Dell Networking S3100 User Manual

Dell Configuration Guide for the S3100 Series

9.11(2.1)

Notes, cautions, and warnings

NOTE: A NOTE indicates important information that helps you make better use of your product.

CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.

2017 - 06

Rev. A00

Dell Networking S3100 User Manual

Contents

1 About this Guide...........................................................................................................................................

33

Audience............................................................................................................................................................................

33

Conventions......................................................................................................................................................................

33

Related Documents.........................................................................................................................................................

33

2 Configuration Fundamentals........................................................................................................................

34

Accessing the Command Line........................................................................................................................................

34

CLI Modes.........................................................................................................................................................................

34

Navigating CLI Modes...............................................................................................................................................

36

The do Command............................................................................................................................................................

39

Undoing Commands........................................................................................................................................................

39

Obtaining Help..................................................................................................................................................................

40

Entering and Editing Commands...................................................................................................................................

40

Command History.............................................................................................................................................................

41

Filtering show Command Outputs..................................................................................................................................

41

Example of the grep Keyword...................................................................................................................................

41

Multiple Users in Configuration Mode...........................................................................................................................

42

3 Getting Started............................................................................................................................................

44

Console Access................................................................................................................................................................

45

Serial Console.............................................................................................................................................................

45

Accessing the CLI Interface and Running Scripts Using SSH....................................................................................

46

Entering CLI commands Using an SSH Connection..............................................................................................

46

Executing Local CLI Scripts Using an SSH Connection........................................................................................

46

Default Configuration.......................................................................................................................................................

47

Configuring a Host Name................................................................................................................................................

47

Accessing the System Remotely....................................................................................................................................

47

Accessing the System Remotely..............................................................................................................................

47

Configure the Management Port IP Address.........................................................................................................

48

Configure a Management Route..............................................................................................................................

48

Configuring a Username and Password..................................................................................................................

48

Configuring the Enable Password..................................................................................................................................

49

Configuration File Management.....................................................................................................................................

49

Copy Files to and from the System.........................................................................................................................

49

Mounting an NFS File System..................................................................................................................................

50

Save the Running-Configuration..............................................................................................................................

52

Configure the Overload Bit for a Startup Scenario...............................................................................................

52

Viewing Files...............................................................................................................................................................

52

Compressing Configuration Files.............................................................................................................................

53

Managing the File System..............................................................................................................................................

56

Enabling Software Features on Devices Using a Command Option.........................................................................

56

View Command History...................................................................................................................................................

57

Contents 3

Upgrading Dell Networking OS.......................................................................................................................................

57

Verify Software Images Before Installation...................................................................................................................

57

Using HTTP for File Transfers........................................................................................................................................

58

4 Management...............................................................................................................................................

60

Configuring Privilege Levels...........................................................................................................................................

60

Creating a Custom Privilege Level...........................................................................................................................

60

Removing a Command from EXEC Mode...............................................................................................................

61

Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................

61

Allowing Access to CONFIGURATION Mode Commands.....................................................................................

61

Allowing Access to Different Modes........................................................................................................................

61

Applying a Privilege Level to a Username...............................................................................................................

63

Applying a Privilege Level to a Terminal Line..........................................................................................................

63

Configuring Logging........................................................................................................................................................

63

Audit and Security Logs............................................................................................................................................

64

Configuring Logging Format ...................................................................................................................................

65

Display the Logging Buffer and the Logging Configuration..................................................................................

66

Setting Up a Secure Connection to a Syslog Server.............................................................................................

66

Sending System Messages to a Syslog Server......................................................................................................

68

Track Login Activity.........................................................................................................................................................

68

Restrictions for Tracking Login Activity...................................................................................................................

68

Configuring Login Activity Tracking.........................................................................................................................

68

Display Login Statistics..............................................................................................................................................

69

Limit Concurrent Login Sessions....................................................................................................................................

70

Restrictions for Limiting the Number of Concurrent Sessions.............................................................................

70

Configuring Concurrent Session Limit.....................................................................................................................

70

Enabling the System to Clear Existing Sessions.....................................................................................................

71

Enabling Secured CLI Mode............................................................................................................................................

72

Log Messages in the Internal Buffer..............................................................................................................................

72

Configuration Task List for System Log Management..........................................................................................

72

Disabling System Logging...............................................................................................................................................

72

Sending System Messages to a Syslog Server............................................................................................................

73

Configuring a UNIX System as a Syslog Server.....................................................................................................

73

Changing System Logging Settings...............................................................................................................................

73

Display the Logging Buffer and the Logging Configuration........................................................................................

74

Configuring a UNIX Logging Facility Level....................................................................................................................

74

Synchronizing Log Messages.........................................................................................................................................

75

Enabling Timestamp on Syslog Messages....................................................................................................................

76

File Transfer Services.......................................................................................................................................................

76

Configuration Task List for File Transfer Services..................................................................................................

77

Enabling the FTP Server...........................................................................................................................................

77

Configuring FTP Server Parameters........................................................................................................................

77

Configuring FTP Client Parameters.........................................................................................................................

78

Terminal Lines...................................................................................................................................................................

78

Denying and Permitting Access to a Terminal Line................................................................................................

78

Configuring Login Authentication for Terminal Lines.............................................................................................

79

4 Contents

Setting Timeout for EXEC Privilege Mode...................................................................................................................

80

Using Telnet to get to Another Network Device...........................................................................................................

81

Lock CONFIGURATION Mode........................................................................................................................................

81

Viewing the Configuration Lock Status...................................................................................................................

81

5 802.1X..........................................................................................................................................................

83

Port-Authentication Process..........................................................................................................................................

85

EAP over RADIUS......................................................................................................................................................

85

Configuring 802.1X...........................................................................................................................................................

86

Related Configuration Tasks.....................................................................................................................................

86

Important Points to Remember......................................................................................................................................

86

Enabling 802.1X.................................................................................................................................................................

87

Configuring dot1x Profile ................................................................................................................................................

88

Configuring MAC addresses for a do1x Profile.............................................................................................................

89

Configuring the Static MAB and MAB Profile .............................................................................................................

89

Configuring Critical VLAN ..............................................................................................................................................

90

Configuring Request Identity Re-Transmissions............................................................................................................

91

Configuring a Quiet Period after a Failed Authentication......................................................................................

91

Forcibly Authorizing or Unauthorizing a Port...............................................................................................................

92

Re-Authenticating a Port................................................................................................................................................

93

Configuring Timeouts......................................................................................................................................................

94

Configuring Dynamic VLAN Assignment with Port Authentication..........................................................................

95

Guest and Authentication-Fail VLANs..........................................................................................................................

96

Configuring a Guest VLAN.......................................................................................................................................

96

Configuring an Authentication-Fail VLAN...............................................................................................................

96

6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)....................................

98

Optimizing CAM Utilization During the Attachment of ACLs to VLANs...................................................................

98

Guidelines for Configuring ACL VLAN Groups.............................................................................................................

99

Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters................................................

99

Configuring ACL VLAN Groups................................................................................................................................

99

Configuring FP Blocks for VLAN Parameters.......................................................................................................

100

Viewing CAM Usage.......................................................................................................................................................

101

Allocating FP Blocks for VLAN Processes..................................................................................................................

