuration sFlow Sampler Configuration sFlow Poll Configuration
. . . . . . . . . . . . 570
. . . . . . . . . . . . . . . 570
. . . . . . . . . . . 571
. . . . . . . . . . . . 572
. . . . . . . . . . . . . . 573
Interface Statistics . . . . . . . . . . . . . . . . . 574
Etherlike Statistics GVRP Statistics
. . . . . . . . . . . . . . . . . 575
. . . . . . . . . . . . . . . . . . . 576
EAP Statistics. . . . . . . . . . . . . . . . . . . . 577
Utilization Summary Counter Summary
. . . . . . . . . . . . . . . . 578
. . . . . . . . . . . . . . . . . . 579
Switchport Statistics . . . . . . . . . . . . . . . . 580
RMON Statistics RMON History Control Statistics
RMON History Table RMON Event Control
. . . . . . . . . . . . . . . . . . 581
. . . . . . . . . . 582
. . . . . . . . . . . . . . . . 584
. . . . . . . . . . . . . . . . 585
RMON Event Log . . . . . . . . . . . . . . . . . . 587
RMON Alarms Port Statistics
. . . . . . . . . . . . . . . . . . . 588
. . . . . . . . . . . . . . . . . . . . 590
LAG Statistics. . . . . . . . . . . . . . . . . . . . 591
Port Mirroring
Monitoring Switch Traffic (CLI)
. . . . . . . . . . . . . . . . . . . . 592
. . . . . . . . . . . . . 594
Contents 21
Configuring sFlow. . . . . . . . . . . . . . . . . 594
Configuring RMON
. . . . . . . . . . . . . . . . 596
Viewing Statistics. . . . . . . . . . . . . . . . . 598
Configuring Port Mirroring
Configuring RSPAN
. . . . . . . . . . . . 599
. . . . . . . . . . . . . . . . 600
Traffic Monitoring Examples
Showing Interface Traffic
Configuring sFlow
. . . . . . . . . . . . . 604
. . . . . . . . . . . . . 604
. . . . . . . . . . . . . . . . . 605
Configuring RMON . . . . . . . . . . . . . . . . 607
Configuring Remote Capture . . . . . . . . . . . 608
Configuring RSPAN
. . . . . . . . . . . . . . . . 613
17 iSCSI Optimization . . . . . . . . . . . . . . . . . 617
iSCSI Optimization Overview . . . . . . . . . . . . . 617
What Does iSCSI Optimization Do? What Occurs When iSCSI Optimization Is
Enabled or Disabled?
. . . . . . . . . . . . . . . 618
How Does the Switch Detect iSCSI Traffic Flows?
. . . . . . . . . . . . . . . . . . . . . . . 618
How Is Quality of Service Applied to iSCSI
Traffic Flows? . . . . . . . . . . . . . . . . . . . 619
How Does iSCSI Optimization Use ACLs?
What Information Does the Switch Track in
iSCSI Traffic Flows?. . . . . . . . . . . . . . . . 620
How Does iSCSI Optimization Interact With
Dell EqualLogic Arrays?. . . . . . . . . . . . . . 621
How Does iSCSI Optimization Interact with Dell Compellent Arrays?
. . . . . . . . . . . . . 621
How Does iSCSI Optimization Interact with DCBx?
. . . . . . . . . . . . . . . . . . . . . . . 622
iSCSI CoS and Priority Flow Control/Enhanced
Transmission Selection Interactions . . . . . . . 623
. . . . . . . . 618
. . . . 620
22 Contents
Default iSCSI Optimization Values
. . . . . . . . . . 624
Configuring iSCSI Optimization (Web) . . . . . . . . . 625
iSCSI Global Configuration
iSCSI Targets Table iSCSI Sessions Table iSCSI Sessions Detailed
. . . . . . . . . . . . . 625
. . . . . . . . . . . . . . . . . 626
. . . . . . . . . . . . . . . . 627
. . . . . . . . . . . . . . 628
Configuring iSCSI Optimization (CLI) . . . . . . . . . . 629
iSCSI Optimization Configuration Examples
. . . . . . 631
Configuring iSCSI Optimization Between Servers and a Disk Array
. . . . . . . . . . . . . . 631
18 Port Characteristics . . . . . . . . . . . . . . . 635
Port Overview . . . . . . . . . . . . . . . . . . . . . . 635
What Physical Port Characteristics Can Be Configured?
Auto-Negotiation . . . . . . . . . . . . . . . . . . 637
Maximum Transmission Unit . . . . . . . . . . . . 637
What is Link Dependency? . . . . . . . . . . . . . 638
What Interface Types are Supported? What is Interface Configuration Mode?
What Are the Green Ethernet Features?
Switchport Modes
Default Port Values
Configuring Port Characteristics (Web)
Port Configuration
Link Dependency Configuration
Link Dependency Summary
Port Green Ethernet Configuration . . . . . . . . . 652
Port Green Ethernet Statistics
Port Green Ethernet LPI History
. . . . . . . . . . . . . . . . . . . . . 635
. . . . . . . 640
. . . . . . 640
. . . . . . 642
. . . . . . . . . . . . . . . . . 643
. . . . . . . . . . . . . . . . . . . 644
. . . . . . . . . 646
. . . . . . . . . . . . . . . . . 646
. . . . . . . . . . 649
. . . . . . . . . . . . 651
. . . . . . . . . . . 653
. . . . . . . . . . 655
Contents 23
Configuring Port Characteristics (CLI). . . . . . . . . 656
Configuring Port Settings
Configuring Link Dependencies Configuring Green Features
. . . . . . . . . . . . . 656
. . . . . . . . . 658
. . . . . . . . . . . 659
Port Configuration Examples
Configuring Port Settings
Configuring a Link Dependency Groups Configuring a Port in Access Mode
Configuring a Port in Trunk Mode
Configuring a Port in General Mode
. . . . . . . . . . . . . 660
. . . . . . . . . . . . . 660
. . . . . 661
. . . . . . . 661
. . . . . . . . 662
. . . . . . . 665
19 Port and System Security . . . . . . . . . . . 667
Port-based Security—Port MAC Locking . . . . . . . 667
Denial of Service
. . . . . . . . . . . . . . . . . . . . 674
20 Access Control Lists . . . . . . . . . . . . . . . 675
ACL Overview . . . . . . . . . . . . . . . . . . . . . 675
ACL Counters
What Are MAC ACLs? . . . . . . . . . . . . . . 677
What Are IP ACLs?
ACL Actions
What Is the ACL Redirect Function? . . . . . . . 679
What Is the ACL Mirror Function?
What Is ACL Logging
What Are Time-Based ACLs?. . . . . . . . . . . 680
ACL Limitations
. . . . . . . . . . . . . . . . . . . 677
. . . . . . . . . . . . . . . . 678
. . . . . . . . . . . . . . . . . . . . 678
. . . . . . . . 680
. . . . . . . . . . . . . . . 680
. . . . . . . . . . . . . . . . . . 681
24 Contents
ACL Configuration Details
How Are ACLs Configured?
Editing Access Lists
. . . . . . . . . . . . . . . 686
. . . . . . . . . . . . 686
. . . . . . . . . . . . . . . . 686
Preventing False ACL Matches. . . . . . . . . . . 686
Using IP and MAC Address Masks
. . . . . . . . . 688
Policy-Based Routing
Packet Classification
Route-Map Processing
. . . . . . . . . . . . . . . . . . 689
. . . . . . . . . . . . . . . . 689
. . . . . . . . . . . . . . . 690
Route-Map Actions . . . . . . . . . . . . . . . . . 691
Interface ACLs and PBR Interaction
PBR and Implicit Deny-all
. . . . . . . . . . . . . 694
. . . . . . . . 693
Limitations . . . . . . . . . . . . . . . . . . . . . 694
Configuring ACLs (Web) . . . . . . . . . . . . . . . . . 697
IP ACL Configuration
. . . . . . . . . . . . . . . . 697
IP ACL Rule Configuration . . . . . . . . . . . . . 699
MAC ACL Configuration . . . . . . . . . . . . . . 701
MAC ACL Rule Configuration. . . . . . . . . . . . 703
IPv6 ACL Configuration . . . . . . . . . . . . . . . 704
IPv6 ACL Rule Configuration
ACL Binding Configuration Time Range Configuration
Configuring ACLs (CLI)
Configuring an IPv4 ACL
Configuring a MAC ACL Configuring an IPv6 ACL
. . . . . . . . . . . . . . . . . . 710
. . . . . . . . . . . . 705
. . . . . . . . . . . . . 707
. . . . . . . . . . . . . 708
. . . . . . . . . . . . . . 710
. . . . . . . . . . . . . . . 716
. . . . . . . . . . . . . . 720
Configuring a Time Range . . . . . . . . . . . . . 723
ACL Configuration Examples
Basic Rules
. . . . . . . . . . . . . . . . . . . . . 725
Internal System ACLs
. . . . . . . . . . . . . . 725
. . . . . . . . . . . . . . . . 726
Complete ACL Example . . . . . . . . . . . . . . . 727
Advanced Examples . . . . . . . . . . . . . . . . 731
Policy-Based Routing Examples
. . . . . . . . . . 743
Contents 25
21 VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . 747
VLAN Overview . . . . . . . . . . . . . . . . . . . . 747
VLAN Tagging
GVRP
Double-VLAN Tagging
Voice VLAN . . . . . . . . . . . . . . . . . . . . 753
Private VLANs
Additional VLAN Features
. . . . . . . . . . . . . . . . . . . 750
. . . . . . . . . . . . . . . . . . . . . . . 751
. . . . . . . . . . . . . . 751
. . . . . . . . . . . . . . . . . . . 755
. . . . . . . . . . . . 761
Default VLAN Behavior
Configuring VLANs (Web)
VLAN Membership
VLAN Port Settings VLAN LAG Settings
Bind MAC to VLAN Bind IP Subnet to VLAN
GVRP Parameters Protocol Group
Adding a Protocol Group
Double VLAN Global Configuration Double VLAN Interface Configuration Voice VLAN
. . . . . . . . . . . . . . . . 762
. . . . . . . . . . . . . . . 764
. . . . . . . . . . . . . . . . 764
. . . . . . . . . . . . . . . . 769
. . . . . . . . . . . . . . . . 770
. . . . . . . . . . . . . . . . 772
. . . . . . . . . . . . . . 773
. . . . . . . . . . . . . . . . . 774
. . . . . . . . . . . . . . . . . . 776
. . . . . . . . . . . . . 777
. . . . . . . . 779
. . . . . . 780
. . . . . . . . . . . . . . . . . . . . 782
Configuring VLANs (CLI) . . . . . . . . . . . . . . . . 783
Creating a VLAN
. . . . . . . . . . . . . . . . . 783
Configuring VLAN Settings for a LAG. . . . . . . 784
Configuring Double VLAN Tagging . . . . . . . . 785
Configuring MAC-Based VLANs
Configuring IP-Based VLANs Configuring a Protocol-Based VLAN Configuring GVRP
. . . . . . . . . . . . . . . . . 795
. . . . . . . . . 788
. . . . . . . . . . . 790
. . . . . . . 792
Configuring Voice VLANs . . . . . . . . . . . . . 797
Configuring a Voice VLAN (Extended Example)
. . . . . . . . . . . . . . . . . . . . . 799
26 Contents
Enterprise Voice VLAN Configuration With
QoS . . . . . . . . . . . . . . . . . . . . . . . . . 800
MLAG with RPVST and Voice VLAN . . . . . . . . 803
Assigning an 802.1p Priority to VLAN Traffic
Configuring a Private VLAN
. . . . . . . . . . . . 810
. . . . 810
VLAN Configuration Examples
. . . . . . . . . . . . . 813
Configuring VLANs Using the Dell EMC OpenManage Switch Administrator
. . . . . . . . 813
Configuring VLANs Using the CLI. . . . . . . . . . 821
22 Spanning Tree Protocol . . . . . . . . . . . . 825
STP Overview . . . . . . . . . . . . . . . . . . . . . . 825
What Are Classic STP, Multiple STP, and Rapid STP?
How Does STP Work?
How Does MSTP Operate in the Network? MSTP with Multiple Forwarding Paths MSTP and VLAN IDs
What are the Optional STP Features? . . . . . . . 832
RSTP-PV
DirectLink Rapid Convergence
IndirectLink Rapid Convergence Feature Interoperability Between STP-PV and
RSTP-PV Modes
Interoperability With IEEE Spanning Tree
Protocols . . . . . . . . . . . . . . . . . . . . . . 839
Configuration Examples
. . . . . . . . . . . . . . . . . . . . . 825
. . . . . . . . . . . . . . . 826
. . . . 827
. . . . . . . 831
. . . . . . . . . . . . . . . . 832
. . . . . . . . . . . . . . . . . . . . . . . . . 834
. . . . . . . . . . . 835
. . . . . 837
. . . . . . . . . . . . . . . . . . 839
. . . . . . . . . . . . . . 844
Default STP Values
. . . . . . . . . . . . . . . . . . . 845
Configuring Spanning Tree (Web)
STP Global Settings
STP Port Settings
. . . . . . . . . . . . . . . . . 846
. . . . . . . . . . . . . . . . . . 848
. . . . . . . . . . . . 846
Contents 27
STP LAG Settings . . . . . . . . . . . . . . . . . 850
Rapid Spanning Tree
MSTP Settings MSTP Interface Settings
. . . . . . . . . . . . . . . 851
. . . . . . . . . . . . . . . . . . 853
. . . . . . . . . . . . . 855
PVST/RPVST Global Configuration . . . . . . . . 856
PVST/RPVST VLAN Configuration PVST/RPVST Interface Configuration
. . . . . . . . 857
. . . . . . 859
PVST/RPVST Statistics . . . . . . . . . . . . . . 860
Configuring Spanning Tree (CLI)
Configuring Global STP Bridge Settings
Configuring Optional STP Features
. . . . . . . . . . . . 861
. . . . . 861
. . . . . . . . 862
Configuring STP Interface Settings. . . . . . . . 863
Configuring MSTP Switch Settings
Configuring MSTP Interface Settings
STP Configuration Examples
. . . . . . . . . . . . . . 866
STP Configuration Example
MSTP Configuration Example
. . . . . . . . 864
. . . . . . 865
. . . . . . . . . . . . 866
. . . . . . . . . . . 868
RSTP-PV Access Switch Configuration
Example . . . . . . . . . . . . . . . . . . . . . . 871
23 Discovering Network Devices . . . . . . . . 875
Device Discovery Overview . . . . . . . . . . . . . . 875
What Is ISDP?
What is LLDP?
What is LLDP-MED?
Why are Device Discovery Protocols
Needed?. . . . . . . . . . . . . . . . . . . . . . 876
. . . . . . . . . . . . . . . . . . . 875
. . . . . . . . . . . . . . . . . . . 875
. . . . . . . . . . . . . . . 876
28 Contents
Default IDSP and LLDP Values
. . . . . . . . . . . . . 877
Configuring ISDP and LLDP (Web). . . . . . . . . . . 879
ISDP Global Configuration
. . . . . . . . . . . . 879
ISDP Neighbor Table . . . . . . . . . . . . . . . . 880
ISDP Interface Configuration ISDP Statistics LLDP Configuration
. . . . . . . . . . . . . . . . . . . 882
. . . . . . . . . . . . . . . . . 883
. . . . . . . . . . . . 881
LLDP Statistics . . . . . . . . . . . . . . . . . . . 885
LLDP Connections LLDP-MED Global Configuration
. . . . . . . . . . . . . . . . . 886
. . . . . . . . . . 888
LLDP-MED Interface Configuration . . . . . . . . 889
LLDP-MED Local Device Information LLDP-MED Remote Device Information
. . . . . . . 890
. . . . . . 890
Configuring ISDP and LLDP (CLI) . . . . . . . . . . . . 891
Configuring Global ISDP Settings
. . . . . . . . . 891
Enabling ISDP on a Port . . . . . . . . . . . . . . 892
Viewing and Clearing ISDP Information . . . . . . 892
Configuring Global LLDP Settings . . . . . . . . . 893
Configuring Port-based LLDP Settings . . . . . . . 893
Viewing and Clearing LLDP Information . . . . . . 894
Configuring LLDP-MED Settings Viewing LLDP-MED Information
. . . . . . . . . . 895
. . . . . . . . . . 896
Device Discovery Configuration Examples . . . . . . . 896
Configuring ISDP
. . . . . . . . . . . . . . . . . . 896
Configuring LLDP . . . . . . . . . . . . . . . . . . 897
24 Port-Based Traffic Control . . . . . . . . . . 899
Port-Based Traffic Control Overview . . . . . . . . . . 899
What is Flow Control?
What is Storm Control? . . . . . . . . . . . . . . . 900
What are Protected Ports?
What is Error Recovery?
What is Link Local Protocol Filtering? . . . . . . . 902
What is Loop Protection?
. . . . . . . . . . . . . . . 900
. . . . . . . . . . . . . 901
. . . . . . . . . . . . . . 901
. . . . . . . . . . . . . . 903
Contents 29
Default Port-Based Traffic Control Values . . . . . . 904
Configuring Port-Based Traffic Control (Web)
Flow Control (Global Port Parameters)
Storm Control Protected Port Configuration
. . . . . . . . . . . . . . . . . . . 906
. . . . . . . . . . . 908
. . . . 905
. . . . . . 905
LLPF Configuration . . . . . . . . . . . . . . . . 910
Configuring Port-Based Traffic Control (CLI)
Configuring Flow Control and Storm Control
Configuring Protected Ports
. . . . . . . . . . . 913
. . . . . 912
. . . 912
Configuring LLPF . . . . . . . . . . . . . . . . . 914
Port-Based Traffic Control Configuration Example
. . . . . . . . . . . . . . . . . . . . . . . . 915
25 Layer-2 Multicast Features . . . . . . . . . . 917
L2 Multicast Overview . . . . . . . . . . . . . . . . . 917
Multicast Flooding and Forwarding
What Are the Multicast Bridging Features? . . . 918
What Is L2 Multicast Traffic? What Is IGMP Snooping?
What Is MLD Snooping?
. . . . . . . . . . . . . 919
. . . . . . . . . . . . . 921
What Is Multicast VLAN Registration?
When Are Layer-3 Multicast Features
Required? . . . . . . . . . . . . . . . . . . . . . 924
What Are GARP and GMRP?
. . . . . . . . 917
. . . . . . . . . . . 919
. . . . . . 923
. . . . . . . . . . . 924
30 Contents
Snooping Switch Restrictions
MAC Address-Based Multicast Group
. . . . . . . . . . . . . 926
. . . . . . 926
Topologies Where the Multicast Source Is
Not Directly Connected to the Querier . . . . . . 926
Using Static Multicast MAC Configuration
IGMP Snooping and GMRP
. . . . . . . . . . . . 926
. . . . 926
Default L2 Multicast Values . . . . . . . . . . . . . . . 927
Configuring L2 Multicast Features (Web)
Multicast Global Parameters
Bridge Multicast Group MFDB Summary
. . . . . . . . . . . . . . . 930
. . . . . . . . . . . . . . . . . . 933
. . . . . . . . 929
. . . . . . . . . . . . 929
MRouter Status . . . . . . . . . . . . . . . . . . . 934
General IGMP Snooping Global Querier Configuration
. . . . . . . . . . . . . . 935
. . . . . . . . . . . . 938
VLAN Querier . . . . . . . . . . . . . . . . . . . . 939
VLAN Querier Status MFDB IGMP Snooping Table
. . . . . . . . . . . . . . . . 941
. . . . . . . . . . . . 942
MLD Snooping General. . . . . . . . . . . . . . . 943
MLD Snooping Global Querier Configuration
MLD Snooping VLAN Querier MLD Snooping VLAN Querier Status MFDB MLD Snooping Table
. . . . . . . . . . . 946
. . . . . . . . 948
. . . . . . . . . . . . 949
MVR Global Configuration . . . . . . . . . . . . . 950
MVR Members MVR Interface Configuration
MVR Statistics GARP Timers
. . . . . . . . . . . . . . . . . . . 951
. . . . . . . . . . . . 952
. . . . . . . . . . . . . . . . . . . 954
. . . . . . . . . . . . . . . . . . . . 955
GMRP Parameters . . . . . . . . . . . . . . . . . 957
MFDB GMRP Table . . . . . . . . . . . . . . . . . 959
. . . 945
Configuring L2 Multicast Features (CLI). . . . . . . . . 960
Configuring Layer-2 Multicasting
. . . . . . . . . . 960
Configuring IGMP Snooping on VLANs . . . . . . 961
Configuring IGMP Snooping Querier
Configuring MLD Snooping on VLANs
. . . . . . . . 962
. . . . . . . 963
Configuring MLD Snooping Querier . . . . . . . . 964
Configuring MVR
Configuring GARP Timers and GMRP
Case Study on a Real-World Network Topology
. . . . . . . . . . . . . . . . . . 965
. . . . . . . 967
. . . . 968
Contents 31
Multicast Snooping Case Study . . . . . . . . . 968
26 Connectivity Fault Management . . . . . . 973
Dot1ag Overview . . . . . . . . . . . . . . . . . . . . 973
How Does Dot1ag Work Across a Carrier Network?
What Entities Make Up a Maintenance
Domain?. . . . . . . . . . . . . . . . . . . . . . 975
What is the Administrator’s Role?
. . . . . . . . . . . . . . . . . . . . . 974
. . . . . . . . 977
Default Dot1ag Values
. . . . . . . . . . . . . . . . . 978
Configuring Dot1ag (Web) . . . . . . . . . . . . . . . 979
Dot1ag Global Configuration
. . . . . . . . . . . 979
Dot1ag MD Configuration. . . . . . . . . . . . . 979
Dot1ag MA Configuration
Dot1ag MEP Configuration
. . . . . . . . . . . . . 980
. . . . . . . . . . . . 981
Dot1ag MIP Configuration . . . . . . . . . . . . 982
Dot1ag RMEP Summary
Dot1ag L2 Ping
. . . . . . . . . . . . . . 983
. . . . . . . . . . . . . . . . . . 984
Dot1ag L2 Traceroute . . . . . . . . . . . . . . . 984
Dot1ag L2 Traceroute Cache
Dot1ag Statistics
. . . . . . . . . . . . . . . . . 986
Configuring Dot1ag (CLI)
. . . . . . . . . . . . . . . . 987
. . . . . . . . . . . 985
Configuring Dot1ag Global Settings and Creating Domains
. . . . . . . . . . . . . . . . . 987
Configuring MEP Information . . . . . . . . . . . 988
Dot1ag Ping and Traceroute
Dot1ag Configuration Example
. . . . . . . . . . . 989
. . . . . . . . . . . . 990
32 Contents
27 Snooping and Inspecting Traffic . . . . . . 993
Traffic Snooping and Inspection Overview . . . . . . . 993
What Is DHCP Snooping? How Is the DHCP Snooping Bindings Database
Populated?
. . . . . . . . . . . . . . . . . . . . . 995
What Is IP Source Guard? What is Dynamic ARP Inspection?
Why Is Traffic Snooping and Inspection Necessary?
. . . . . . . . . . . . . . . . . . . . 1000
. . . . . . . . . . . . . . 994
. . . . . . . . . . . . . 998
. . . . . . . . . 999
Default Traffic Snooping and Inspection Values
Configuring Traffic Snooping and Inspection
. . . . . . . . . . . . . . . . . . . . . . . . . . 1002
(Web)
DHCP Snooping Configuration
DHCP Snooping Interface Configuration DHCP Snooping VLAN Configuration DHCP Snooping Persistent Configuration
. . . . . . . . . . 1002
. . . . . 1003
. . . . . . . 1005
. . . . 1006
DHCP Snooping Static Bindings Configuration
. . . . . . . . . . . . . . . . . . . 1007
DHCP Snooping Dynamic Bindings Summary
. . . . . . . . . . . . . . . . . . . . . 1008
DHCP Snooping Statistics . . . . . . . . . . . . 1009
IPSG Interface Configuration IPSG Binding Configuration
IPSG Binding Summary DAI Global Configuration
. . . . . . . . . . . 1010
. . . . . . . . . . . 1010
. . . . . . . . . . . . . . 1011
. . . . . . . . . . . . . 1012
DAI Interface Configuration . . . . . . . . . . . 1013
DAI VLAN Configuration DAI ACL Configuration
. . . . . . . . . . . . . 1015
. . . . . . . . . . . . . . 1016
DAI ACL Rule Configuration . . . . . . . . . . . 1016
DAI Statistics . . . . . . . . . . . . . . . . . . . 1017
Configuring Traffic Snooping and Inspection (CLI)
Configuring DHCP Snooping
. . . . . . . . . . . . . . . . . . . . 1019
. . . . . . . . . . . 1019
. . . 1000
Contents 33
Configuring IP Source Guard . . . . . . . . . . . 1021
Configuring Dynamic ARP Inspection
. . . . . . 1022
Traffic Snooping and Inspection Configuration Examples
. . . . . . . . . . . . . . . . . . . . . . . . 1025
Configuring DHCP Snooping
. . . . . . . . . . . 1025
Configuring IPSG . . . . . . . . . . . . . . . . . 1027
28 Link Aggregation . . . . . . . . . . . . . . . . . 1029
Link Aggregation . . . . . . . . . . . . . . . . . . . . 1029
Overview
Default Link Aggregation Values . . . . . . . . . 1033
Configuring Link Aggregation (Web) . . . . . . . . . 1034
. . . . . . . . . . . . . . . . . . . . . 1029
34 Contents
Configuring Link Aggregation (CLI)
Link Aggregation Configuration Examples
Multi-Switch LAG (MLAG)
Overview
. . . . . . . . . . . . . . . . . . . . . 1047
Deployment Scenarios Definitions
. . . . . . . . . . . . . . . . . . . . . 1050
. . . . . . . . . . 1040
. . . . 1044
. . . . . . . . . . . . . . . 1047
. . . . . . . . . . . . . . 1048
Configuration Consistency . . . . . . . . . . . . 1051
Operation in the Network . . . . . . . . . . . . . 1054
Layer-2 Configuration Steps . . . . . . . . . . . 1058
Switch Firmware Upgrade Procedure . . . . . . 1061
Static Routing on MLAG Interfaces
Caveats and Limitations
. . . . . . . . . . . . . . 1069
. . . . . . . . 1062
Basic Configuration Example . . . . . . . . . . . 1075
A Complete MLAG Example. . . . . . . . . . . . 1083
29 Data Center Bridging Features . . . . . . 1101
Data Center Bridging Technology Overview . . . . . 1101
Default DCB Values
Priority Flow Control. . . . . . . . . . . . . . . . . . 1103
PFC Operation and Behavior
Configuring PFC Using the Web Interface . . . . 1104
Configuring PFC Using the CLI
PFC Configuration Example
. . . . . . . . . . . . . . . . 1102
. . . . . . . . . . . 1103
. . . . . . . . . . 1106
. . . . . . . . . . . . 1108
DCB Capability Exchange
Interoperability with IEEE DCBx
DCBx and Port Roles
. . . . . . . . . . . . . . . 1110
. . . . . . . . . 1111
. . . . . . . . . . . . . . . 1111
Configuration Source Port Selection
Process . . . . . . . . . . . . . . . . . . . . . . 1113
Disabling DCBX
. . . . . . . . . . . . . . . . . . 1114
Configuring DCBx. . . . . . . . . . . . . . . . . 1115
Enhanced Transmission Selection . . . . . . . . . . 1117
ETS Operation
. . . . . . . . . . . . . . . . . . 1117
Commands . . . . . . . . . . . . . . . . . . . . 1120
ETS Configuration Example
ETS Theory of Operation
. . . . . . . . . . . . 1121
. . . . . . . . . . . . . 1127
30 MAC Addressing and Forwarding . . . . 1133
MAC Address Table Overview . . . . . . . . . . . . 1133
How Is the Address Table Populated?
What Information Is in the MAC Address
Table?. . . . . . . . . . . . . . . . . . . . . . . 1134
How Is the MAC Address Table Maintained Across a Stack?
. . . . . . . . . . . . . . . . . 1134
. . . . . . 1133
Default MAC Address Table Values
. . . . . . . . . . 1134
Contents 35
Managing the MAC Address Table (Web). . . . . . . 1135
Static Address Table
Global Address Table
. . . . . . . . . . . . . . . 1135
. . . . . . . . . . . . . . . 1137
Managing the MAC Address Table (CLI)
Managing the MAC Address Table
. . . . . . . 1138
. . . . . . . . 1138
31 DHCP Server Settings . . . . . . . . . . . . . 1141
DHCP Overview . . . . . . . . . . . . . . . . . . . . 1141
How Does DHCP Work?
What are DHCP Options?
What Additional DHCP Features Does the
Switch Support? . . . . . . . . . . . . . . . . . 1143
Default DHCP Server Values. . . . . . . . . . . . . . 1144
Configuring the DHCP Server (Web)
DHCP Server Network Properties
Address Pool
. . . . . . . . . . . . . . . . . . . 1147
Address Pool Options . . . . . . . . . . . . . . . 1151
DHCP Bindings
DHCP Server Reset Configuration
DHCP Server Conflicts Information . . . . . . . . 1154
DHCP Server Statistics
. . . . . . . . . . . . . . 1142
. . . . . . . . . . . . . 1142
. . . . . . . . . . 1145
. . . . . . . . 1145
. . . . . . . . . . . . . . . . . . 1153
. . . . . . . . 1154
. . . . . . . . . . . . . . 1155
36 Contents
Configuring the DHCP Server (CLI)
Configuring Global DHCP Server Settings
Configuring a Dynamic Address Pool
Configuring a Static Address Pool
. . . . . . . . . . 1156
. . . . 1156
. . . . . . . 1157
. . . . . . . . 1158
Monitoring DHCP Server Information . . . . . . 1159
DHCP Server Configuration Examples. . . . . . . . . 1160
Configuring a Dynamic Address Pool
. . . . . . . 1160
Configuring a Static Address Pool . . . . . . . . 1162
32 IP Routing . . . . . . . . . . . . . . . . . . . . . . 1165
IP Routing Overview . . . . . . . . . . . . . . . . . . 1165
Default IP Routing Values . . . . . . . . . . . . . . . 1167
IP Path MTU and Path MTU Discovery
ARP Table
. . . . . . . . . . . . . . . . . . . . . . . 1169
. . . . . . . . 1168
Configuring IP Routing Features (Web) . . . . . . . . 1170
IP Configuration
. . . . . . . . . . . . . . . . . . 1170
IP Statistics . . . . . . . . . . . . . . . . . . . . 1171
ARP Create . . . . . . . . . . . . . . . . . . . . 1172
ARP Table Configuration Router Discovery Configuration
. . . . . . . . . . . . . 1173
. . . . . . . . . 1174
Router Discovery Status . . . . . . . . . . . . . 1175
Route Table Best Routes Table
. . . . . . . . . . . . . . . . . . . . 1176
. . . . . . . . . . . . . . . . 1177
Route Entry Configuration . . . . . . . . . . . . 1178
Configured Routes Route Preferences Configuration
. . . . . . . . . . . . . . . . 1180
. . . . . . . . 1181
Configuring IP Routing Features (CLI) . . . . . . . . . 1182
Configuring Global IP Routing Settings
. . . . . . 1182
Adding Static ARP Entries and Configuring
ARP Table Settings . . . . . . . . . . . . . . . . 1183
Configuring Router Discovery (IRDP)
. . . . . . . 1184
Configuring Route Table Entries and Route Preferences