102

7 Access Control Lists (ACLs).......................................................................................................................

104

IP Access Control Lists (ACLs).....................................................................................................................................

105

CAM Usage...............................................................................................................................................................

106

Implementing ACLs on Dell Networking OS..........................................................................................................

106

Important Points to Remember....................................................................................................................................

108

Configuration Task List for Route Maps................................................................................................................

108

Configuring Match Routes.......................................................................................................................................

110

Configuring Set Conditions.......................................................................................................................................

111

Configure a Route Map for Route Redistribution..................................................................................................

112

Configure a Route Map for Route Tagging............................................................................................................

113

Continue Clause........................................................................................................................................................

113

Contents 5

IP Fragment Handling.....................................................................................................................................................

114

IP Fragments ACL Examples....................................................................................................................................

114

Layer 4 ACL Rules Examples...................................................................................................................................

114

Configure a Standard IP ACL.........................................................................................................................................

115

Configuring a Standard IP ACL Filter......................................................................................................................

116

Configure an Extended IP ACL......................................................................................................................................

117

Configuring Filters with a Sequence Number........................................................................................................

117

Configuring Filters Without a Sequence Number.................................................................................................

118

Configure Layer 2 and Layer 3 ACLs............................................................................................................................

119

Assign an IP ACL to an Interface..................................................................................................................................

120

Applying an IP ACL.........................................................................................................................................................

120

Counting ACL Hits.....................................................................................................................................................

121

Configure Ingress ACLs..................................................................................................................................................

121

Configure Egress ACLs...................................................................................................................................................

121

Applying Egress Layer 3 ACLs (Control-Plane)....................................................................................................

122

IP Prefix Lists..................................................................................................................................................................

123

Implementation Information....................................................................................................................................

123

Configuration Task List for Prefix Lists..................................................................................................................

123

ACL Resequencing.........................................................................................................................................................

127

Resequencing an ACL or Prefix List.......................................................................................................................

127

Route Maps.....................................................................................................................................................................

129

Implementation Information....................................................................................................................................

129

Logging of ACL Processes............................................................................................................................................

129

Guidelines for Configuring ACL Logging................................................................................................................

130

Configuring ACL Logging........................................................................................................................................

130

Flow-Based Monitoring Support for ACLs...................................................................................................................

131

Behavior of Flow-Based Monitoring.......................................................................................................................

131

Enabling Flow-Based Monitoring............................................................................................................................

132

8 Bidirectional Forwarding Detection (BFD)..................................................................................................

134

How BFD Works.............................................................................................................................................................

134

BFD Packet Format..................................................................................................................................................

135

BFD Sessions............................................................................................................................................................

136

BFD Three-Way Handshake....................................................................................................................................

137

Session State Changes............................................................................................................................................

139

Important Points to Remember....................................................................................................................................

139

Configure BFD................................................................................................................................................................

139

Configure BFD for Physical Ports...........................................................................................................................

140

Configure BFD for Static Routes.............................................................................................................................

141

Configure BFD for OSPF.........................................................................................................................................

144

Configure BFD for OSPFv3.....................................................................................................................................

148

Configure BFD for IS-IS............................................................................................................................................

151

Configure BFD for BGP...........................................................................................................................................

153

Configure BFD for VRRP.........................................................................................................................................

160

Configuring Protocol Liveness................................................................................................................................

163

Troubleshooting BFD................................................................................................................................................

163

6 Contents

9 Border Gateway Protocol IPv4 (BGPv4)....................................................................................................

165

Autonomous Systems (AS)...........................................................................................................................................

165

Sessions and Peers.........................................................................................................................................................

167

Establish a Session...................................................................................................................................................

167

Route Reflectors.............................................................................................................................................................

168

BGP Attributes................................................................................................................................................................

169

Best Path Selection Criteria....................................................................................................................................

169

Weight.........................................................................................................................................................................

171

Local Preference........................................................................................................................................................

171

Multi-Exit Discriminators (MEDs)...........................................................................................................................

172

Origin..........................................................................................................................................................................

173

AS Path......................................................................................................................................................................

174

Next Hop....................................................................................................................................................................

174

Multiprotocol BGP..........................................................................................................................................................

174

Implement BGP with Dell Networking OS...................................................................................................................

175

Additional Path (Add-Path) Support......................................................................................................................

175

Advertise IGP Cost as MED for Redistributed Routes........................................................................................

175

Ignore Router-ID in Best-Path Calculation............................................................................................................

176

Four-Byte AS Numbers............................................................................................................................................

176

AS4 Number Representation..................................................................................................................................

176

AS Number Migration...............................................................................................................................................

178

BGP4 Management Information Base (MIB)........................................................................................................

179

Important Points to Remember..............................................................................................................................

179

Configuration Information..............................................................................................................................................

180

BGP Configuration.........................................................................................................................................................

180

Enabling BGP.............................................................................................................................................................

181

Configuring AS4 Number Representations...........................................................................................................

184

Configuring Peer Groups.........................................................................................................................................

186

Configuring BGP Fast Fall-Over.............................................................................................................................

188

Configuring Passive Peering...................................................................................................................................

190

Maintaining Existing AS Numbers During an AS Migration.................................................................................

190

Allowing an AS Number to Appear in its Own AS Path........................................................................................

191

Enabling Graceful Restart........................................................................................................................................

192

Enabling Neighbor Graceful Restart.......................................................................................................................

193

Filtering on an AS-Path Attribute...........................................................................................................................

193

Regular Expressions as Filters.................................................................................................................................

195

Redistributing Routes..............................................................................................................................................

196

Enabling Additional Paths........................................................................................................................................

197

Configuring IP Community Lists.............................................................................................................................

197

Configuring an IP Extended Community List........................................................................................................

198

Filtering Routes with Community Lists..................................................................................................................

199

Manipulating the COMMUNITY Attribute............................................................................................................

200

Changing MED Attributes.......................................................................................................................................

201

Changing the LOCAL_PREFERENCE Attribute..................................................................................................

201

Configuring the local System or a Different System to be the Next Hop for BGP-Learned Routes............

202

Contents 7

Changing the WEIGHT Attribute...........................................................................................................................

203

Enabling Multipath...................................................................................................................................................

203

Filtering BGP Routes...............................................................................................................................................

203

Filtering BGP Routes Using Route Maps..............................................................................................................

205

Filtering BGP Routes Using AS-PATH Information.............................................................................................

205

Configuring BGP Route Reflectors.......................................................................................................................

206

Aggregating Routes.................................................................................................................................................

207

Configuring BGP Confederations...........................................................................................................................

207

Enabling Route Flap Dampening............................................................................................................................

208

Changing BGP Timers.............................................................................................................................................

210

Enabling BGP Neighbor Soft-Reconfiguration.....................................................................................................

210

Enabling or disabling BGP neighbors......................................................................................................................

211

Route Map Continue................................................................................................................................................

213

Enabling MBGP Configurations....................................................................................................................................

213

Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor..........................................

214

BGP Regular Expression Optimization.........................................................................................................................

214

Debugging BGP..............................................................................................................................................................

214

Storing Last and Bad PDUs.....................................................................................................................................

215

Capturing PDUs........................................................................................................................................................

216

PDU Counters...........................................................................................................................................................

217

Sample Configurations...................................................................................................................................................

217

10 Content Addressable Memory (CAM).......................................................................................................

224

CAM Allocation...............................................................................................................................................................

224

Test CAM Usage............................................................................................................................................................

226

View CAM-ACL Settings..............................................................................................................................................

226

View CAM Usage...........................................................................................................................................................

228

CAM Optimization.........................................................................................................................................................

228

Troubleshoot CAM Profiling..........................................................................................................................................

228

CAM Profile Mismatches........................................................................................................................................

228

QoS CAM Region Limitation...................................................................................................................................

229

11 Control Plane Policing (CoPP)..................................................................................................................

230

Configure Control Plane Policing..................................................................................................................................

231

Configuring CoPP for Protocols............................................................................................................................

232

Configuring CoPP for CPU Queues......................................................................................................................

234

CoPP for OSPFv3 Packets.....................................................................................................................................

235

Configuring CoPP for OSPFv3..............................................................................................................................

238

Displaying CoPP Configuration .............................................................................................................................

238

12 Dynamic Host Configuration Protocol (DHCP)..........................................................................................

241

DHCP Packet Format and Options..............................................................................................................................

241

Assign an IP Address using DHCP...............................................................................................................................

243

Implementation Information..........................................................................................................................................

244

Configure the System to be a DHCP Server..............................................................................................................

244

Configuring the Server for Automatic Address Allocation..................................................................................

245

8 Contents

Specifying a Default Gateway................................................................................................................................

246

Configure a Method of Hostname Resolution......................................................................................................

246

Using DNS for Address Resolution........................................................................................................................

246

Using NetBIOS WINS for Address Resolution......................................................................................................

247

Creating Manual Binding Entries............................................................................................................................

247

Debugging the DHCP Server.................................................................................................................................

247

Using DHCP Clear Commands...............................................................................................................................

248

Configure the System to be a Relay Agent................................................................................................................

248

Configure the System to be a DHCP Client...............................................................................................................

250

Configuring the DHCP Client System...................................................................................................................

250

DHCP Client on a Management Interface.............................................................................................................

251

DHCP Client Operation with Other Features.......................................................................................................

252

Configure the System for User Port Stacking (Option 230)....................................................................................

253

Configure Secure DHCP...............................................................................................................................................

253

Option 82..................................................................................................................................................................

253

DHCP Snooping.......................................................................................................................................................

254

Drop DHCP Packets on Snooped VLANs Only....................................................................................................

257

Dynamic ARP Inspection........................................................................................................................................

258

Configuring Dynamic ARP Inspection...................................................................................................................

259

Source Address Validation............................................................................................................................................

260

Enabling IP Source Address Validation..................................................................................................................

260

DHCP MAC Source Address Validation.................................................................................................................

261

Enabling IP+MAC Source Address Validation.......................................................................................................

261

Viewing the Number of SAV Dropped Packets....................................................................................................

262

Clearing the Number of SAV Dropped Packets...................................................................................................

262

13 Equal Cost Multi-Path (ECMP)................................................................................................................

263

ECMP for Flow-Based Affinity.....................................................................................................................................

263

Configuring the Hash Algorithm............................................................................................................................

263

Enabling Deterministic ECMP Next Hop..............................................................................................................

263

Configuring the Hash Algorithm Seed..................................................................................................................

264

Link Bundle Monitoring.................................................................................................................................................

264

Managing ECMP Group Paths...............................................................................................................................

265

Creating an ECMP Group Bundle..........................................................................................................................

265

Modifying the ECMP Group Threshold................................................................................................................

265

14 FIPS Cryptography...................................................................................................................................

267

Configuration Tasks.......................................................................................................................................................

267

Preparing the System....................................................................................................................................................

267

Enabling FIPS Mode......................................................................................................................................................

268

Generating Host-Keys...................................................................................................................................................

268

Monitoring FIPS Mode Status......................................................................................................................................

268

Disabling FIPS Mode.....................................................................................................................................................

269

15 Force10 Resilient Ring Protocol (FRRP)...................................................................................................

270

Protocol Overview.........................................................................................................................................................

270

Contents 9

Ring Status................................................................................................................................................................

271

Multiple FRRP Rings................................................................................................................................................

271

Important FRRP Points...........................................................................................................................................

272

Important FRRP Concepts.....................................................................................................................................

273

Implementing FRRP.......................................................................................................................................................

274

FRRP Configuration.......................................................................................................................................................

274

Creating the FRRP Group.......................................................................................................................................

274

Configuring the Control VLAN...............................................................................................................................

275

Configuring and Adding the Member VLANs.......................................................................................................

276

Setting the FRRP Timers........................................................................................................................................

277

Clearing the FRRP Counters..................................................................................................................................

277

Viewing the FRRP Configuration...........................................................................................................................

277

Viewing the FRRP Information...............................................................................................................................

277

Troubleshooting FRRP...................................................................................................................................................

278

Configuration Checks..............................................................................................................................................

278

Sample Configuration and Topology............................................................................................................................

278

16 GARP VLAN Registration Protocol (GVRP)..............................................................................................

280

Important Points to Remember...................................................................................................................................

280

Configure GVRP.............................................................................................................................................................

281

Related Configuration Tasks....................................................................................................................................

281

Enabling GVRP Globally................................................................................................................................................

282

Enabling GVRP on a Layer 2 Interface........................................................................................................................

282

Configure GVRP Registration.......................................................................................................................................

282

Configure a GARP Timer..............................................................................................................................................

283

RPM Redundancy..........................................................................................................................................................

283

17 High Availability (HA)...............................................................................................................................

285

Component Redundancy..............................................................................................................................................

285

Automatic and Manual Stack Unit Failover..........................................................................................................

285

Synchronization between Management and Standby Units..............................................................................

286

Forcing a Stack Unit Failover.................................................................................................................................

286

Disabling Auto-Reboot.............................................................................................................................................

287

Manually Synchronizing Management and Standby Units..................................................................................

287

Pre-Configuring a Stack Unit Slot................................................................................................................................

287

Removing a Provisioned Logical Stack Unit...............................................................................................................

288

Hitless Behavior.............................................................................................................................................................

288

Graceful Restart.............................................................................................................................................................

288

Software Resiliency.......................................................................................................................................................

289

Software Component Health Monitoring.............................................................................................................

289

System Health Monitoring......................................................................................................................................

289

Failure and Event Logging.......................................................................................................................................

289

Hot-Lock Behavior.........................................................................................................................................................

290

18 Internet Group Management Protocol (IGMP)..........................................................................................

291

IGMP Implementation Information...............................................................................................................................

291

10 Contents

IGMP Protocol Overview...............................................................................................................................................

291

IGMP Version 2.........................................................................................................................................................

291

IGMP Version 3........................................................................................................................................................

293

Configure IGMP.............................................................................................................................................................

296

Related Configuration Tasks...................................................................................................................................

296

Viewing IGMP Enabled Interfaces...............................................................................................................................

297

Selecting an IGMP Version...........................................................................................................................................

297

Viewing IGMP Groups...................................................................................................................................................

297

Adjusting Timers............................................................................................................................................................

298

Adjusting Query and Response Timers.................................................................................................................

298

Preventing a Host from Joining a Group....................................................................................................................