. . . . . . . . . . . . . . . . . . . . 1185
IP Routing Configuration Example . . . . . . . . . . 1187
Configuring Dell EMC Networking N-Series Switch A
. . . . . . . . . . . . . . . . . . . . . 1188
Configuring Dell EMC Networking N-Series Switch B
. . . . . . . . . . . . . . . . . . . . . 1189
Contents 37
33 Routing Interfaces . . . . . . . . . . . . . . . . 1191
Routing Interface Overview . . . . . . . . . . . . . . 1191
What Are VLAN Routing Interfaces?
What Are Loopback Interfaces?
What Are Tunnel Interfaces?
Why Are Routing Interfaces Needed? . . . . . . 1194
Default Routing Interface Values . . . . . . . . . . . 1196
. . . . . . . 1191
. . . . . . . . . 1192
. . . . . . . . . . . 1193
Configuring Routing Interfaces (Web)
IP Interface Configuration
DHCP Lease Parameters VLAN Routing Summary
Tunnel Configuration
. . . . . . . . . . . . . . . 1199
. . . . . . . . . 1197
. . . . . . . . . . . . 1197
. . . . . . . . . . . . . 1198
. . . . . . . . . . . . . 1198
Tunnels Summary. . . . . . . . . . . . . . . . . 1200
Loopbacks Configuration Loopbacks Summary
. . . . . . . . . . . . . 1201
. . . . . . . . . . . . . . . 1202
Configuring Routing Interfaces (CLI) . . . . . . . . . 1203
Configuring VLAN Routing Interfaces (IPv4)
Configuring Loopback Interfaces. . . . . . . . . 1205
Configuring Tunnels. . . . . . . . . . . . . . . . 1206
34 Layer-2 and Layer-3 Relay
Features . . . . . . . . . . . . . . . . . . . . . . . 1207
L2 and L3 Relay Overview . . . . . . . . . . . . . . . 1207
What Is L2 DHCP Relay?
What Is L3 DHCP Relay? . . . . . . . . . . . . . 1211
What Is the IP Helper Feature?
. . . . . . . . . . . . . 1207
. . . . . . . . . . 1212
. . . 1203
38 Contents
Default L2/L3 Relay Values
. . . . . . . . . . . . . . . 1216
Configuring L2 and L3 Relay Features (Web) . . . . . 1217
L2 DHCP Relay Global Configuration . . . . . . . 1217
L2 DHCP Relay Interface Configuration L2 DHCP Relay Interface Statistics L2 DHCP Relay VLAN Configuration
. . . . . 1218
. . . . . . . . 1220
. . . . . . . 1221
DHCP Relay Agent Configuration. . . . . . . . . 1222
IP Helper (L3 DHCP Relay) Global
Configuration . . . . . . . . . . . . . . . . . . . 1223
IP Helper (L3 DHCP Relay) Interface Configuration
IP Helper Statistics
. . . . . . . . . . . . . . . . . . . 1225
. . . . . . . . . . . . . . . . 1227
Configuring L2 and L3 Relay Features (CLI) . . . . . . 1228
Configuring L2 DHCP Relay
. . . . . . . . . . . . 1228
Configuring L3 Relay (IP Helper) Settings . . . . 1230
Relay Agent Configuration Example . . . . . . . . . 1232
35 OSPF and OSPFv3 . . . . . . . . . . . . . . . . 1235
OSPF Overview . . . . . . . . . . . . . . . . . . . . 1236
What Are OSPF Areas and Other OSPF Topology Features?
What Are OSPF Routers and LSAs? . . . . . . . 1237
How Are Routes Selected? . . . . . . . . . . . . 1237
How Are OSPF and OSPFv3 Different? . . . . . . 1237
. . . . . . . . . . . . . . . . 1236
OSPF Feature Details . . . . . . . . . . . . . . . . . 1238
Stub Router
. . . . . . . . . . . . . . . . . . . . 1238
Static Area Range Cost. . . . . . . . . . . . . . 1240
LSA Pacing
Flood Blocking
. . . . . . . . . . . . . . . . . . . . 1241
. . . . . . . . . . . . . . . . . . 1242
MTU. . . . . . . . . . . . . . . . . . . . . . . . 1243
Default OSPF Values. . . . . . . . . . . . . . . . . . 1244
Configuring OSPF Features (Web)
. . . . . . . . . . . 1246
Contents 39
OSPF Configuration . . . . . . . . . . . . . . . . 1246
OSPF Area Configuration OSPF Stub Area Summary OSPF Area Range Configuration
. . . . . . . . . . . . . 1248
. . . . . . . . . . . . 1251
. . . . . . . . . 1252
OSPF Interface Statistics . . . . . . . . . . . . . 1253
OSPF Interface Configuration OSPF Neighbor Table
. . . . . . . . . . . 1254
. . . . . . . . . . . . . . . 1255
OSPF Neighbor Configuration . . . . . . . . . . 1256
OSPF Link State Database OSPF Virtual Link Configuration
OSPF Virtual Link Summary OSPF Route Redistribution Configuration
. . . . . . . . . . . . 1257
. . . . . . . . . 1257
. . . . . . . . . . . . 1259
. . . . . 1260
OSPF Route Redistribution Summary. . . . . . . 1261
NSF OSPF Configuration
. . . . . . . . . . . . . 1262
Configuring OSPFv3 Features (Web)
OSPFv3 Configuration
. . . . . . . . . . . . . . . 1263
OSPFv3 Area Configuration
OSPFv3 Stub Area Summary OSPFv3 Area Range Configuration OSPFv3 Interface Configuration
. . . . . . . . . . 1263
. . . . . . . . . . . . 1264
. . . . . . . . . . . 1267
. . . . . . . . 1268
. . . . . . . . . 1269
OSPFv3 Interface Statistics. . . . . . . . . . . . 1270
OSPFv3 Neighbors OSPFv3 Neighbor Table
. . . . . . . . . . . . . . . . 1271
. . . . . . . . . . . . . . 1272
OSPFv3 Link State Database . . . . . . . . . . . 1273
OSPFv3 Virtual Link Configuration OSPFv3 Virtual Link Summary
. . . . . . . . 1274
. . . . . . . . . . 1276
OSPFv3 Route Redistribution Configuration . . . 1277 OSPFv3 Route Redistribution Summary NSF OSPFv3 Configuration
. . . . . . . . . . . . 1279
. . . . . 1278
Configuring OSPF Features (CLI). . . . . . . . . . . . 1280
Configuring Global OSPF Settings
. . . . . . . . 1280
Configuring OSPF Interface Settings . . . . . . . 1283
Configuring Stub Areas and NSSAs . . . . . . . 1285
Configuring Virtual Links . . . . . . . . . . . . . 1287
40 Contents
Configuring OSPF Area Range Settings . . . . . 1289
Configuring NSF Settings for OSPF
. . . . . . . . 1291
Configuring OSPFv3 Features (CLI) . . . . . . . . . . 1292
Configuring Global OSPFv3 Settings
. . . . . . . 1292
Configuring OSPFv3 Interface Settings . . . . . 1294
Configuring Stub Areas and NSSAs . . . . . . . 1296
Configuring Virtual Links . . . . . . . . . . . . . 1298
Configuring an OSPFv3 Area Range . . . . . . . 1299
Configuring OSPFv3 Route Redistribution Settings
Configuring NSF Settings for OSPFv3
. . . . . . . . . . . . . . . . . . . . . . 1300
. . . . . . 1301
OSPF Configuration Examples
. . . . . . . . . . . . . 1302
Configuring an OSPF Border Router and Setting Interface Costs
. . . . . . . . . . . . . . 1302
Configuring Stub and NSSA Areas for
OSPF and OSPFv3. . . . . . . . . . . . . . . . . 1305
Configuring a Virtual Link for OSPF and
. . . . . . . . . . . . . . . . . . . . . . 1308
OSPFv3
Interconnecting an IPv4 Backbone and Local IPv6 Network
Configuring the Static Area Range Cost
Configuring Flood Blocking
Configuring OSPF VRFs
. . . . . . . . . . . . . . . . . . . 1311
. . . . . 1314
. . . . . . . . . . . . 1319
. . . . . . . . . . . . . . . . 1324
36 VRF . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1327
VRF Resource Sharing . . . . . . . . . . . . . . . . . 1328
VRF ARP Entries
VRF Route Entries
. . . . . . . . . . . . . . . . . 1328
. . . . . . . . . . . . . . . . . 1328
Contents 41
37 RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1333
RIP Overview. . . . . . . . . . . . . . . . . . . . . . 1333
How Does RIP Determine Route Information?
What Is Split Horizon?
What RIP Versions Are Supported? . . . . . . . 1334
Default RIP Values . . . . . . . . . . . . . . . . . . . 1335
. . . . . . . . . . . . . . . . . . . . 1333
. . . . . . . . . . . . . . 1334
Configuring RIP Features (Web)
RIP Configuration
. . . . . . . . . . . . . . . . . 1336
RIP Interface Configuration RIP Interface Summary RIP Route Redistribution Configuration
. . . . . . . . . . . . 1336
. . . . . . . . . . . . 1337
. . . . . . . . . . . . . . 1338
. . . . . . 1339
RIP Route Redistribution Summary . . . . . . . . 1340
Configuring RIP Features (CLI)
Configuring Global RIP Settings
Configuring RIP Interface Settings
. . . . . . . . . . . . . 1341
. . . . . . . . . 1341
. . . . . . . . 1342
Configuring Route Redistribution Settings . . . . 1343
RIP Configuration Example . . . . . . . . . . . . . . 1345
38 VRRP . . . . . . . . . . . . . . . . . . . . . . . . . . 1349
VRRP Overview. . . . . . . . . . . . . . . . . . . . . 1349
How Does VRRP Work?
What Is the VRRP Router Priority?
What Is VRRP Preemption? . . . . . . . . . . . . 1350
What Is VRRP Accept Mode?
What Are VRRP Route and Interface
Tracking? . . . . . . . . . . . . . . . . . . . . . 1351
. . . . . . . . . . . . . . 1349
. . . . . . . . 1350
. . . . . . . . . . . 1351
42 Contents
Default VRRP Values . . . . . . . . . . . . . . . . . . 1353
Configuring VRRP Features (Web). . . . . . . . . . . 1354
VRRP Configuration
VRRP Virtual Router Status VRRP Virtual Router Statistics VRRP Router Configuration
. . . . . . . . . . . . . . . . 1354
. . . . . . . . . . . . 1355
. . . . . . . . . . 1356
. . . . . . . . . . . . 1357
VRRP Route Tracking Configuration . . . . . . . 1358
VRRP Interface Tracking Configuration
. . . . . 1360
Configuring VRRP Features (CLI)
Configuring VRRP Settings
. . . . . . . . . . . 1362
. . . . . . . . . . . . 1362
VRRP Configuration Example . . . . . . . . . . . . . 1364
VRRP with Load Sharing
. . . . . . . . . . . . . 1364
Troubleshooting VRRP . . . . . . . . . . . . . . 1367
VRRP with Route and Interface Tracking Configuring VRRP in a VRF
. . . . . . . . . . . . 1371
. . . . 1368
39 BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . 1375
Overview . . . . . . . . . . . . . . . . . . . . . . . . 1376
Autonomous Systems
BGP Operations
. . . . . . . . . . . . . . . . . . . . 1378
Decision Process Overview
Path Attributes
BGP Finite State Machine (FSM) . . . . . . . . . 1382
Detecting Loss of Adjacency . . . . . . . . . . . 1384
Authentication
Outbound Update Groups
Removing Private AS Numbers. . . . . . . . . . 1386
Templates
. . . . . . . . . . . . . . . . . . . . . 1386
Resolving Interface Routes
Originating BGP Routes. . . . . . . . . . . . . . 1388
Equal Cost Multipath (ECMP)
. . . . . . . . . . . . . . 1378
. . . . . . . . . . . 1378
. . . . . . . . . . . . . . . . . . 1380
. . . . . . . . . . . . . . . . . . 1385
. . . . . . . . . . . . . 1385
. . . . . . . . . . . . 1388
. . . . . . . . . . . 1389
Contents 43
BGP Next-Hop Resolution . . . . . . . . . . . . 1390
Address Aggregation
. . . . . . . . . . . . . . . 1392
Routing Policy. . . . . . . . . . . . . . . . . . . 1394
Inbound Policy
Outbound Policy
. . . . . . . . . . . . . . . . . . 1395
. . . . . . . . . . . . . . . . . . 1395
Routing Policy Changes. . . . . . . . . . . . . . 1396
BGP Timers
Communities
. . . . . . . . . . . . . . . . . . . . 1397
. . . . . . . . . . . . . . . . . . . 1398
Routing Table Overflow . . . . . . . . . . . . . . 1398
Route Reflection
VRF Support
. . . . . . . . . . . . . . . . . 1399
. . . . . . . . . . . . . . . . . . . . 1400
BGP Neighbor Configuration . . . . . . . . . . . 1400
Extended Communities
VPNv4/VRF Route Distribution via MP-BGP
. . . . . . . . . . . . . . 1400
. . . 1403
IPv6 . . . . . . . . . . . . . . . . . . . . . . . . 1406
BGP Limitations . . . . . . . . . . . . . . . . . . . . 1412
44 Contents
BGP Configuration Examples
Enabling BGP
BGP Example
. . . . . . . . . . . . . . . . . . . 1414
. . . . . . . . . . . . . . . . . . . 1415
Network Example BGP Redistribution of OSPF Example
. . . . . . . . . . . . . 1414
. . . . . . . . . . . . . . . . . 1416
. . . . . . . 1417
Configuring the Multi-Exit Discriminator in BGP Advertised Routes
. . . . . . . . . . . . . . 1418
Configuring Communities in BGP . . . . . . . . . 1419
Configuring a Route Reflector . . . . . . . . . . 1420
Campus Network MP-BGP and OSPF Configuration
. . . . . . . . . . . . . . . . . . . 1422
Configuring MP-eBGP and Extended Communities
. . . . . . . . . . . . . . . . . . . 1438
40 Bidirectional Forwarding
Detection
Overview . . . . . . . . . . . . . . . . . . . . . . . . 1445
. . . . . . . . . . . . . . . . . . . . . . 1445
BFD Operational Modes
Asynchronous Mode
Demand Mode
Echo Function
Limitations
BFD Example
. . . . . . . . . . . . . . . . . . . . . . . 1447
. . . . . . . . . . . . . . . . . . . . . . 1448
. . . . . . . . . . . . . . . . 1446
. . . . . . . . . . . . . . . 1446
. . . . . . . . . . . . . . . . . . 1446
. . . . . . . . . . . . . . . . . . . 1447
41 IPv6 Routing . . . . . . . . . . . . . . . . . . . . 1451
IPv6 Routing Overview. . . . . . . . . . . . . . . . . 1451
How Does IPv6 Compare with IPv4?
How Are IPv6 Interfaces Configured? . . . . . . 1452
Default IPv6 Routing Values . . . . . . . . . . . . . . 1454
Configuring IPv6 Routing Features (Web)
Global Configuration
Interface Configuration Interface Summary IPv6 Statistics
. . . . . . . . . . . . . . . 1456
. . . . . . . . . . . . . . 1457
. . . . . . . . . . . . . . . . 1458
. . . . . . . . . . . . . . . . . . . 1459
IPv6 Neighbor Table . . . . . . . . . . . . . . . 1460
DHCPv6 Client Parameters DHCPv6 Client Statistics
. . . . . . . . . . . . 1461
. . . . . . . . . . . . . 1462
IPv6 Router Entry Configuration . . . . . . . . . 1463
IPv6 Route Table IPv6 Route Preferences
. . . . . . . . . . . . . . . . . 1464
. . . . . . . . . . . . . 1465
Configured IPv6 Routes. . . . . . . . . . . . . . 1466
. . . . . . . 1452
. . . . . . . 1456
Configuring IPv6 Routing Features (CLI)
. . . . . . . . 1467
Contents 45
Configuring Global IP Routing Settings . . . . . . 1467
Configuring IPv6 Interface Settings Configuring IPv6 Neighbor Discovery
. . . . . . . 1468
. . . . . . 1469
Configuring IPv6 Route Table Entries and
Route Preferences . . . . . . . . . . . . . . . . 1471
IPv6 Show Commands
. . . . . . . . . . . . . . 1473
IPv6 Static Reject and Discard Routes
. . . . . . . . 1474
IPv6 Router Advertisement Guard . . . . . . . . . . . 1475
42 DHCPv6 Server Settings . . . . . . . . . . . 1479
DHCPv6 Overview . . . . . . . . . . . . . . . . . . . 1479
What Is a DHCPv6 Pool?
What Is a Stateless Server?
What Is the DHCPv6 Relay Agent
Information Option? . . . . . . . . . . . . . . . . 1480
What Is a Prefix Delegation?
Default DHCPv6 Server and Relay Values
Configuring the DHCPv6 Server and Relay (Web)
DHCPv6 Global Configuration
DHCPv6 Pool Configuration Prefix Delegation Configuration
DHCPv6 Pool Summary . . . . . . . . . . . . . . 1486
DHCPv6 Interface Configuration DHCPv6 Server Bindings Summary
DHCPv6 Statistics . . . . . . . . . . . . . . . . . 1490
. . . . . . . . . . . . . 1480
. . . . . . . . . . . 1480
. . . . . . . . . . . 1480
. . . . . . . 1481
. . . 1482
. . . . . . . . . . . 1482
. . . . . . . . . . . . 1483
. . . . . . . . . 1485
. . . . . . . . . 1487
. . . . . . . . 1489
46 Contents
Configuring the DHCPv6 Server and Relay (CLI)
. . . . 1491
Configuring Global DHCP Server and Relay Agent Settings
. . . . . . . . . . . . . . . . . . 1491
Configuring a DHCPv6 Pool for Stateless
Server Support . . . . . . . . . . . . . . . . . . 1491
Configuring a DHCPv6 Pool for Specific
Hosts . . . . . . . . . . . . . . . . . . . . . . . 1492
Configuring DHCPv6 Interface Information . . . 1493
Monitoring DHCPv6 Information
. . . . . . . . . 1494
DHCPv6 Configuration Examples
Configuring a DHCPv6 Stateless Server
. . . . . . . . . . . 1495
. . . . . 1495
Configuring the DHCPv6 Server for Prefix Delegation
. . . . . . . . . . . . . . . . . . . . 1496
Configuring an Interface as a DHCPv6
Relay Agent . . . . . . . . . . . . . . . . . . . . 1496
43 Differentiated Services . . . . . . . . . . . . 1499
DiffServ Overview . . . . . . . . . . . . . . . . . . . 1499
How Does DiffServ Functionality Vary Based on the Role of the Switch?
What Are the Elements of DiffServ Configuration?
Default DiffServ Values
. . . . . . . . . . . . . . . . . . 1500
. . . . . . . . . . . . . . . . 1501
Configuring DiffServ (Web) . . . . . . . . . . . . . . 1502
DiffServ Configuration
. . . . . . . . . . . . . . 1502
Class Configuration . . . . . . . . . . . . . . . . 1503
Class Criteria . . . . . . . . . . . . . . . . . . . 1504
Policy Configuration . . . . . . . . . . . . . . . 1506
Policy Class Definition . . . . . . . . . . . . . . 1508
Service Configuration
. . . . . . . . . . . . . . 1511
Service Detailed Statistics
Flow-Based Mirroring . . . . . . . . . . . . . . 1513
. . . . . . . . 1500
. . . . . . . . . . . . 1512
Configuring DiffServ (CLI)
DiffServ Configuration (Global)
DiffServ Class Configuration for IPv4
. . . . . . . . . . . . . . . 1514
. . . . . . . . . . 1514
. . . . . . . 1514
DiffServ Class Configuration for IPv6. . . . . . . 1516
Contents 47
DiffServ Policy Creation. . . . . . . . . . . . . . 1517
Simple DiffServ Policy Attributes
Configuration . . . . . . . . . . . . . . . . . . . 1518
DiffServ Service Configuration
. . . . . . . . . . 1521
DiffServ Configuration Examples
. . . . . . . . . . . 1522
Providing Subnets Equal Access to External Network
DiffServ for VoIP
. . . . . . . . . . . . . . . . . 1522
. . . . . . . . . . . . . . . . . 1525
44 Class-of-Service . . . . . . . . . . . . . . . . . 1529
CoS Overview . . . . . . . . . . . . . . . . . . . . . 1529
What Are Trusted and Untrusted Port
. . . . . . . . . . . . . . . . . . . . . . 1530
Modes?
How Is Traffic Shaping Used on Egress
Traffic? . . . . . . . . . . . . . . . . . . . . . . 1530
How Are Traffic Queues Defined? Which Queue Management Methods
Are Supported?
. . . . . . . . . . . . . . . . . . 1531
CoS Queue Usage. . . . . . . . . . . . . . . . . 1533
Default CoS Values. . . . . . . . . . . . . . . . . . . 1533
Configuring CoS (Web)
. . . . . . . . . . . . . . . . . 1535
Mapping Table Configuration
Interface Configuration
. . . . . . . . . . . . . . 1538
Interface Queue Configuration Interface Queue Drop Precedence
Configuration
. . . . . . . . . . . . . . . . . . . 1540
. . . . . . . . 1531
. . . . . . . . . . . 1535
. . . . . . . . . . 1539
48 Contents
Configuring CoS (CLI)
. . . . . . . . . . . . . . . . . 1542
Mapping Table Configuration
CoS Interface Configuration Commands
Interface Queue Configuration
. . . . . . . . . . . 1542
. . . . . 1543
. . . . . . . . . . 1543
Configuring Interface Queue Drop
Probability . . . . . . . . . . . . . . . . . . . . 1545
CoS Configuration Example
. . . . . . . . . . . . . . . . . . . . . . . . . . 1549
WRED
WRED Processing
WRED Drop Probabilities
Exponential Weighting Constant WRED Color-Aware Processing
Simple Meter Implementation
. . . . . . . . . . . . . . 1546
. . . . . . . . . . . . . . . . 1549
. . . . . . . . . . . . . 1549
. . . . . . . . . 1550
. . . . . . . . . 1550
. . . . . . . . . . 1551
Single Rate Meter Implementation . . . . . . . . 1551
Two-Rate Meter Implementation
Explicit Congestion Notification
Enabling ECN in Microsoft Windows
Example 1: SLA Configuration Example 2: Long-Lived Congestion
. . . . . . . . . 1552
. . . . . . . . . . . 1553
. . . . . . . 1554
. . . . . . . . . . 1555
. . . . . . . . 1559
Example 3: Data Center TCP (DCTCP) Configuration
. . . . . . . . . . . . . . . . . . . 1559
45 Auto VoIP . . . . . . . . . . . . . . . . . . . . . . . 1561
Auto VoIP Overview . . . . . . . . . . . . . . . . . . 1561
How Does Auto VoIP Use ACLs?
. . . . . . . . . 1562
Default Auto VoIP Values
. . . . . . . . . . . . . . . 1562
Configuring Auto VoIP (Web)
Auto VoIP Global Configuration
Auto VoIP Interface Configuration
Configuring Auto VoIP (CLI)
. . . . . . . . . . . . . 1563
. . . . . . . . . 1563
. . . . . . . . 1563
. . . . . . . . . . . . . . 1565
Contents 49
46 IPv4 and IPv6 Multicast . . . . . . . . . . . . 1567
L3 Multicast Overview . . . . . . . . . . . . . . . . . 1567
What Is IP Multicast Traffic?
Multicast Addressing
What Multicast Protocols Does the Switch
Support?. . . . . . . . . . . . . . . . . . . . . . 1569
What Are the Multicast Protocol Roles?
When Is L3 Multicast Required on the
Switch? . . . . . . . . . . . . . . . . . . . . . . 1570
What Is the Multicast Routing Table?
What Is IGMP? What Is MLD?
What Is PIM?
. . . . . . . . . . . . . . . . . . 1572
. . . . . . . . . . . . . . . . . . . 1573
. . . . . . . . . . . . . . . . . . . 1573
What Is DVMRP? . . . . . . . . . . . . . . . . . 1584
Default L3 Multicast Values . . . . . . . . . . . . . . 1587
Configuring General IPv4 Multicast Features
. . . . . . . . . . . . . . . . . . . . . . . . . . 1589
(Web)
Multicast Global Configuration
Multicast Interface Configuration . . . . . . . . 1590
Multicast Route Table . . . . . . . . . . . . . . 1591
Multicast Admin Boundary Configuration Multicast Admin Boundary Summary
Multicast Static MRoute Configuration. . . . . . 1593
Multicast Static MRoute Summary . . . . . . . . 1594
. . . . . . . . . . . 1568
. . . . . . . . . . . . . . . 1568
. . . . . 1570
. . . . . . 1571
. . . . . . . . . . 1589
. . . . 1592
. . . . . . 1593
50 Contents
Configuring IPv6 Multicast Features (Web) . . . . . . 1595
IPv6 Multicast Route Table
Configuring IGMP and IGMP Proxy (Web)
IGMP Global Configuration
IGMP Interface Configuration IGMP Interface Summary IGMP Cache Information
. . . . . . . . . . . . 1595
. . . . . . 1596
. . . . . . . . . . . . 1596
. . . . . . . . . . 1597
. . . . . . . . . . . . . 1598
. . . . . . . . . . . . . 1598
IGMP Interface Source List Information . . . . . 1600
IGMP Proxy Interface Configuration
. . . . . . . 1601
IGMP Proxy Configuration Summary . . . . . . . 1602
IGMP Proxy Interface Membership Info
. . . . . 1603
Detailed IGMP Proxy Interface Membership Information
. . . . . . . . . . . . . 1604
Configuring MLD and MLD Proxy (Web)
MLD Global Configuration
. . . . . . . . . . . . 1605
MLD Routing Interface Configuration MLD Routing Interface Summary
. . . . . . . 1605
. . . . . . 1606
. . . . . . . . . 1607
MLD Routing Interface Cache Information. . . . 1607
MLD Routing Interface Source List
Information . . . . . . . . . . . . . . . . . . . . 1608
MLD Traffic MLD Proxy Configuration MLD Proxy Configuration Summary
. . . . . . . . . . . . . . . . . . . . 1609
. . . . . . . . . . . . . 1610
. . . . . . . 1611
MLD Proxy Interface Membership Information
. . . . . . . . . . . . . . . . . . . . 1612
Detailed MLD Proxy Interface Membership Information
. . . . . . . . . . . . . . . . . . . . 1613
Configuring PIM for IPv4 and IPv6 (Web) . . . . . . . 1614
PIM Global Configuration
. . . . . . . . . . . . . 1614
PIM Global Status . . . . . . . . . . . . . . . . 1616
PIM Interface Configuration . . . . . . . . . . . 1617
PIM Interface Summary Candidate RP Configuration
. . . . . . . . . . . . . 1618
. . . . . . . . . . . 1619
Static RP Configuration. . . . . . . . . . . . . . 1621
SSM Range Configuration BSR Candidate Configuration
. . . . . . . . . . . . 1623
. . . . . . . . . . 1625
BSR Candidate Summary . . . . . . . . . . . . . 1626
Configuring DVMRP (Web)
DVMRP Global Configuration
DVMRP Interface Configuration
. . . . . . . . . . . . . . 1627
. . . . . . . . . . . 1627
. . . . . . . . . 1628
Contents 51
DVMRP Configuration Summary . . . . . . . . . 1629
DVMRP Next Hop Summary
. . . . . . . . . . . 1630
DVMRP Prune Summary . . . . . . . . . . . . . 1631
DVMRP Route Summary
. . . . . . . . . . . . . 1631
Configuring L3 Multicast Features (CLI)
. . . . . . . . 1632
Configuring and Viewing IPv4 Multicast Information
. . . . . . . . . . . . . . . . . . . . 1632
Configuring and Viewing IPv6 Multicast
Route Information. . . . . . . . . . . . . . . . . 1634
Configuring and Viewing IGMP . . . . . . . . . . 1635
Configuring and Viewing IGMP Proxy . . . . . . 1637
Configuring and Viewing MLD . . . . . . . . . . 1638
Configuring and Viewing MLD Proxy
. . . . . . . 1639
Configuring and Viewing PIM-DM for IPv4
Multicast Routing . . . . . . . . . . . . . . . . . 1640
Configuring and Viewing PIM-DM for IPv6 Multicast Routing
. . . . . . . . . . . . . . . . . 1641
Configuring and Viewing PIM-SM for IPv4
Multicast Routing . . . . . . . . . . . . . . . . . 1642
Configuring and Viewing PIM-SM for IPv6 Multicast Routing
. . . . . . . . . . . . . . . . . 1644
Configuring and Viewing DVMRP
Information . . . . . . . . . . . . . . . . . . . . 1647
L3 Multicast Configuration Examples . . . . . . . . . 1648
Configuring Multicast VLAN Routing With IGMP and PIM-SM
Configuring DVMRP
. . . . . . . . . . . . . . . . 1648
. . . . . . . . . . . . . . . . 1652
47 Audio Video Bridging . . . . . . . . . . . . . . 1653
52 Contents
Overview . . . . . . . . . . . . . . . . . . . . . . . . 1653
MSRP . . . . . . . . . . . . . . . . . . . . . . . . . . 1656
. . . . . . . . . . . . . . . . . . . . . . . . . . 1657
MVRP
MMRP . . . . . . . . . . . . . . . . . . . . . . . . . 1658
IEEE 802.1AS
Best Master Selection
Time Synchronization
Link Delay Measurement
. . . . . . . . . . . . . . . . . . . . . . 1659
. . . . . . . . . . . . . . 1661
. . . . . . . . . . . . . . . 1662
. . . . . . . . . . . . . 1663
Caveats and Limitations . . . . . . . . . . . . . 1665
AVB Configuration Example . . . . . . . . . . . . . . 1666
48 OpenFlow . . . . . . . . . . . . . . . . . . . . . . . 1669
Dell EMC Networking OpenFlow Hybrid
Overview . . . . . . . . . . . . . . . . . . . . . . . . 1669
Enable Dell EMC Networking OpenFlow
. . . . . . . . . . . . . . . . . . . . . . . 1670
Hybrid
Interaction with OpenFlow Controllers
Deploy OpenFlow Controller Flows
Collect Port and Queue Status and
Statistics . . . . . . . . . . . . . . . . . . . . . 1708
Usage Scenarios
. . . . . . . . . . . . . . . . . 1708
Eligible Interfaces . . . . . . . . . . . . . . . . 1708
OpenFlow Hybrid . . . . . . . . . . . . . . . . . . . 1709
. . . . . . 1672
. . . . . . . . 1703
Example Configuration
Interaction with Other Switch Functions
OpenSSL
IP Stack
VLANs
. . . . . . . . . . . . . . . . . . . . . 1710
. . . . . . . . . . . . . . . . . . . . . . 1710
. . . . . . . . . . . . . . . . . . . . . . . 1710
. . . . . . . . . . . . . . . . 1709
. . . . . . . 1710
LAGs . . . . . . . . . . . . . . . . . . . . . . . 1711
Ports
. . . . . . . . . . . . . . . . . . . . . . . 1711
Network Interface ARP Table
. . . . . . . . . . 1711
Routing Interface ARP Table . . . . . . . . . . . 1711
Contents 53
QoS . . . . . . . . . . . . . . . . . . . . . . . . 1711
IP Routing, IP Multicast, and Layer-2
Multicast . . . . . . . . . . . . . . . . . . . . . 1712
LLDP and Voice VLAN
. . . . . . . . . . . . . . 1712
Limitations, Restrictions, and Assumptions
List of OpenFlow—Dell EMC Networking Component Interferences
OpenFlow Configuration Example
. . . . . . . . . . . . . 1713
. . . . . . . . . . . 1714
. . . . . . 1713
49 Dell EMC Networking Python
Support . . . . . . . . . . . . . . . . . . . . . . . . 1715
A Appendix . . . . . . . . . . . . . . . . . . . . . . . 1723
Feature Limits and Platform Constants . . . . . . . . 1723
System Process Definitions . . . . . . . . . . . . . . 1736
SupportAssist
. . . . . . . . . . . . . . . . . . . . . 1743
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1747
54 Contents
1