299

Enabling IGMP Immediate-Leave.................................................................................................................................

302

IGMP Snooping..............................................................................................................................................................

302

IGMP Snooping Implementation Information.......................................................................................................

302

Configuring IGMP Snooping...................................................................................................................................

302

Removing a Group-Port Association.....................................................................................................................

303

Disabling Multicast Flooding...................................................................................................................................

303

Specifying a Port as Connected to a Multicast Router......................................................................................

304

Configuring the Switch as Querier........................................................................................................................

304

Fast Convergence after MSTP Topology Changes...................................................................................................

305

Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................

305

Protocol Separation.................................................................................................................................................

305

Enabling and Disabling Management Egress Interface Selection......................................................................

306

Handling of Management Route Configuration...................................................................................................

307

Handling of Switch-Initiated Traffic.......................................................................................................................

308

Handling of Switch-Destined Traffic......................................................................................................................

308

Handling of Transit Traffic (Traffic Separation)....................................................................................................

309

Mapping of Management Applications and Traffic Type.....................................................................................

309

Behavior of Various Applications for Switch-Initiated Traffic .............................................................................

310

Behavior of Various Applications for Switch-Destined Traffic ............................................................................

311

Interworking of EIS With Various Applications......................................................................................................

312

Designating a Multicast Router Interface....................................................................................................................

312

19 Interfaces..................................................................................................................................................

314

Basic Interface Configuration........................................................................................................................................

314

Advanced Interface Configuration................................................................................................................................

314

Interface Types...............................................................................................................................................................

315

Optional Modules............................................................................................................................................................

315

View Basic Interface Information..................................................................................................................................

316

Resetting an Interface to its Factory Default State....................................................................................................

317

Enabling Energy Efficient Ethernet..............................................................................................................................

318

View EEE Information....................................................................................................................................................

318

Clear EEE Counters.......................................................................................................................................................

322

Enabling a Physical Interface........................................................................................................................................

323

Physical Interfaces.........................................................................................................................................................

323

Configuration Task List for Physical Interfaces....................................................................................................

324

Contents 11

Overview of Layer Modes.......................................................................................................................................

324

Configuring Layer 2 (Data Link) Mode..................................................................................................................

324

Configuring Layer 2 (Interface) Mode..................................................................................................................

325

Configuring Layer 3 (Network) Mode...................................................................................................................

325

Configuring Layer 3 (Interface) Mode..................................................................................................................

326

Egress Interface Selection (EIS)..................................................................................................................................

326

Important Points to Remember.............................................................................................................................

326

Configuring EIS.........................................................................................................................................................

327

Management Interfaces................................................................................................................................................

327

Configuring Management Interfaces.....................................................................................................................

327

Configuring a Management Interface on an Ethernet Port................................................................................

329

VLAN Interfaces............................................................................................................................................................

329

Loopback Interfaces......................................................................................................................................................

330

Null Interfaces................................................................................................................................................................

330

Port Channel Interfaces................................................................................................................................................

330

Port Channel Definition and Standards..................................................................................................................

331

Port Channel Benefits..............................................................................................................................................

331

Port Channel Implementation.................................................................................................................................

331

Interfaces in Port Channels....................................................................................................................................

332

Configuration Tasks for Port Channel Interfaces.................................................................................................

332

Creating a Port Channel..........................................................................................................................................

332

Adding a Physical Interface to a Port Channel.....................................................................................................

333

Reassigning an Interface to a New Port Channel................................................................................................

334

Configuring the Minimum Oper Up Links in a Port Channel..............................................................................

335

Adding or Removing a Port Channel from a VLAN.............................................................................................

335

Assigning an IP Address to a Port Channel..........................................................................................................

336

Deleting or Disabling a Port Channel.....................................................................................................................

337

Load Balancing Through Port Channels................................................................................................................

337

Load-Balancing Method..........................................................................................................................................

337

Changing the Hash Algorithm................................................................................................................................

338

Bulk Configuration.........................................................................................................................................................

339

Interface Range........................................................................................................................................................

339

Bulk Configuration Examples..................................................................................................................................

339

Defining Interface Range Macros.................................................................................................................................

341

Define the Interface Range.....................................................................................................................................

341

Choosing an Interface-Range Macro.....................................................................................................................

341

Monitoring and Maintaining Interfaces........................................................................................................................

342

Maintenance Using TDR.........................................................................................................................................

343

Link Dampening..............................................................................................................................................................

343

Important Points to Remember..............................................................................................................................

343

Enabling Link Dampening........................................................................................................................................

344

Link Bundle Monitoring.................................................................................................................................................

345

Using Ethernet Pause Frames for Flow Control........................................................................................................

346

Enabling Pause Frames...........................................................................................................................................

346

Configure the MTU Size on an Interface....................................................................................................................

347

12 Contents

Port-Pipes.......................................................................................................................................................................

348

Auto-Negotiation on Ethernet Interfaces...................................................................................................................

348

Setting the Speed of Ethernet Interfaces............................................................................................................

348

Set Auto-Negotiation Options...............................................................................................................................

350

Provisioning Combo Ports.............................................................................................................................................

351

View Advanced Interface Information..........................................................................................................................

351

Configuring the Interface Sampling Size..............................................................................................................

352

Configuring the Traffic Sampling Size Globally...........................................................................................................

353

Dynamic Counters.........................................................................................................................................................

354

Clearing Interface Counters...................................................................................................................................

355

20 Internet Protocol Security (IPSec)..........................................................................................................

356

Configuring IPSec .........................................................................................................................................................

356

21 IPv4 Routing............................................................................................................................................

358

IP Addresses...................................................................................................................................................................

359

Implementation Information....................................................................................................................................

359

Configuration Tasks for IP Addresses.........................................................................................................................

359

Assigning IP Addresses to an Interface.......................................................................................................................

359

Configuring Static Routes............................................................................................................................................

360

Configure Static Routes for the Management Interface...........................................................................................

361

IPv4 Path MTU Discovery Overview..........................................................................................................................

362

Using the Configured Source IP Address in ICMP Messages..................................................................................

362

Configuring the ICMP Source Interface...............................................................................................................

362

Configuring the Duration to Establish a TCP Connection........................................................................................

363

Enabling Directed Broadcast........................................................................................................................................

363

Resolution of Host Names............................................................................................................................................

363

Enabling Dynamic Resolution of Host Names............................................................................................................

364

Specifying the Local System Domain and a List of Domains...................................................................................

364

Configuring DNS with Traceroute...............................................................................................................................

365

ARP.................................................................................................................................................................................

365

Configuration Tasks for ARP........................................................................................................................................

366

Configuring Static ARP Entries....................................................................................................................................

366

Enabling Proxy ARP.......................................................................................................................................................

366

Clearing ARP Cache......................................................................................................................................................

367

ARP Learning via Gratuitous ARP................................................................................................................................

367

Enabling ARP Learning via Gratuitous ARP................................................................................................................

367

ARP Learning via ARP Request...................................................................................................................................

367

Configuring ARP Retries...............................................................................................................................................

368

ICMP...............................................................................................................................................................................

369

Configuration Tasks for ICMP......................................................................................................................................

369

Enabling ICMP Unreachable Messages......................................................................................................................

369

UDP Helper.....................................................................................................................................................................