Introduction

The switches in the N-Series are stackable layer-2 and layer-3 switches. These switches include the following features:
1U form factor, rack-mountable chassis design.
Support for all data-communication requirements for a multi-layer switch, including layer-2 switching, IPv4 routing, IPv6 routing, IP multicast, quality of service, security, and system management features.
High availability with automatic failover and checkpointing of dynamic state.
The Dell EMC Networking N-Series includes the following switch models: N1108T-ON, N1108P-ON, N1124T-ON, N1124P-ON, N1148T-ON, N1148P­ON, N1524, N1524P, N1548, N1548P, N2024, N2024P, N2048, N2048P, N2128PX-ON, N3024, N3024F, N3024P, N3048, N3048P, N3132PX-ON, N4032, N4032F, N4064, N4064F
NOTE: Switch administrators are strongly advised to maintain Dell EMC
Networking N-Series switches on the latest version of the Dell EMC Networking Operating System. Dell EMC Networking continually improves the features and functions based on feedback from you, the customer. For critical infrastructure, prestaging of a new release into a non-critical portion of the network is recommended to verify network configuration and operation with any new version of Dell EMC Networking N-Series switch firmware.

About This Document

This guide discusses and provides examples on how to configure, monitor, and maintain Dell EMC Networking N-Series switches by using web-based Dell EMC OpenManage Switch Administrator utility or the command-line interface (CLI).
Examples given in this guide may not include complete CLI syntax as the preference is to present CLI syntax relevant to the configuration task. Refer to the
Dell EMC Networking N1100-ON, N1500, N2000, N2100-ON, N3000,
N3100-ON, and N4000 Series Switches CLI Reference Guide
for definitive
Introduction 55
syntax for any particular command. The parameter ranges listed in the examples or text may vary from the allowed range on any particular switch due to product limitations. Refer to the Feature Limits and Platform Constants section located in the Appendix of this document for range limits relevant to a particular switch model.

Audience

This guide is for network administrators in charge of managing one or more Dell EMC Networking N-Series switches. To obtain the greatest benefit from this guide, you should have a basic understanding of Ethernet networks and local area network (LAN) concepts.

Document Conventions

Table 1-1 describes the typographical conventions this document uses.
Table 1-1. Document Conventions
Convention Description
Bold Page names, field names, menu options, button names, and
CLI commands and keywords.
courier font
[ ] In a command line, square brackets indicate an optional
{ } In a command line, inclusive brackets indicate a selection of
Italic
In a command line, indicates a variable.
<Enter> Any individual key on the keyboard.
CTRL + Z A keyboard combination that involves pressing the Z key
Command-line text (CLI output) and file names
entry.
compulsory parameters separated by the | character. One option must be selected. For example: {stp|rstp|mstp} means that for the spanning-tree mode command, stp, rstp, or mstp must be entered.
while holding the CTRL key.
spanning-tree mode
56 Introduction

Additional Documentation

The following documents for the Dell EMC Networking N-Series switches are available at www.dell.com/support:
Getting Started Guide—
the series, including front and back panel features. It also describes the installation and initial configuration procedures.
CLI Reference Guide—
interface (CLI) commands used to configure and manage the switch. The document provides in-depth CLI descriptions, syntax, default values, and usage guidelines.
provides information about the switch models in
provides information about the command-line
Introduction 57
58 Introduction

Switch Feature Overview

This section describes the switch user-configurable software features.
NOTE: Before proceeding, read the release notes for this product. The release
notes are part of the firmware download.
The topics covered in this section include:
2
System Management Features
•Stacking Features
Security Features
Green Technology Features
Power over Ethernet (PoE) Plus Features
Switching Features
Virtual Local Area Network Supported Features
Spanning Tree Protocol Features
Link Aggregation Features
Routing Features
•IPv6 Routing Features
Quality of Service (QoS) Features
Layer-2 Multicast Features
Layer-3 Multicast Features
Switch Feature Overview 59

System Management Features

Multiple Management Options

Any of the following methods can be used to manage the switch:
Use a web browser to access the Administrator that serves HTML pages. support HTTP and HTTPS over IPv4 or IPv6.
Use a Telnet client, SSH client, or a direct console connection to access the CLI. The CLI common industry practice. Dell EMC Networking N-Series switches support Telnet and SSH access over IPv4 or IPv6.
Use a network management system (NMS), like the Dell EMC OpenManage Network Manager, to manage and monitor the system through SNMP. The switch supports transport protocol.
Nearly all switch features support a pre-configuration capability, even when the feature is not enabled or the required hardware is not present. Pre­configured capabilities become active only when enabled (typically via an admin mode control) or when the required hardware is present (or both). For example, a port can be pre-configured with both trunk and access mode information. The trunk mode information is applied only when the port is placed into trunk mode and the access mode information is only applied when the port is placed into access mode. Likewise, OSPF routing can be configured in the switch without being enabled on any port. This capability is present in all of the switch management options.
interface. The switch contains an embedded Web server
syntax and semantics conform as much as possible to
Dell EMC OpenManage Switch
Dell EMC Networking N-Series switches
SNMP v1/v2c/v3 over the UDP/IP

System Time Management

The switch can be configured to obtain the system time and date through a remote Simple Network Time Protocol (SNTP) server, or the time and date can be set locally on the switch. The time zone and information about time shifts that might occur during summer months can also be configured. When SNTP is used to obtain the time, communications between the switch and the SNTP server can be encrypted.
The Dell EMC Networking SNTP client supports connection to SNTP servers over IPv4 or IPv6.
60 Switch Feature Overview
For information about configuring system time settings, see "Managing General System Settings" on page 429.

Log Messages

The switch maintains in-memory log messages as well as persistent logs. Remote logging can be configured so that the switch sends log messages to a remote syslog server. The switch can also be configured to email log messages to a configured SMTP server. This allows the administrator to receive the log message in a specified e-mail account. Switch auditing messages, CLI command logging, Web logging, and SNMP logging can be enabled or disabled.
Dell EMC Networking N-Series switches support logging to syslog servers over IPv4 or IPv6.
For information about configuring system logging, see "Monitoring and Logging System Information" on page 393.

Integrated DHCP Server

NOTE: This feature is not supported on the Dell EMC Networking
N1100-ON/N1500 Series switches.
Dell EMC Networking N-Series switches include an integrated DHCP server that can deliver host-specific configuration information to hosts on the network. The switch DHCP server allows the configuration of IPv4 address pools (scopes), and when a host’s DHCP client requests an address, the switch DHCP server automatically assigns the host an address from the pool.
For information about configuring the DHCP server settings, see "DHCP Server Settings" on page 1141.

Management of Basic Network Information

The DHCP client on the switch allows the switch to acquire information such as the IPv4 or IPv6 address and default gateway from a network DHCP server. The DHCP client can also be disabled and static network information can be configured instead. Other configurable network information includes a Domain Name Server (DNS), hostname to IP address mapping, and a default domain name.
Switch Feature Overview 61
If the switch detects an IP address conflict on the management interface, it generates a trap and sends a log message.
For information about configuring basic network information, see "Setting the IP Address and Other Basic Network Information" on page 203.

IPv6 Management Features

Dell EMC Networking N-Series switches provide IPv6 support for many standard management features including HTTP, HTTPS/SSL, Telnet, SSH, syslog, SNTP, TFTP, and traceroute on both the in-band and out-of-band management ports.

Dual Software Images

Dell EMC Networking N-Series switches can store up to two software images. The dual image feature enables upgrading the switch without deleting the older software image. One image is designated as the active image and the other image as the backup image.
For information about managing the switch image, see "Images and File Management" on page 507.

File Management

Files, such as configuration files and system images, can be uploaded and downloaded using HTTP (web only), TFTP, Secure FTP (SFTP), or Secure Copy (SCP). Configuration file uploads from the switch to a server are a good way to back up the switch configuration. A configuration file can also be downloaded from a server to the switch to restore the switch to the configuration in the downloaded file.
Files can be copied to and from a USB Flash drive that is plugged into the USB port on the front panel of the switch. Or, the switch can be automatically upgraded by booting it with a newer firmware image on a USB drive plugged into the switch. Dell EMC Networking N-Series switches support file copy protocols to both IPv4 and IPv6 servers.
For information about uploading, downloading, and copying files, see "Images and File Management" on page 507.
62 Switch Feature Overview

Switch Database Management Templates

Switch Database Management (SDM) templates enable reallocating system resources to support a different mix of features based on network requirements. Dell EMC Networking N-Series switches support the following three templates:
Dual IPv4 and IPv6 (default)
•IPv4 Routing
IPv4 Data Center
For information about setting the SDM template, see "Managing General System Settings" on page 429.

Automatic Installation of Firmware and Configuration

The Auto Install feature allows the switch to upgrade or downgrade to a newer software image and update the configuration file automatically during device initialization with limited administrative configuration on the device. If a USB device is connected to the switch and contains a firmware image and/or configuration file, the Auto Install feature installs the image or configuration file from USB device. Otherwise, the switch can obtain the necessary information from a DHCP server on the network.
Switch Feature Overview 63
NOTE: Automatic migration of the startup configuration to the next version of
firmware from the current and previous versions of firmware is supported; the syntax is automatically updated when it is read into the running-config. Check the release notes to determine if any parts of the configuration cannot be migrated. Save the running-config to maintain the updated syntax. Migration of configuration is not assured on a firmware downgrade. When upgrading or downgrading firmware, check the configuration to ensure that it implements the desired configuration. Meta-configuration data (stack-port and slot configuration) is always reset to the defaults on a downgrade on each stack unit. As an example, Ethernet ports configured as stacking ports default back to Ethernet mode on a downgrade.
Migration of configuration information is never assured when errors are shown while the system is booting. Although the errored lines are displayed, commands that enter a sub-configuration mode followed by an exit command cause the CLI to exit Global Configuration mode, and subsequent configuration commands are ignored. Always hand-edit the startup-config if errors are shown on the screen during bootup.
For information about Auto Install, see "DHCP and USB Auto­Configuration" on page 539.

sFlow

sFlow is the standard for monitoring high-speed switched and routed networks. sFlow technology is built into network equipment and gives complete visibility into network activity, enabling effective management and control of network resources. The Dell EMC Networking N-Series switches support sFlow version 5.
For information about configuring managing sFlow settings, see "Monitoring Switch Traffic" on page 559.

SNMP Alarms and Trap Logs

The system logs events with severity codes and timestamps. The events are sent as SNMP traps to a trap recipient list.
For information about configuring SNMP traps and alarms, see "SNMP" on page 471.
64 Switch Feature Overview

CDP Interoperability Through ISDP

Industry Standard Discovery Protocol (ISDP) allows the Dell EMC Networking N-Series switch to interoperate with Cisco devices running the Cisco Discovery Protocol (CDP). ISDP is a proprietary layer-2 network protocol which inter-operates with Cisco network equipment and is used to share information between neighboring devices (routers, bridges, access servers, and switches).
For information about configuring ISDP settings, see "Discovering Network Devices" on page 875.

Remote Monitoring (RMON)

RMON is a standard Management Information Base (MIB) that defines current and historical MAC-layer statistics and control objects, allowing real­time information to be captured across the entire network.
For information about configuring managing RMON settings, see "Monitoring Switch Traffic" on page 559.

N3000 Series Access and Aggregation Firmware Images

There are two N3000 switch firmware images available. The Access Router image runs on both N3000 and N2000 switches. The image file is named N3000_N2000v This image supports all switch capabilities except for BGP. The number) in the image file name is enumerated starting with 1. N3000 series switches are loaded with the Access Router image in the factory.
The Aggregation Router image runs on N3000 model switches and is named N3000_BGPv starting with 31. The Aggregation Router image supports MP-BGP and all other switch features except for MLAG, MVR, Auto-VoIP, GARP, GVRP, GMRP, iSCSI, and DVLAN (QinQ).
Which image type is installed can be determined by examining the first few lines of the running-config. The following example shows an Aggregation Router (BGP-enabled) firmware.
A.B.C.D
A.B.C.D
.stk, where A, B, C, and D are the version numbers.
D
(build
.stk. The D (build number) in the name is enumerated
console#show running-config !Current Configuration: !System Description "Dell EMC Networking N3048, 6.3.0.31, Linux
3.6.5-ccbd1338"
Switch Feature Overview 65
!System Software Version 6.3.0.31 !Image File Name N3000_BGPv6.3.0.31.stk !Software Capability AGGREGATION ROUTER
When migrating between the two types of images, certain commands in the startup-config may fail to execute because the relevant feature is not available. The switch firmware will identify any failed commands. It is necessary to edit the startup-config if errors are displayed and remove any failed commands. Do not simply save the running-config when commands in the startup-config fail, as the startup-config may contain modal commands that enter into a sub-mode not supported by the firmware. The exit command to exit the sub-mode may, in fact, exit Global Configuration mode, causing all subsequent commands to fail, even though those commands may be valid.
66 Switch Feature Overview

Stacking Features

For information about creating and maintaining a stack of switches, see "Stacking" on page 231.

High Stack Count

The Dell EMC Networking N2000, N2100-ON, N3000, N3100-ON, and N4000 Series switches include a stacking feature that allows up to 12 switches to operate as a single unit. The Dell EMC Networking N1124-ON/N1148-ON switches stack up to four units using 10G Ethernet ports configured for stacking. The Dell EMC Networking N1500 Series switches stack up to four units using 10GB Ethernet links configured as stacking. Dell EMC Networking N2000, N2100-ON, and N3000 Series switches have two fixed mini-SAS stacking connectors at the rear.
Dell EMC Networking N1100-ON Series switches stack with other Dell EMC N1100-ON Series switches, and Dell EMC Networking N1500 Series switches stack with other Dell EMC N1500 Series switches.
Dell EMC Networking N2000 Series switches stack with other Dell EMC Networking N2000 Series switches, and Dell EMC Networking N2100-ON Series switches stack with other Dell EMC Networking N2100-ON Series switches.
Dell EMC Networking N3000 Series switches stack with other Dell EMC Networking N3000 Series switches, and Dell EMC Networking N3100-ON Series switches stack with other Dell EMC Networking N3100-ON Series switches. The Dell EMC Networking N3100-ON Series has a slot in the rear that accepts an optional stacking module.
Dell EMC Networking N4000 Series switches stack with other Dell EMC Networking N4000 Series switches over front-panel ports configured for stacking.

Single IP Management

When multiple switches are connected together through the stack ports, they operate as a single unit with a larger port count. The stack operates and is managed as a single entity. One switch acts as the master, and the entire stack is managed through the management interface (Web, CLI, or SNMP) of the stack master.
Switch Feature Overview 67

Master Failover with Transparent Transition

The stacking feature supports a stack master role if the stack master fails. As soon as a stack master failure is detected, the standby unit initializes the control plane and enables all other stack units with the current configuration. The standby unit maintains a synchronized copy of the running configuration for the stack.
standby
or backup unit that assumes the

Nonstop Forwarding on the Stack

The Nonstop Forwarding (NSF) feature allows the forwarding plane of stack units to continue to forward packets while the control and management planes restart as a result of a power failure, hardware failure, or software fault on the stack master and allows the standby switch to quickly takeover as the master.

Hot Add/Delete and Firmware Synchronization

Units can be added to and deleted from the stack without cycling the power on the stack. Units to be added to the stack must be powered off prior to cabling into the stack to avoid election of a new master unit and a possible downgrade of the stack. When the newly added unit is powered on, the Stack Firmware Synchronization feature, if enabled, automatically synchronizes the firmware version with the version running on the stack master. The synchronization operation may result in either an upgrade or a downgrade of firmware on the mismatched stack member. Once the firmware is synchronized on a member unit, the running-config on the member is updated to match the master switch. The startup-config on the standby and member switches is not updated to match the master switch due to configuration changes on the master switch. Saving the startup config on the master switch also saves it to the startup config on all the other stack members. The hardware configuration of every switch is updated to match the master switch (unit number, slot configuration, stack member number, etc.).
NOTE: ALWAYS POWER OFF a unit to be added to a stack prior to cabling it into
the stack. Newly added units must be powered on one-at-a-time beginning with the unit directly connected to an already powered on stack member.
68 Switch Feature Overview

Security Features

Configurable Access and Authentication Profiles

Rules can be configured to limit access to the switch management interface based on criteria such as access type and source IP address of the management host. The user can also be required to be authenticated locally or by an external server, such as a RADIUS server.
For information about configuring access and authentication profiles, see "Authentication, Authorization, and Accounting" on page 269.

Password-Protected Management Access

Access to the Web, CLI, and SNMP management interfaces is password protected, and there are no default users on the system.
For information about configuring local user accounts, see "Authentication, Authorization, and Accounting" on page 269.

Strong Password Enforcement

The Strong Password feature enforces a baseline password strength for all locally administered users. Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. The strength of a password is a function of length, complexity and randomness. Using strong passwords lowers overall risk of a security breach.
For information about configuring password settings, see "Authentication, Authorization, and Accounting" on page 269.

TACACS+ Client

The switch has a TACACS+ client. TACACS+ provides centralized security for validation of users accessing the switch. TACACS+ provides a centralized user management system while still retaining consistency with RADIUS and other authentication processes.
For information about configuring TACACS+ client settings, see "Authentication, Authorization, and Accounting" on page 269.
Switch Feature Overview 69

RADIUS Support

The switch has a Remote Authentication Dial In User Service (RADIUS) client and can support up to 32 named authentication and accounting RADIUS servers. The switch also supports RADIUS Attribute 4, which is the configuration of a NAS-IP address. The switch can also be configured to accept RADIUS-assigned VLANs.
For information about configuring RADIUS client settings, see "Authentication, Authorization, and Accounting" on page 269.

SSH/SSL

The switch supports Secure Shell (SSH) for secure, remote connections to the CLI and Secure Sockets Layer (SSL) to increase security when accessing the web-based management interface. The SSH server can be enabled using the ip ssh server command or disabled using the no ip ssh server command.
For information about configuring SSH and SSL settings, see "Authentication, Authorization, and Accounting" on page 269.

Inbound Telnet Control

By default, the switch allows access over Telnet. The administrator can enable or disable the Telnet server using the ip telnet server command. Additionally, the Telnet port number is configurable using the same command.
For information about configuring inbound Telnet settings, see "Authentication, Authorization, and Accounting" on page 269.

Denial of Service

The switch supports configurable Denial of Service (DoS) attack protection for eight different types of attacks.
For information about configuring DoS settings, see "Port and System Security" on page 667.
70 Switch Feature Overview

Port Protection

A port may be put into the error-disabled state for any of the following reasons:
BPDU Storm: By default, if Spanning Tree Protocol (STP) bridge protocol data units (BPDUs) are received at a rate of 15pps or greater for three consecutive seconds on a port, the port will be error-disabled. The threshold is not configurable.
Broadcast, Multicast, Unicast Storm: If broadcast, unknown multicast, or unknown unicast packets are received at a rate greater than the configured limit and the configured action is to disable the port, the port will be error­disabled. Storm control is not enabled by default. See the commands for further information. A trap is issued for ports disabled by Storm Control.
DHCP Rate Limit: If DHCP packets are received on a port at a rate that exceeds 15 pps, the port will be error-disabled. The threshold is configurable up to 300 pps for up to 15s long using the
limit
command. DHCP snooping is disabled by default. The default protection limit is 15 pps. A trap is issued for interfaces disabled by DHCP Snooping.
DoS: Interfaces on which a denial of service attack is detected are error­disabled. Refer to the
ARP Inspection: By default, if Dynamic ARP Inspection packets are received on a port at a rate that exceeds 15 pps for 1 second, the port will be error-disabled. The threshold is configurable up to 300 pps and the burst is configurable up to 15s long using the command. A trap is issued for interfaces disabled by Dynamic ARP Inspection.
SFP Mismatch: Insertion of an unsupported SFP transceiver will error­disable the interface. This behavior can be suppressed using the
unsupported-transceiver
SFP+ transceivers: SFP+ transceivers are not compatible with SFP slots (N3024F front-panel ports). To avoid damage to SFP+ transceivers mistakenly inserted into SFP ports, the SFP port is error-disabled when an SFP+ transceiver is detected.
UDLD: Interfaces on which unidirectional packet flow is detected are error-disabled.
dos-control
command.
command for configuration options.
ip arp inspection limit
storm-control
ip dhcp snooping
service
Switch Feature Overview 71
ICMP storms: Ports on which ICMP storms are detected are error­disabled. The rate limit and burst sizes are configurable separately for IPv4 and IPv6.
PML: Interfaces on which the port security violation is configured to shut down the interface are error-disabled when a violation occurs.
Loop Protect: Loop protection diagnostically disables ports on which a loop is detected. A log message may be issued when a port is disabled by Loop Protection.
BPDU Guard: An interface that receives a BPDU with BPDU guard enabled is error-disabled. Use the command to enable BPDU guard.
A port that is error-disabled may be returned to service using the no shutdown command. Alternatively, the operator may configure the auto recovery service to return the error disabled ports to service after a configurable period of time. Refer to the errdisable recovery command for more information.
spanning-tree bpdu-protection

Captive Portal

The Captive Portal feature blocks clients from accessing the network until user verification has been established. When a user attempts to connect to the network through the switch, the user is presented with a customized Web page that might contain username and password fields or the acceptable use policy. Users can be required to be authenticated by a local or remote RADIUS database before access is granted.
For information about configuring the Captive Portal features, see "Captive Portal" on page 354.

802.1X Authentication (IEEE 802.1X)

802.1X authentication enables the authentication of system users through a local internal server or an external server. Only authenticated and approved system users can transmit and receive frames over the port. Supplicants are authenticated using the Extensible Authentication Protocol (EAP). EAP­MD5 authentication with no privacy protocol is supported for switch­initiated (server-side) authentication to remote authentication servers. Local (IAS) authentication and MAB authentication support EAP-MD5 only. Encrypted communication with authentication servers is not supported;
72 Switch Feature Overview
however, the switch will transport encrypted packets, such as PEAP or EAP­TLS packets, between the supplicant and authentication server in support of mutual authentication and privacy.
For information about configuring IEEE 802.1X settings, see "IEEE 802.1X" on page 320.

MAC-Based 802.1X Authentication

MAC-based authentication allows multiple supplicants connected to the same port to each authenticate individually. For example, a system attached to the port might be required to authenticate in order to gain access to the network, while a VoIP phone might not need to authenticate in order to send voice traffic through the port.
For information about configuring MAC-based 802.1X authentication, see "IEEE 802.1X" on page 320.

802.1X Monitor Mode

Monitor mode can be enabled in conjunction with 802.1X authentication to allow network access even when the user fails to authenticate. The switch logs the results of the authentication process for diagnostic purposes. The main purpose of this mode is to help troubleshoot the configuration of a 802.1X authentication on the switch without affecting the network access to the users of the switch.
For information about enabling the 802.1X Monitor mode, see "IEEE 802.1X" on page 320.

MAC-Based Port Security

The port security feature limits access on a port to users with specific MAC addresses. These addresses are manually defined or learned on that port. When a frame is seen on a locked port, and the frame source MAC address is not tied to that port, the protection mechanism is invoked.
For information about configuring MAC-based port security, see "IEEE
802.1X" on page 320.
Switch Feature Overview 73

Access Control Lists (ACLs)

Access Control Lists (ACLs) can help to ensure network availability for legitimate users while blocking attempts to access the network by unauthorized users or to restrict legitimate users from accessing the network. ACLs may be used to provide traffic flow control, restrict contents of routing updates, decide which types of traffic are forwarded or blocked, and above all, provide some level of security for the network. The switch supports the following ACL types:
•IPv4 ACLs
•IPv6 ACLs
MAC ACLs
For all ACL types, the ACL rule can be configured to filter traffic when a packet enters or exits the Ethernet port, LAG, or VLAN interface. ACLs work only on switched ports. They do not operate on the out-of-band port.
ACLs can be used to implement policy-based routing (PBR) to implement packet routing according to specific organizational policies.
For information about configuring ACLs and PBR, see "Access Control Lists" on page 675.

Time-Based ACLs

With the Time-based ACL feature, the administrator can define when an ACL is in effect and the amount of time it is in effect.
For information about configuring time-based ACLs, see "Access Control Lists" on page 675.

IP Source Guard (IPSG)

IP source guard (IPSG) is a security feature that filters IP packets based on the source ID. The source ID may either be source IP address or a source IP address source MAC address pair as found in the local DHCP snooping database. IPSG depends on DHCP Snooping to associate IP address with MAC addresses.
For information about configuring IPSG, see "Snooping and Inspecting Traffic" on page 993.
74 Switch Feature Overview

DHCP Snooping

DHCP Snooping is a security feature that monitors DHCP messages between a DHCP client and DHCP server. It filters harmful DHCP messages and builds a bindings database of (MAC address, IP address, VLAN ID, port) tuples that are specified as authorized. DHCP snooping can be enabled globally and on specific VLANs. Ports within the VLAN can be configured to be trusted or untrusted. DHCP servers must be reached through trusted ports.
For information about configuring DHCP Snooping, see "Snooping and Inspecting Traffic" on page 993.

Dynamic ARP Inspection

Dynamic ARP Inspection (DAI) is a security feature that rejects invalid and malicious ARP packets. The feature prevents a class of man-in-the-middle attacks, where an unfriendly station intercepts traffic for other stations by poisoning the ARP caches of its unsuspecting neighbors. The malicious station sends ARP requests or responses mapping another station's IP address to its own MAC address.
Dynamic ARP Inspection relies on DHCP Snooping.
For information about configuring DAI, see "Snooping and Inspecting Traffic" on page 993.

Protected Ports (Private VLAN Edge)

Private VLAN Edge (PVE) ports are a layer-2 security feature that provides port-based security between ports that are members of the same VLAN. It is an extension of the common VLAN. Traffic from protected ports is sent only to the uplink ports and cannot be sent to other ports within the VLAN.
For information about configuring IPSG, see "Port-Based Traffic Control" on page 899.
Switch Feature Overview 75

Green Technology Features

For information about configuring Green Technology features, see "Port Characteristics" on page 635.

Energy Detect Mode

When the Energy Detect mode is enabled and the port link is down, the PHY automatically goes down for short period of time and then wakes up periodically to check link pulses. This mode reduces power consumption on the port when no link partner is present. Energy Detect is proprietary and operates independently from EEE.

Energy Efficient Ethernet

The switch supports the IEEE 802.3az Energy Efficient Ethernet (EEE) Lower Power Idle Mode, which enables both the send and receive sides of the link to disable some functionality for power savings when the link is lightly loaded. EEE is standardized and operates independently of Energy Detect.
EEE and Energy Detect are supported on the Dell EMC Networking, N1500, N1100-ON, N2000, N2100-ON, N3000, and N3100-ON Series 1G copper ports. EEE and energy detect are supported on the Dell EMC Networking N4000 Series 10G copper ports.
EEE and Energy Detect are enabled by default on the N-Series copper ports. Energy Detect is enabled by default on the Dell EMC Networking N4000 Series switches and cannot be disabled. Energy detect is enabled by default on the other Dell EMC Networking N-Series switches. EEE is enabled by default on the Dell EMC Networking N4000 Series 10G copper ports. Neither energy-detect nor EEE are supported on 2.5G or 5G ports.

Power Utilization Reporting

The switch displays the current power consumption of the power supply (or power supplies). This information is available from the management interface.
76 Switch Feature Overview

Power over Ethernet (PoE) Plus Features

NOTE: The Dell EMC Networking N1108P-ON/N1124P-ON/N1148P-ON,
N1524P/N1548P, N2024P/N2048P/N2128PX-ON and N3024P/N3048P/N3132PX-ON switches support PoE Plus. The N2128PX-ON/N3024P/N3048P/N3132PX-ON switches support PoE 60W on selected ports. The PoE feature does not apply to the other models in the Dell EMC Networking N1100-ON, N1500, N2000, N2100-ON, N3000, N3100-ON, and N4000 Series.
For information about configuring PoE Plus features, see "Managing General System Settings" on page 429.