369

Configure UDP Helper............................................................................................................................................

369

Important Points to Remember..............................................................................................................................

370

Enabling UDP Helper.....................................................................................................................................................

370

Contents 13

Configuring a Broadcast Address................................................................................................................................

370

Configurations Using UDP Helper................................................................................................................................

371

UDP Helper with Broadcast-All Addresses..................................................................................................................

371

UDP Helper with Subnet Broadcast Addresses.........................................................................................................

372

UDP Helper with Configured Broadcast Addresses..................................................................................................

372

UDP Helper with No Configured Broadcast Addresses............................................................................................

373

Troubleshooting UDP Helper........................................................................................................................................

373

22 IPv6 Routing............................................................................................................................................

374

Protocol Overview.........................................................................................................................................................

374

Extended Address Space........................................................................................................................................

375

Stateless Autoconfiguration....................................................................................................................................

375

IPv6 Headers............................................................................................................................................................

375

IPv6 Header Fields...................................................................................................................................................

376

Extension Header Fields..........................................................................................................................................

378

Addressing................................................................................................................................................................

379

Implementing IPv6 with Dell Networking OS.............................................................................................................

380

ICMPv6............................................................................................................................................................................

381

Path MTU Discovery.....................................................................................................................................................

382

IPv6 Neighbor Discovery..............................................................................................................................................

382

IPv6 Neighbor Discovery of MTU Packets...........................................................................................................

383

Configuration Task List for IPv6 RDNSS....................................................................................................................

383

Configuring the IPv6 Recursive DNS Server.......................................................................................................

383

Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................

384

Displaying IPv6 RDNSS Information......................................................................................................................

385

Secure Shell (SSH) Over an IPv6 Transport..............................................................................................................

385

Configuration Tasks for IPv6........................................................................................................................................

386

Adjusting Your CAM-Profile....................................................................................................................................

386

Assigning an IPv6 Address to an Interface...........................................................................................................

387

Assigning a Static IPv6 Route................................................................................................................................

387

Configuring Telnet with IPv6..................................................................................................................................

388

SNMP over IPv6......................................................................................................................................................

388

Displaying IPv6 Information....................................................................................................................................

388

Displaying an IPv6 Interface Information..............................................................................................................

389

Showing IPv6 Routes..............................................................................................................................................

389

Showing the Running-Configuration for an Interface..........................................................................................

391

Clearing IPv6 Routes................................................................................................................................................

391

Disabling ND Entry Timeout....................................................................................................................................

391

Configuring IPv6 RA Guard..........................................................................................................................................

392

Configuring IPv6 RA Guard on an Interface.........................................................................................................

393

Monitoring IPv6 RA Guard......................................................................................................................................

394

23 iSCSI Optimization..................................................................................................................................

395

iSCSI Optimization Overview.......................................................................................................................................

395

Monitoring iSCSI Traffic Flows...............................................................................................................................

397

Application of Quality of Service to iSCSI Traffic Flows......................................................................................

397

14 Contents

Information Monitored in iSCSI Traffic Flows.......................................................................................................

397

Detection and Auto-Configuration for Dell EqualLogic Arrays...........................................................................

398

Configuring Detection and Ports for Dell Compellent Arrays.............................................................................

398

Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................

399

Enable and Disable iSCSI Optimization.................................................................................................................

399

Default iSCSI Optimization Values...............................................................................................................................

400

iSCSI Optimization Prerequisites.................................................................................................................................

400

Configuring iSCSI Optimization...................................................................................................................................

400

Displaying iSCSI Optimization Information..................................................................................................................

402

24 Intermediate System to Intermediate System..........................................................................................

404

IS-IS Protocol Overview...............................................................................................................................................

404

IS-IS Addressing.............................................................................................................................................................

404

Multi-Topology IS-IS......................................................................................................................................................

405

Transition Mode.......................................................................................................................................................

405

Interface Support....................................................................................................................................................

406

Adjacencies...............................................................................................................................................................

406

Graceful Restart............................................................................................................................................................

406

Timers.......................................................................................................................................................................

406

Implementation Information.........................................................................................................................................

406

Configuration Information.............................................................................................................................................

407

Configuration Tasks for IS-IS..................................................................................................................................

408

Configuring the Distance of a Route......................................................................................................................

415

Changing the IS-Type...............................................................................................................................................

416

Redistributing IPv4 Routes......................................................................................................................................

418

Redistributing IPv6 Routes......................................................................................................................................

419

Configuring Authentication Passwords.................................................................................................................

420

Setting the Overload Bit.........................................................................................................................................

420

Debugging IS-IS........................................................................................................................................................

421

IS-IS Metric Styles.........................................................................................................................................................

422

Configure Metric Values................................................................................................................................................

422

Maximum Values in the Routing Table...................................................................................................................

422

Change the IS-IS Metric Style in One Level Only................................................................................................

422

Leaks from One Level to Another..........................................................................................................................

424

Sample Configurations..................................................................................................................................................

425

25 Link Aggregation Control Protocol (LACP)...............................................................................................

427

Introduction to Dynamic LAGs and LACP...................................................................................................................

427

Important Points to Remember..............................................................................................................................

427

LACP Modes............................................................................................................................................................

428

Configuring LACP Commands...............................................................................................................................

428

LACP Configuration Tasks............................................................................................................................................

429

Creating a LAG.........................................................................................................................................................

429

Configuring the LAG Interfaces as Dynamic........................................................................................................

429

Setting the LACP Long Timeout............................................................................................................................

430

Monitoring and Debugging LACP..........................................................................................................................

430

Contents 15

Shared LAG State Tracking...........................................................................................................................................

431

Configuring Shared LAG State Tracking................................................................................................................

431

Important Points about Shared LAG State Tracking...........................................................................................

433

LACP Basic Configuration Example.............................................................................................................................

433

Configure a LAG on ALPHA...................................................................................................................................

433

26 Layer 2.....................................................................................................................................................

442

Manage the MAC Address Table.................................................................................................................................

442

Clearing the MAC Address Table...........................................................................................................................

442

Setting the Aging Time for Dynamic Entries........................................................................................................

442

Configuring a Static MAC Address........................................................................................................................

443

Displaying the MAC Address Table........................................................................................................................

443

MAC Learning Limit.......................................................................................................................................................

443

Setting the MAC Learning Limit.............................................................................................................................

444

mac learning-limit Dynamic.....................................................................................................................................

444

mac learning-limit mac-address-sticky.................................................................................................................

444

mac learning-limit station-move............................................................................................................................

445

mac learning-limit no-station-move......................................................................................................................

445

Learning Limit Violation Actions.............................................................................................................................

445

Setting Station Move Violation Actions................................................................................................................

446

Recovering from Learning Limit and Station Move Violations...........................................................................

446

Disabling MAC Address Learning on the System.................................................................................................

447

NIC Teaming...................................................................................................................................................................

447

Configure Redundant Pairs...........................................................................................................................................

448

Important Points about Configuring Redundant Pairs........................................................................................

450

Far-End Failure Detection..............................................................................................................................................

451

FEFD State Changes...............................................................................................................................................

452

Configuring FEFD....................................................................................................................................................

453

Enabling FEFD on an Interface...............................................................................................................................

453

Debugging FEFD......................................................................................................................................................

454

27 Link Layer Discovery Protocol (LLDP).....................................................................................................

456

802.1AB (LLDP) Overview............................................................................................................................................

456

Protocol Data Units.................................................................................................................................................

456

Optional TLVs.................................................................................................................................................................

457

Management TLVs...................................................................................................................................................

457

TIA-1057 (LLDP-MED) Overview................................................................................................................................

459

TIA Organizationally Specific TLVs........................................................................................................................

459

Configure LLDP..............................................................................................................................................................

463

Related Configuration Tasks...................................................................................................................................

463

Important Points to Remember.............................................................................................................................

463

LLDP Compatibility..................................................................................................................................................

464

CONFIGURATION versus INTERFACE Configurations............................................................................................

464

Enabling LLDP................................................................................................................................................................

464

Disabling and Undoing LLDP..................................................................................................................................

465

Enabling LLDP on Management Ports........................................................................................................................

465

16 Contents

Disabling and Undoing LLDP on Management Ports..........................................................................................

465

Advertising TLVs............................................................................................................................................................

465

Viewing the LLDP Configuration.................................................................................................................................

466

Viewing Information Advertised by Adjacent LLDP Agents......................................................................................

467

Configuring LLDPDU Intervals.....................................................................................................................................

468

Configuring Transmit and Receive Mode....................................................................................................................

469

Configuring the Time to Live Value.............................................................................................................................

469

Debugging LLDP............................................................................................................................................................

470

Relevant Management Objects....................................................................................................................................

471

28 Microsoft Network Load Balancing..........................................................................................................

476

NLB Unicast Mode Scenario........................................................................................................................................

476

NLB Multicast Mode Scenario.....................................................................................................................................

476

Limitations of the NLB Feature....................................................................................................................................

477

Microsoft Clustering......................................................................................................................................................

477

Enable and Disable VLAN Flooding .............................................................................................................................

477

Configuring a Switch for NLB .....................................................................................................................................

477

Enabling a Switch for Multicast NLB.....................................................................................................................

478

29 Multicast Source Discovery Protocol (MSDP).........................................................................................

479

Protocol Overview.........................................................................................................................................................

479

Anycast RP.....................................................................................................................................................................

480

Implementation Information..........................................................................................................................................

481

Configure Multicast Source Discovery Protocol.........................................................................................................

481

Related Configuration Tasks....................................................................................................................................

481

Enable MSDP.................................................................................................................................................................

485

Manage the Source-Active Cache..............................................................................................................................

486

Viewing the Source-Active Cache.........................................................................................................................

486

Limiting the Source-Active Cache.........................................................................................................................

486

Clearing the Source-Active Cache........................................................................................................................

487

Enabling the Rejected Source-Active Cache........................................................................................................

487

Accept Source-Active Messages that Fail the RFP Check......................................................................................

487

Specifying Source-Active Messages...........................................................................................................................

490

Limiting the Source-Active Messages from a Peer....................................................................................................

491

Preventing MSDP from Caching a Local Source........................................................................................................

491

Preventing MSDP from Caching a Remote Source..................................................................................................

492

Preventing MSDP from Advertising a Local Source..................................................................................................

492

Logging Changes in Peership States...........................................................................................................................

493

Terminating a Peership..................................................................................................................................................

493

Clearing Peer Statistics.................................................................................................................................................

494

Debugging MSDP..........................................................................................................................................................

494

MSDP with Anycast RP................................................................................................................................................

495

Configuring Anycast RP................................................................................................................................................

496

Reducing Source-Active Message Flooding.........................................................................................................

497

Specifying the RP Address Used in SA Messages...............................................................................................

497

MSDP Sample Configurations......................................................................................................................................

499

Contents 17

30 Multiple Spanning Tree Protocol (MSTP)................................................................................................

502

Protocol Overview.........................................................................................................................................................

502

Spanning Tree Variations..............................................................................................................................................

503

Implementation Information...................................................................................................................................

503

Configure Multiple Spanning Tree Protocol................................................................................................................

503

Related Configuration Tasks...................................................................................................................................

504

Enable Multiple Spanning Tree Globally......................................................................................................................

504

Adding and Removing Interfaces.................................................................................................................................

504

Creating Multiple Spanning Tree Instances................................................................................................................

505

Influencing MSTP Root Selection...............................................................................................................................

506

Interoperate with Non-Dell Bridges.............................................................................................................................

506

Changing the Region Name or Revision.....................................................................................................................

507

Modifying Global Parameters.......................................................................................................................................

507

Modifying the Interface Parameters...........................................................................................................................

508

Configuring an EdgePort..............................................................................................................................................

509

Flush MAC Addresses after a Topology Change........................................................................................................

510

MSTP Sample Configurations.......................................................................................................................................

510

Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-

 

ConfigurationSFTOS Example Running-Configuration.........................................................................................

511

Debugging and Verifying MSTP Configurations.........................................................................................................

514

31 Multicast Features....................................................................................................................................

516

Enabling IP Multicast......................................................................................................................................................

516

Implementation Information..........................................................................................................................................

516

Multicast Policies............................................................................................................................................................

517

IPv4 Multicast Policies.............................................................................................................................................

517

Understanding Multicast Traceroute (mtrace).....................................................................................................

524

Printing Multicast Traceroute (mtrace) Paths.....................................................................................................

525

Supported Error Codes...........................................................................................................................................

526

mtrace Scenarios.....................................................................................................................................................

527

32 Object Tracking........................................................................................................................................

533

Object Tracking Overview............................................................................................................................................

533

Track Layer 2 Interfaces..........................................................................................................................................

534

Track Layer 3 Interfaces..........................................................................................................................................

534

Track IPv4 and IPv6 Routes...................................................................................................................................

535

Set Tracking Delays.................................................................................................................................................

536

VRRP Object Tracking............................................................................................................................................

536

Object Tracking Configuration.....................................................................................................................................

536

Tracking a Layer 2 Interface...................................................................................................................................

536

Tracking a Layer 3 Interface...................................................................................................................................

537

Track an IPv4/IPv6 Route......................................................................................................................................

539

Displaying Tracked Objects...........................................................................................................................................

542

33 Open Shortest Path First (OSPFv2 and OSPFv3)....................................................................................

544

18 Contents

Protocol Overview.........................................................................................................................................................

544

Autonomous System (AS) Areas...........................................................................................................................

544

Area Types................................................................................................................................................................

545

Networks and Neighbors........................................................................................................................................

546

Router Types............................................................................................................................................................

546

Designated and Backup Designated Routers.......................................................................................................

548

Link-State Advertisements (LSAs)........................................................................................................................

548

Router Priority and Cost.........................................................................................................................................

549

OSPF with Dell Networking OS...................................................................................................................................

550

Graceful Restart.......................................................................................................................................................

551

Fast Convergence (OSPFv2, IPv4 Only)..............................................................................................................

552

Multi-Process OSPFv2 with VRF..........................................................................................................................

552

OSPF ACK Packing.................................................................................................................................................

552

Setting OSPF Adjacency with Cisco Routers......................................................................................................

552

Configuration Information.............................................................................................................................................

553

Configuration Task List for OSPFv2 (OSPF for IPv4)........................................................................................

553

Configuration Task List for OSPFv3 (OSPF for IPv6)...............................................................................................