Key PoE Plus Features for the Dell EMC Networking N1108P-ON, N1124P-ON, N1148P-ON, N2024P, N2048P, N2128PX-ON, N3024P, N3048P, and N3132PX-ON Switches

Table 2-1 describes some of the key PoE Plus features.
Table 2-1. PoE Plus Key Features
Feature Description
Global Usage Threshold
Per-Port Power Prioritization
Per-Port Power Limit Configurable power limit for each PoE-Plus port.
Provides the ability to specify a power limit as a percentage of the maximum power available to PoE ports. Setting a limit prevents the PoE switch from reaching an overload condition.
Provides the ability to assign a priority to each PoE port. When the power budget of the PoE switch has been exhausted, the higher-priority ports are given preference over the lower-priority ports. Lower priority ports are automatically stopped from supplying power in order to provide power to higher-priority ports.
Switch Feature Overview 77
Table 2-1. PoE Plus Key Features (Continued)
Feature Description
Power Management Modes
Power Detection Mode Sets the mode to 802.3at or 802.3at+legacy detection.
Supports three power-management modes:
• Static—Reserves a configurable amount of power for a PoE port.
• Dynamic—Power is not reserved for the port at any point of time. Power is supplied based upon the detected powered device (PD) signature.
• Class-based—Reserves a classed-based amount of power for a PoE port. The final power delivered is determined via LLDP-MED negotiation, which allows for refinement of the power limit.

Power Over Ethernet (PoE) Plus Configuration

The Dell EMC Networking N1108P-ON/N1124P-ON/N1148P-ON, N1524P/N1548P, N2024P/N2048P, N2128PX-ON, N3024P/N3048P, and N3132PX-ON switches support PoE Plus configuration for power threshold, power priority, SNMP traps, and PoE legacy device support. Power can be limited on a per-port basis.

PoE Plus Support

The Dell EMC Networking N1108P-ON/N1124P-ON/N1148P-ON, N1524P/N1548P, N2024P/N2048P, N2128PX-ON, N3024P/N3048P, and N3132PX-ON switches implement the PoE Plus specification (IEEE 802.1at), in addition to the IEEE 802.3AF specification. This allows power to be supplied to Class 4 PD devices that require power greater than 15.4 Watts. Each port is capable of delivering up to 34.2W of power. Real-time power supply status is also available on the switch as part of the PoE Plus implementation.
78 Switch Feature Overview

PoE 60W Support

The Dell EMC Networking N3024P/N3048P switches implement 4-pair PoE 60W on the first 12 1G ports. The N3132PX-ON switches implement PoE 60W on the copper 1G and 5G ports. The N2128PX-ON switches implement PoE 60W on the 2.5G ports. The N1108P-ON, N1124P-ON, 1148P-ON, N1524P, N1548P, N2024P, and N2048P switches do not support PoE 60W.
PoE 60W allows power to be supplied to Class 5 powered devices that require power up to 60 watts. PoE 60W power must be configured manually. Class­based and dynamic power allocation is not supported for PoE 60W.
Class D or better cabling is required for feeds in excess of 34.2 watts. Normally, CAT 5E cabling does meet this requirement.
PoE-capable switches that are connected to another PSE supplying power will stop supplying power on the affected ports. PSE capability should be disabled when connecting
Dell EMC
PoE enabled ports to other PSE equipment.

Powered Device Detection

The switch is capable, based upon configuration, of detecting legacy, AF, or AT devices in two-pair or four-pair modes. AT detection is initiated first, followed by AF detection, and if configured, legacy detection.

PoE Power Management Modes

PoE-capable switches can be configured to manage powered devices (PD) using a dynamic, static, or class-based management. The power management mode is configured using the power inline management command.
Static Power Management
In this mode, the power reserved for the port is the configured limit regardless of whether the port is powered or not. The device may draw up to the configured limit. This mode is useful for devices that do not support LLDP-MED.
Available Power = Power Limit of the Sources – Total Configured Power
The total configured power is calculated as the sum of the configured power allocation for each port. Static mode reserves maximum power for the port, for example, 32W for two-pair mode and 60W for four-pair mode, unless a lower limit is configured by the administrator. Power is not reserved until a
Switch Feature Overview 79
PD is connected to the port. The powered device may draw up to the configured limit. LLDP-MED packets requesting power are ignored in static mode. Do not configure the powered device to use LLDP-MED to request power in this mode.
Dynamic Power Management
In this mode, power is allocated based upon the detected PD class signature.
Available Power = Power Limit of the Sources – Total Allocated Power
The total allocated power is calculated as the sum of the power consumed by each port. Dynamic mode does not reserve power for the port (the port power limit is 0). Dynamic power management ignores LLDP-MED packets sent by the powered device. Do not configure the powered device to send LLDPMED packets in this mode. The powered device may draw up to the detected class plus 5%.
Class-Based Power Management
Class-based power management allocates power based on the class selected by the detected powered device signature and LLDP-MED. The detection method must be configured as dot3at+legacy for AF signature devices to be detected.
Available Power = Power Limit of the Sources – Total Class Configured Power
The total class configured power is calculated as the sum of the class-based power allocation for each port. Note that class-based power management mode allocates the class limit for the port. The powered device may draw up to the class maximum based upon the detected powered device signature. The powered device need not draw all of the requested power. The Consumed Power display from the show power inline command shows the actual reported power draw and does not take into account the class reserved power. Configure the powered device to send LLDP-MED packets in this mode. It may take up to 60 seconds to power up a device in class-based management mode because LLDP-MED packets need to be exchanged in order to configure the desired power.
80 Switch Feature Overview
Power is supplied to the device in class mode per the following table:
Class Usage AF Device (Watts) AT Device (Watts)
0 Default 16.4 33
1 Optional 16.4 33
2Optional 5 33
3Optional 8 33
4 Optional 16.4 33
In four-pair mode, twice the power listed in the table above is delivered. For information about the available system power, see the Hardware Overview chapter.

Power Management in Guard Band

The Dell EMC Networking N1100P-ON, N1500P, N2000P, N2100-ON, N3000P, and N3100-ON Series switches support a dynamic guard band, which means that the guard band used varies depending upon the following factors:
Power management mode
Class of the device being powered up.
Prior to a device being powered up, the switch calculates the following:
[(switch power capacity – guard band) – (current power consumption + computed power draw of the new device)]
If this value is less than zero (which means powering up the new PD device will put the total power draw into the guard band or above the switch power capacity), then the switch does not power up the new device.
The power management mode is configured using the power inline management command. The guard band for a Class 0 or Class 4 device may be configured with the power inline usage-threshold command. The user­defined power limit can be found with the show power inline detailed command. The power limit is used as a guard band when powering up a port.
If the remaining available power is less than the guard band, the device is not powered up. By default, the guard band is 32 watts.
Switch Feature Overview 81
Regardless of the power management mode, if the device being powered up is a Class 1, 2, or 3 AF device, then the guard band is configured according to the device class.
Dynamic or Static Power Management Mode Guard Band
In this mode, the guard band for the port being powered up is 32 watts.
Class-Based Power Management Mode Guard Band
In this mode, the dynamic guard band for the port being powered up is:
For Class 0 AF device: User defined power limit
For Class 1 AF device: 4 watts
For Class 2 AF device: 7 watts
For Class 3 AF device: 15.4 watts
For Class 4 AF device: If AF device, it is 15.4 watts. If the device is an AT device, the guard band is 32 watts regardless of class.

PoE Plus Default Settings

The following table shows the default PoE Plus settings for the Dell EMC Networking N1108P-ON/N1124P-ON/ N1148P-ON, N1524P/N1548P, N2024P/N2048P, N2128PX-ON, N3024P/N3048P, and N3132PX-ON switches.
Table 2-2. PoE Plus Key Features (Dell EMC Networking N1108P-ON/N1124P-ON/ N1148P-ON, N1524P/N1548P, N2024P/N2048P, N2128PX-ON, N3024P/N3048P, and N3132PX-ON Only)
Feature Description
Global Usage Threshold 90%
Per-Port Admin Status Auto
Per-Port Power Prioritization Enabled (globally, per-port priority is Low
Per-Port Power Limit None
Power Management Mode Dynamic
Power Detection Mode 802.3at plus legacy
Power Pairs alternative-a
82 Switch Feature Overview

Switching Features

Flow Control Support (IEEE 802.3x)

Flow control enables lower speed switches to communicate with higher speed switches by requesting that the higher speed switch refrain from sending packets for a limited period of time. Transmissions are temporarily halted to prevent buffer overflows.
For information about configuring flow control, see "Port-Based Traffic Control" on page 899.

Head of Line Blocking Prevention

Head of Line (HOL) blocking prevention prevents traffic delays and frame loss caused by traffic competing for the same egress port resources. HOL blocking queues packets, and the packets at the head of the queue are forwarded before packets at the end of the queue.

Alternate Store and Forward (ASF)

NOTE: This feature is available on the Dell EMC Networking N4000 Series
switches only.
The Alternate Store and Forward (ASF) feature reduces latency for large packets. When ASF is enabled, the memory management unit (MMU) can forward a packet to the egress port before it has been entirely received on the Cell Buffer Pool (CBP) memory.
AFS, which is also known as cut-through mode, is configurable through the command-line interface. For information about how to configure the AFS feature, see the
CLI Reference Guide
available at www.dell.com/support.

Jumbo Frames Support

Jumbo frames enable transporting data in fewer frames to ensure less overhead, lower processing time, and fewer interrupts.
For information about configuring the switch MTU, see "Port Characteristics" on page 635.
Switch Feature Overview 83

Auto-MDI/MDIX Support

The switch supports auto-detection between crossed and straight-through cables. Media-Dependent Interface (MDI) is the standard wiring for end stations, and the standard wiring for hubs and switches is known as Media­Dependent Interface with Crossover (MDIX). Auto-negotiation must be enabled for the switch to detect the wiring configuration. NBASE-T ports (2.5G and 5G) do not support auto-detection. Use the correct crossover or straight-through cable on 2.5/5G interfaces.

VLAN-Aware MAC-based Switching

Packets arriving from an unknown source address are sent to the CPU and added to the Hardware Table. Future packets addressed to or from this address are more efficiently forwarded.

Back Pressure Support

On half-duplex links, a receiver may prevent buffer overflows by jamming the link so that it is unavailable for additional traffic. On full-duplex links, a receiver may send a PAUSE frame indicating that the transmitter should cease transmission of frames for a specified period.
NOTE: Dell EMC Networking N2000/N2100-ON/N3000/N3100-ON/N4000 Series
switches do not support half-duplex operation.
When flow control is enabled, the Dell EMC Networking N-Series switches will observe received PAUSE frames or jamming signals, but will not issue them when congested.
84 Switch Feature Overview

Auto-negotiation

Auto-negotiation allows the switch to advertise modes of operation. The auto-negotiation function provides the means to exchange information between two switches that share a point-to-point link segment and to automatically configure both switches to take maximum advantage of their transmission capabilities.
Dell EMC Networking N-Series switches enhance auto-negotiation by providing configuration of port advertisement. Port advertisement allows the system administrator to configure the port speeds that are advertised.
For information about configuring auto-negotiation, see "Port Characteristics" on page 635.

Storm Control

When layer-2 frames are processed, broadcast, unknown unicast, and multicast frames are flooded to all ports on the relevant virtual local area network (VLAN). The flooding occupies bandwidth and loads all nodes connected on all ports. Storm control limits the amount of broadcast, unknown unicast, and multicast frames accepted and forwarded by the switch.
For information about configuring Broadcast Storm Control settings, see "Port-Based Traffic Control" on page 899.

Port Mirroring

Port mirroring mirrors network traffic by forwarding copies of incoming and outgoing packets from multiple source ports to a monitoring port. Source ports may be VLANs, Ethernet interfaces, port-channels, or the CPU port. The switch also supports flow-based mirroring, which allows copying certain types of traffic to a single destination port using an ACL. This provides flexibility—instead of mirroring all ingress or egress traffic on a port the switch can mirror a subset of that traffic. The switch can be configured to mirror flows based on certain kinds of layer-2, layer-3, and layer-4 information.
Destination (probe) ports must be connected to a passive monitoring device. Traffic sent from the probe into the switch probe port is dropped. Mirrored traffic sent to the probe device will contain control plane traffic such as spanning-tree, LLDP, DHCP, etc.
Switch Feature Overview 85
Dell EMC Networking N-Series switches support RSPAN destinations where traffic can be tunneled across the operational network. Mirrored traffic is flooded in the RSPAN VLAN from the source(s) to the destination(s) across any intermediate switches. This allows the administrator flexibility in connecting destination (probe) ports to the RSPAN. RSPAN does not support configuration of the CPU port as a source.
For information about configuring port mirroring, see "Monitoring Switch Traffic" on page 559.

Static and Dynamic MAC Address Tables

Static entries can be added to the switch’s MAC address table and the aging time can be configured for entries in the dynamic MAC address table. Entries can also be searched in the dynamic table based on several different criteria.
For information about viewing and managing the MAC address table, see "MAC Addressing and Forwarding" on page 1133.

Link Layer Discovery Protocol (LLDP)

The IEEE 802.1AB defined standard, Link Layer Discovery Protocol (LLDP), allows the switch to advertise major capabilities and physical descriptions. This information can be used to help identify system topology and detect bad configurations on the LAN.
For information about configuring LLDP, settings see "Discovering Network Devices" on page 875.

Link Layer Discovery Protocol (LLDP) for Media Endpoint Devices

The Link Layer Discovery Protocol for Media Endpoint Devices (LLDP­MED) provides an extension to the LLDP standard for network configuration and policy, device location, and Power over Ethernet.
For information about configuring LLDP-MED, settings see "Discovering Network Devices" on page 875.
86 Switch Feature Overview

Connectivity Fault Management (IEEE 802.1ag)

NOTE: This feature is available on the Dell EMC Networking N4000 Series
switches only.
The Connectivity Fault Management (CFM) feature, also known as Dot1ag, supports Service Level Operations, Administration, and Management (OAM). CFM is the OAM Protocol provision for end-to-end service layer instance in carrier networks. The CFM feature provides mechanisms to help perform connectivity checks, fault detection, fault verification and isolation, and fault notification per service in a network domain.
For information about configuring IEEE 802.1ag settings, see "Connectivity Fault Management" on page 973.

Priority-based Flow Control (PFC)

NOTE: This feature is available on the Dell EMC Networking N4000 Series
switches only.
The Priority-based Flow Control feature allows the switch to pause or inhibit transmission of individual priorities within a single Ethernet link. By configuring PFC to pause a congested priority (priorities) independently, protocols that are highly loss sensitive can share the same link with traffic that has different loss tolerances. Priorities are differentiated by the priority field of the 802.1Q VLAN header. The Dell EMC Networking N4000 Series switches support lossless transport of frames on up to two priority classes.
NOTE: An interface that is configured for PFC is automatically disabled for 802.3x
flow control.
For information about configuring the PFC feature, see "Data Center Bridging Features" on page 1101.
Switch Feature Overview 87

Data Center Bridging Exchange (DBCx) Protocol

NOTE: This feature is available on the Dell EMC Networking N4000 Series
switches only.
The Data Center Bridging Exchange Protocol (DCBx) is used by DCB devices to exchange configuration information with directly connected peers. The protocol is also used to detect misconfiguration of the peer DCB devices and, optionally, for configuration of peer DCB devices. For information about configuring DCBx settings, see "Data Center Bridging Features" on page 1101. DCBx is a link-local protocol and operates only on individual links.

Enhanced Transmission Selection

NOTE: This feature is available on the Dell EMC Networking N4000 Series
switches only.
Enhanced Transmission Selection (ETS) allows the switch to allocate bandwidth to traffic classes and share unused bandwidth with lower-priority traffic classes while coexisting with strict-priority traffic classes. ETS is supported on the Dell EMC Networking N4000 Series switches and can be configured manually or automatically using the auto configuration feature. For more information about ETS, see "Enhanced Transmission Selection" on page 1117.