567

Enabling IPv6 Unicast Routing...............................................................................................................................

568

Applying cost for OSPFv3......................................................................................................................................

568

Assigning IPv6 Addresses on an Interface...........................................................................................................

569

Assigning Area ID on an Interface..........................................................................................................................

569

Assigning OSPFv3 Process ID and Router ID Globally........................................................................................

569

Assigning OSPFv3 Process ID and Router ID to a VRF......................................................................................

570

Configuring Stub Areas...........................................................................................................................................

570

Configuring Passive-Interface.................................................................................................................................

571

Redistributing Routes...............................................................................................................................................

571

Configuring a Default Route....................................................................................................................................

571

Enabling OSPFv3 Graceful Restart.......................................................................................................................

572

OSPFv3 Authentication Using IPsec.....................................................................................................................

574

Troubleshooting OSPFv3........................................................................................................................................

580

34 Policy-based Routing (PBR)....................................................................................................................

582

Overview.........................................................................................................................................................................

582

Implementing PBR.........................................................................................................................................................

583

Configuration Task List for Policy-based Routing......................................................................................................

583

PBR Exceptions (Permit).......................................................................................................................................

583

Create a Redirect List..............................................................................................................................................

584

Create a Rule for a Redirect-list.............................................................................................................................

584

Apply a Redirect-list to an Interface using a Redirect-group.............................................................................

586

Sample Configuration....................................................................................................................................................

588

Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View Redirect-List GOLD.....

589

35 PIM Sparse-Mode (PIM-SM)..................................................................................................................

592

Implementation Information..........................................................................................................................................

592

Protocol Overview.........................................................................................................................................................

592

Requesting Multicast Traffic...................................................................................................................................

592

Contents 19

Refuse Multicast Traffic..........................................................................................................................................

593

Send Multicast Traffic.............................................................................................................................................

593

Configuring PIM-SM.....................................................................................................................................................

593

Related Configuration Tasks...................................................................................................................................

594

Enable PIM-SM..............................................................................................................................................................

594

Configuring S,G Expiry Timers.....................................................................................................................................

594

Configuring a Static Rendezvous Point......................................................................................................................

595

Overriding Bootstrap Router Updates..................................................................................................................

595

Configuring a Designated Router................................................................................................................................

596

Creating Multicast Boundaries and Domains.............................................................................................................

596

36 PIM Source-Specific Mode (PIM-SSM)..................................................................................................

597

Implementation Information..........................................................................................................................................

597

Important Points to Remember..............................................................................................................................

597

Configure PIM-SSM......................................................................................................................................................

598

Related Configuration Tasks...................................................................................................................................

598

Enabling PIM-SSM........................................................................................................................................................

598

Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................

598

Configuring PIM-SSM with IGMPv2....................................................................................................................

599

Electing an RP using the BSR Mechanism.................................................................................................................

600

Enabling RP to Server Specific Multicast Groups...............................................................................................

600

37 Power over Ethernet (PoE).....................................................................................................................

602

Configuring PoE or PoE+..............................................................................................................................................

602

Enable PoE/PoE+....................................................................................................................................................

603

Upgrading the PoE Controller................................................................................................................................

603

Manage Ports using Power Priority and Power Budget...........................................................................................

604

Determine the Power Priority................................................................................................................................

604

Manage Inline Power...............................................................................................................................................

605

Set the Threshold Limit for the PoE Power Budget...........................................................................................

605

Manage Power Priorities........................................................................................................................................

606

Power Allocation to Ports.......................................................................................................................................

606

Power Allocation to Additional Ports.....................................................................................................................

607

Manage Legacy Devices...............................................................................................................................................

607

Suspend Power Delivery on a Port..............................................................................................................................

607

Restore Power Delivery on a Port...............................................................................................................................

608

Display the Power Details.............................................................................................................................................

608

38 Port Monitoring.......................................................................................................................................

609

Important Points to Remember...................................................................................................................................

609

Port Monitoring..............................................................................................................................................................

610

Configuring Port Monitoring.........................................................................................................................................

612

Configuring Monitor Multicast Queue.........................................................................................................................

613

Enabling Flow-Based Monitoring..................................................................................................................................

614

Remote Port Mirroring...................................................................................................................................................

615

Remote Port Mirroring Example.............................................................................................................................

615

20 Contents

Configuring Remote Port Mirroring........................................................................................................................

616

Displaying Remote-Port Mirroring Configurations................................................................................................

618

Configuring the Sample Remote Port Mirroring...................................................................................................

618

Encapsulated Remote Port Monitoring.......................................................................................................................

621

ERPM Behavior on a typical Dell Networking OS .....................................................................................................

623

Decapsulation of ERPM packets at the Destination IP/ Analyzer.....................................................................

623

Port Monitoring on VLT.................................................................................................................................................

624

VLT Non-fail over Scenario.....................................................................................................................................

624

VLT Fail-over Scenario............................................................................................................................................

625

RPM over VLT Scenarios........................................................................................................................................

625

39 Private VLANs (PVLAN)..........................................................................................................................

627

Private VLAN Concepts................................................................................................................................................

627

Using the Private VLAN Commands...........................................................................................................................

628

Configuration Task List..................................................................................................................................................

629

Creating PVLAN ports............................................................................................................................................

629

Creating a Primary VLAN.......................................................................................................................................

630

Creating a Community VLAN..................................................................................................................................

631

Creating an Isolated VLAN......................................................................................................................................

631

Private VLAN Configuration Example.........................................................................................................................

633

Inspecting the Private VLAN Configuration...............................................................................................................

634

40 Per-VLAN Spanning Tree Plus (PVST+)...................................................................................................

636

Protocol Overview.........................................................................................................................................................

636

Implementation Information..........................................................................................................................................

637

Configure Per-VLAN Spanning Tree Plus....................................................................................................................

637

Related Configuration Tasks...................................................................................................................................

637

Enabling PVST+..............................................................................................................................................................

637

Disabling PVST+.............................................................................................................................................................

638

Influencing PVST+ Root Selection...............................................................................................................................

638

Modifying Global PVST+ Parameters..........................................................................................................................

640

Modifying Interface PVST+ Parameters......................................................................................................................

641

Configuring an EdgePort..............................................................................................................................................

642

PVST+ in Multi-Vendor Networks...............................................................................................................................

642

Enabling PVST+ Extend System ID.............................................................................................................................

642

PVST+ Sample Configurations.....................................................................................................................................

643

41 Quality of Service (QoS)..........................................................................................................................

646

Implementation Information..........................................................................................................................................

648

Port-Based QoS Configurations..................................................................................................................................

648

Setting dot1p Priorities for Incoming Traffic.........................................................................................................

648

Honoring dot1p Priorities on Ingress Traffic..........................................................................................................

649

Configuring Port-Based Rate Policing..................................................................................................................

650

Configuring Port-Based Rate Shaping..................................................................................................................

650

Policy-Based QoS Configurations................................................................................................................................

651

Classify Traffic...........................................................................................................................................................

651

Contents 21

Create a QoS Policy................................................................................................................................................

654

Create Policy Maps..................................................................................................................................................

657

DSCP Color Maps.........................................................................................................................................................

660

Creating a DSCP Color Map...................................................................................................................................