Cisco Protocol Filtering

The Cisco Protocol Filtering feature (also known as Link Local Protocol Filtering) filters Cisco protocols that should not normally be relayed by a bridge. The group addresses of these Cisco protocols do not fall within the IEEE defined range of the 802.1D MAC Bridge Filtered MAC Group Addresses (01-80-C2-00-00-00 to 01-80-C2-00-00-0F).
For information about configuring LLPF, settings see "Port-Based Traffic Control" on page 899.
88 Switch Feature Overview

DHCP Layer-2 Relay

This feature permits layer-3 relay agent functionality in layer-2 switched networks. The switch supports layer-2 DHCP relay configuration on individual ports, link aggregation groups (LAGs) and VLANs.
For information about configuring layer-2 DHCP relay settings see "Layer-2 and Layer-3 Relay Features" on page 1207.
Switch Feature Overview 89

Virtual Local Area Network Supported Features

For information about configuring VLAN features see "VLANs" on page 747.

VLAN Support

VLANs are collections of switching ports that comprise a single broadcast domain. Packets are classified as belonging to a VLAN based on either the VLAN tag or a combination of the ingress port and packet contents. Packets sharing common attributes can be groups in the same VLAN. The Dell EMC Networking N-Series switches are in full compliance with IEEE 802.1Q VLAN tagging.

Port-Based VLANs

Port-based VLANs classify incoming packets to VLANs based on their ingress port. When a port uses 802.1X port authentication, packets can be assigned to a VLAN based on the result of the 802.1X authentication a client uses when it accesses the switch. This feature is useful for assigning traffic to Guest VLANs or Voice VLANs.

IP Subnet-based VLAN

This feature allows incoming untagged packets to be assigned to a VLAN and traffic class based on the source IP address of the packet.

MAC-based VLAN

This feature allows incoming untagged packets to be assigned to a VLAN and traffic class based on the source MAC address of the packet.

IEEE 802.1v Protocol-Based VLANs

VLAN classification rules are defined on data-link layer (layer-2) protocol identification. Protocol-based VLANs are used for isolating layer-2 traffic.

Voice VLAN

The Voice VLAN feature enables switch ports to carry voice traffic with a configured priority. The priority level enables the separation of voice and data traffic transiting the switch. Voice VLAN is the preferred solution for enterprises wishing to deploy VoIP services in their network.
90 Switch Feature Overview

GARP and GVRP Support

NOTE: GARP, GVRP, and GMRP are not available when running the
AGGREGATION ROUTER image.
The switch supports the Generic Attribute Registration Protocol (GARP). GARP VLAN Registration Protocol (GVRP) relies on the services provided by GARP to provide IEEE 802.1Q-compliant VLAN pruning and dynamic VLAN creation on 802.1Q trunk ports. When GVRP is enabled, the switch registers and propagates VLAN membership on all ports that are part of the active spanning tree protocol topology.
For information about configuring GARP timers see "Layer-2 Multicast Features" on page 917.

Guest VLAN

The Guest VLAN feature allows the administrator to provide service to unauthenticated users, i.e., users that are unable to support 802.1X authentication.
For information about configuring the Guest VLAN see "Guest VLAN" on page 325.

Unauthorized VLAN

The Unauthorized VLAN feature allows the administrator to configure a VLAN for 802.1X-aware hosts that attempt authentication and fail.

Double VLANs

NOTE: DVLAN is not available on the N3000 running the AGREGATION ROUTER
image.
The Double VLAN feature (IEEE 802.1QinQ) allows the use of a second tag on network traffic. The additional tag helps differentiate between customers in the Metropolitan Area Networks (MAN) while preserving individual customer’s VLAN identification when they enter their own 802.1Q domain.
Switch Feature Overview 91

Spanning Tree Protocol Features

For information about configuring Spanning Tree Protocol features, see "Spanning Tree Protocol" on page 825.

Spanning Tree Protocol (STP)

Spanning Tree Protocol (IEEE 802.1D) is a standard requirement of layer-2 switches that allows bridges to automatically prevent and resolve layer-2 forwarding loops.

Spanning Tree Port Settings

The STP feature supports a variety of per-port settings including path cost, priority settings, Port Fast mode, STP Root Guard, Loop Guard, TCN Guard, and Auto Edge. These settings are also configurable per-LAG.

Rapid Spanning Tree

Rapid Spanning Tree Protocol (RSTP) detects and uses network topologies to enable faster spanning tree convergence after a topology change, without creating forwarding loops. The port settings supported by STP are also supported by RSTP.

Multiple Spanning Tree

Multiple Spanning Tree (MSTP) operation maps VLANs to spanning tree instances. Packets assigned to various VLANs are transmitted along different paths within MSTP Regions (MST Regions). Regions are one or more interconnected MSTP bridges with identical MSTP settings. The MSTP standard lets administrators assign VLAN traffic to unique paths.
The switch supports IEEE 802.1Q-2005, which corrects problems associated with the previous version, provides for faster transition-to-forwarding, and incorporates new features for a port (restricted role and restricted TCN).
92 Switch Feature Overview

Bridge Protocol Data Unit (BPDU) Guard

Spanning Tree BPDU Guard is used to disable the port in case a new device tries to enter the already existing topology of STP. Thus devices, which were originally not a part of STP, are not allowed to influence the STP topology.

BPDU Filtering

When spanning tree is disabled on a port, the BPDU Filtering feature allows BPDU packets received on that port to be dropped. Additionally, the BPDU Filtering feature prevents a port in Port Fast mode from sending and receiving BPDUs. A port in Port Fast mode is automatically placed in the forwarding state when the link is up to increase convergence time.

RSTP-PV and STP-PV

Dell EMC Networking N-Series switches support both Rapid Spanning Tree Per VLAN (RSTP-PV) and Spanning Tree Per VLAN (STP-PV). RSTP-PV is the IEEE 802.1w (RSTP) standard implemented per VLAN. A single instance of rapid spanning tree (RSTP) runs on each configured VLAN. Each RSTP instance on a VLAN has a root switch. STP-PV is the IEEE 802.1s (STP) standard implemented per VLAN.
Switch Feature Overview 93

Link Aggregation Features

For information about configuring link aggregation (port-channel) features, see "Link Aggregation" on page 1029.

Link Aggregation

Up to eight ports can combine to form a single Link Aggregation Group (LAG). This enables fault tolerance protection from physical link disruption, higher bandwidth connections and improved bandwidth granularity. LAGs are formed from similarly configured physical links; i.e., the speed, duplex, auto-negotiation, PFC configuration, DCBX configuration, etc., must be compatible on all member links.
Per IEEE 802.1AX, only links with the identical operational characteristics, such as speed and duplex setting, may be aggregated. Dell EMC Networking N-Series switches aggregate links only if they have the same operational speed and duplex setting, as opposed to the configured speed and duplex setting. This allows operators to aggregate links that use auto-negotiation to set values for speed and duplex or to aggregate ports with SFP+ technology operating at a lower speed, e.g., 1G. Dissimilar ports will not become active in the LAG if their operational settings do not match those of the first member of the LAG.
In practice, some ports in a LAG may auto-negotiate a different operational speed than other ports depending on the far-end settings and any link impairments. Per the above, these ports will not become active members of the LAG. On a reboot or on flapping the LAG links, a lower-speed port may be the first port selected to be aggregated into the LAG. In this case, the higher-speed ports are not aggregated. Use the lacp port-priority command to select one or more primary links to lead the formation of the aggregation group.
While it is a requirement of a port-channel that the link members operate at the same duplex and speed settings, administrators should be aware that copper ports have larger latencies than fiber ports. If fiber and copper ports are aggregated together, packets sent over the fiber ports would arrive significantly sooner at the destination than packets sent over the copper ports. This can cause significant issues in the receiving host (e.g., a TCP receiver) as it would be required to buffer a potentially large number of out-
94 Switch Feature Overview
of-order frames. Devices unable to buffer the requisite number of frames will show excessive frame discard. Configuring copper and fiber ports together in an aggregation group is not recommended.

Link Aggregate Control Protocol (LACP)

Link Aggregate Control Protocol (LACP) uses peer exchanges across links to determine, on an ongoing basis, the aggregation capability of various links, and continuously provides the maximum level of aggregation capability achievable between a given pair of systems. LACP automatically determines, configures, binds, and monitors the binding of ports to aggregators within the system.

Multi-Switch LAG (MLAG)

NOTE: This feature is not available on Dell EMC Networking N1500 Series
switches. It is also not available on N3000 Series switches running the AGGREGATION ROUTER image.
Dell EMC Networking N-Series switches support the MLAG feature to extend the LAG bandwidth advantage across multiple Dell EMC Networking N-Series switches connected to a LAG partner device. The LAG partner device is unaware that it is connected to two peer Dell EMC Networking N-Series switches; instead, the two switches appear as a single switch to the partner. When using MLAG, all links can carry data traffic across a physically diverse topology and, in the case of a link or switch failure, traffic can continue to flow with minimal disruption.
Switch Feature Overview 95

Routing Features

NOTE: The N1100-ON Series switches do not support routing.

Address Resolution Protocol (ARP) Table Management

Static ARP entries can be created, and many settings for the dynamic ARP table can be managed, such as age time for entries, retries, and cache size. The ARP table supports routing by caching MAC addresses corresponding to the IP addresses of attached stations.
For information about managing the ARP table, see "IP Routing" on page 1165.

VLAN Routing

Dell EMC Networking N-Series switches support VLAN routing. A VLAN­routed packet is routed based on a longest prefix match lookup of the destination IP address in the routing table and is forwarded on a different VLAN by rewriting the destination MAC address obtained from the ARP table, decrementing the TTL, recalculating the frame CRC, and transmitting the frame on the VLAN.
For information about configuring VLAN routing interfaces, see "Routing Interfaces" on page 1191.

IP Configuration

The switch IP configuration settings allow the configuration of network information for VLAN routing interfaces, such as the IP address and subnet mask. Global IP configuration settings for the switch allow enabling or disabling the generation of several types of ICMP messages, setting a default gateway, and enabling or disabling inter-VLAN routing of packets.
For information about managing global IP settings, see "IP Routing" on page 1165.
96 Switch Feature Overview

Open Shortest Path First (OSPF)

NOTE: This feature is not available on Dell EMC Networking N1100-ON or N1500
Series switches.
Open Shortest Path First (OSPF) is a dynamic routing protocol commonly used within medium-to-large enterprise networks. OSPF is an interior gateway protocol (IGP) that operates within a single autonomous system.
For information about configuring OSPF, see "OSPF and OSPFv3" on page 1235.

Border Gateway Protocol (BGP)

NOTE: This feature is not available on Dell EMC Networking N1100-ON, N1500,
N2000, and N2100-ON Series switches. It is also not available on N3000 Series switches running the ACCESS ROUTER image.
BGP is a protocol used for exchanging reachability information between autonomous systems. BGP uses a standardized decision process, which, when used in conjunction with network policies configured by the administrator, support a robust set of capabilities for managing the distribution of routing information.
Dell EMC Networking supports BGP4 configured as an IGP or an EGP. As an IGP, configuration as a source or client route reflector is supported. Both IPv6 and IPv4 peering sessions are supported.
For more information about configuring BGP, see "BGP" on page 1375.

Virtual Routing and Forwarding (VRF)

NOTE: This feature is not available on Dell EMC Networking N1100-ON, N1500,
N2000, and N2100-ON switches.
VRF allows multiple independent instances of the forwarding plane to exist simultaneously. This allows segmenting the network without incurring the costs of multiple routers. Each VRF instance operates as an independent VPN. The IP addresses assigned to each VPN may overlap. Static route leaking to and from the global instance is supported. VLANs associated with a VRF may not overlap with other VRF instances.
For more information about configuring VRFs, see "VRF" on page 1327.
Switch Feature Overview 97

BOOTP/DHCP Relay Agent

The switch BootP/DHCP Relay Agent feature relays BootP and DHCP messages between DHCP clients and DHCP servers that are located in different IP subnets.
For information about configuring the BootP/DHCP Relay agent, see "Layer­2 and Layer-3 Relay Features" on page 1207.

IP Helper and DHCP Relay

The IP Helper and DHCP Relay features provide the ability to relay various protocols to servers on a different subnet.
For information about configuring the IP helper and DHCP relay features, see "Layer-2 and Layer-3 Relay Features" on page 1207.

Routing Information Protocol

Routing Information Protocol (RIP), like OSPF, is an IGP used within an autonomous Internet system. RIP is an IGP that is designed to work with moderate-size networks.
For information about configuring RIP, see "RIP" on page 1333.

Router Discovery

For each interface, the Router Discovery Protocol (RDP) can be configured to transmit router advertisements. These advertisements inform hosts on the local network about the presence of the router.
For information about configuring router discovery, see "IP Routing" on page 1165.

Routing Table

The routing table displays information about the routes that have been dynamically learned. Static and default routes and route preferences can be configured. A separate table shows the routes that have been manually configured.
For information about viewing the routing table, see "IP Routing" on page 1165.
98 Switch Feature Overview

Virtual Router Redundancy Protocol (VRRP)

VRRP provides hosts with redundant routers in the network topology without any need for the hosts to reconfigure or know that there are multiple routers. If the primary (master) router fails, a secondary router assumes control and continues to use the virtual router IP (VRIP) address.
VRRP Route Interface Tracking extends the capability of VRRP to allow tracking of specific route/interface IP states within the router that can alter the priority level of a virtual router for a VRRP group.
For information about configuring VRRP settings, see "VRRP" on page 1349.

Tunnel and Loopback Interfaces

NOTE: This feature is not available on Dell EMC Networking N1100-ON or N1500
Series switches.
Dell EMC Networking N-Series switches support the creation, deletion, and management of tunnel and loopback interfaces. Tunnel interfaces facilitate the transition of IPv4 networks to IPv6 networks. A loopback interface is always expected to be up, so a stable IP address can be configured to enable other network devices to contact or identify the switch.
For information about configuring tunnel and loopback interfaces, see "Routing Interfaces" on page 1191.
Switch Feature Overview 99

IPv6 Routing Features

NOTE: This feature is not available on Dell EMC Networking N1100-ON, N1500,
N2000, and N2100-ON Series switches.

IPv6 Configuration

The switch supports IPv6, the next generation of the Internet Protocol. IPv6 can be globally enabled on the switch and settings such as the IPv6 hop limit and ICMPv6 rate limit error interval can be configured. The administrator can also control whether IPv6 is enabled on a specific interface. The switch supports the configuration of many per-interface IPv6 settings including the IPv6 prefix and prefix length.
For information about configuring general IPv6 routing settings, see "IPv6 Routing" on page 1451.

IPv6 Routes

Because IPv4 and IPv6 can coexist on a network, the router on such a network needs to forward both traffic types. Given this coexistence, each switch maintains a separate routing table for IPv6 routes. The switch can forward IPv4 and IPv6 traffic over the same set of interfaces.
For information about configuring IPv6 routes, see "IPv6 Routing" on page 1451.

OSPFv3

OSPFv3 provides a routing protocol for IPv6 networking. OSPFv3 is a new routing component based on the OSPF version 2 component. In dual-stack IPv6, both OSPF and OSPFv3 components can be configured and used.
For information about configuring OSPFv3, see "OSPF and OSPFv3" on page 1235.

DHCPv6

DHCPv6 incorporates the notion of the “stateless” server, where DHCPv6 is not used for IP address assignment to a client, rather it only provides other networking information such as DNS, Network Time Protocol (NTP), and/or Session Initiation Protocol (SIP) information.
100 Switch Feature Overview
Loading...