661

Displaying DSCP Color Maps.................................................................................................................................

662

Displaying a DSCP Color Policy Configuration ....................................................................................................

662

Enabling QoS Rate Adjustment....................................................................................................................................

663

Enabling Strict-Priority Queueing................................................................................................................................

663

Weighted Random Early Detection..............................................................................................................................

663

Creating WRED Profiles..........................................................................................................................................

664

Applying a WRED Profile to Traffic........................................................................................................................

665

Displaying Default and Configured WRED Profiles..............................................................................................

665

Displaying WRED Drop Statistics...........................................................................................................................

665

Displaying egress–queue Statistics.......................................................................................................................

666

Pre-Calculating Available QoS CAM Space................................................................................................................

666

Configuring Weights and ECN for WRED ..................................................................................................................

667

Global Service Pools With WRED and ECN Settings..........................................................................................

668

Configuring WRED and ECN Attributes.....................................................................................................................

669

Guidelines for Configuring ECN for Classifying and Color-Marking Packets.........................................................

669

Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class..................................

670

Classifying Incoming Packets Using ECN and Color-Marking............................................................................

670

Sample configuration to mark non-ecn packets as “yellow” with single traffic class......................................

672

Applying Layer 2 Match Criteria on a Layer 3 Interface............................................................................................

673

Applying DSCP and VLAN Match Criteria on a Service Queue...............................................................................

674

Classifying Incoming Packets Using ECN and Color-Marking..................................................................................

675

Guidelines for Configuring ECN for Classifying and Color-Marking Packets.........................................................

676

Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class........................................

677

Sample configuration to mark non-ecn packets as “yellow” with single traffic class............................................

677

42 Routing Information Protocol (RIP).........................................................................................................

679

Protocol Overview.........................................................................................................................................................

679

RIPv1..........................................................................................................................................................................

679

RIPv2.........................................................................................................................................................................

679

Implementation Information.........................................................................................................................................

680

Configuration Information.............................................................................................................................................

680

Configuration Task List............................................................................................................................................

680

RIP Configuration Example.....................................................................................................................................

686

43 Remote Monitoring (RMON)...................................................................................................................

692

Implementation Information..........................................................................................................................................

692

Fault Recovery...............................................................................................................................................................

692

Setting the RMON Alarm.......................................................................................................................................

693

Configuring an RMON Event.................................................................................................................................

693

Configuring RMON Collection Statistics..............................................................................................................

694

Configuring the RMON Collection History...........................................................................................................

694

22 Contents

44 Rapid Spanning Tree Protocol (RSTP).....................................................................................................

696

Protocol Overview.........................................................................................................................................................

696

Configuring Rapid Spanning Tree................................................................................................................................

696

Related Configuration Tasks...................................................................................................................................

696

Important Points to Remember...................................................................................................................................

696

RSTP and VLT..........................................................................................................................................................

697

Configuring Interfaces for Layer 2 Mode....................................................................................................................

697

Enabling Rapid Spanning Tree Protocol Globally........................................................................................................

698

Adding and Removing Interfaces.................................................................................................................................

700

Modifying Global Parameters.......................................................................................................................................

700

Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................

702

Modifying Interface Parameters...................................................................................................................................

702

Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................

702

Influencing RSTP Root Selection.................................................................................................................................

702

Configuring an EdgePort..............................................................................................................................................

703

Configuring Fast Hellos for Link State Detection.......................................................................................................

704

45 Software-Defined Networking (SDN)......................................................................................................

705

46 Security...................................................................................................................................................

706

AAA Accounting.............................................................................................................................................................

706

Configuration Task List for AAA Accounting........................................................................................................

706

AAA Authentication.......................................................................................................................................................

708

Configuration Task List for AAA Authentication..................................................................................................

709

Obscuring Passwords and Keys....................................................................................................................................

712

AAA Authorization..........................................................................................................................................................

712

Privilege Levels Overview........................................................................................................................................

712

Configuration Task List for Privilege Levels...........................................................................................................

713

RADIUS............................................................................................................................................................................

717

RADIUS Authentication............................................................................................................................................

717

Configuration Task List for RADIUS.......................................................................................................................

718

TACACS+........................................................................................................................................................................

722

Configuration Task List for TACACS+...................................................................................................................

722

TACACS+ Remote Authentication.........................................................................................................................

723

Command Authorization.........................................................................................................................................

725

Protection from TCP Tiny and Overlapping Fragment Attacks...............................................................................

725

Enabling SCP and SSH..................................................................................................................................................

725

Using SCP with SSH to Copy a Software Image.................................................................................................

726

Removing the RSA Host Keys and Zeroizing Storage ........................................................................................

727

Configuring When to Re-generate an SSH Key ..................................................................................................

727

Configuring the SSH Server Key Exchange Algorithm.......................................................................................

728

Configuring the HMAC Algorithm for the SSH Server.......................................................................................

728

Configuring the SSH Server Cipher List...............................................................................................................

729

Secure Shell Authentication...................................................................................................................................

729

Troubleshooting SSH...............................................................................................................................................

732

Contents 23

Telnet...............................................................................................................................................................................

732

VTY Line and Access-Class Configuration.................................................................................................................

732

VTY Line Local Authentication and Authorization...............................................................................................

733

VTY Line Remote Authentication and Authorization...........................................................................................

733

VTY MAC-SA Filter Support...................................................................................................................................

734

Role-Based Access Control..........................................................................................................................................

734

Overview of RBAC...................................................................................................................................................

735

User Roles.................................................................................................................................................................

737

AAA Authentication and Authorization for Roles.................................................................................................

740

Role Accounting.......................................................................................................................................................

743

Display Information About User Roles...................................................................................................................

743

Two Factor Authentication (2FA).................................................................................................................................

745

Handling Access-Challenge Message....................................................................................................................

745

Configuring Challenge Response Authentication for SSHv2.............................................................................

745

SMS-OTP Mechanism............................................................................................................................................

746

Configuring the System to Drop Certain ICMP Reply Messages............................................................................

746

47 Service Provider Bridging.........................................................................................................................

748

VLAN Stacking...............................................................................................................................................................

748

Important Points to Remember..............................................................................................................................

749

Configure VLAN Stacking.......................................................................................................................................

749

Creating Access and Trunk Ports..........................................................................................................................

750

Enable VLAN-Stacking for a VLAN........................................................................................................................

751

Configuring the Protocol Type Value for the Outer VLAN Tag...........................................................................

751

Configuring Dell Networking OS Options for Trunk Ports...................................................................................

751

Debugging VLAN Stacking.....................................................................................................................................

752

VLAN Stacking in Multi-Vendor Networks...........................................................................................................

753

VLAN Stacking Packet Drop Precedence...................................................................................................................

757

Enabling Drop Eligibility............................................................................................................................................

757

Honoring the Incoming DEI Value..........................................................................................................................

758

Marking Egress Packets with a DEI Value............................................................................................................

758

Dynamic Mode CoS for VLAN Stacking.....................................................................................................................

759

Mapping C-Tag to S-Tag dot1p Values...................................................................................................................

760

Layer 2 Protocol Tunneling............................................................................................................................................

761

Implementation Information....................................................................................................................................

762

Enabling Layer 2 Protocol Tunneling......................................................................................................................

763

Specifying a Destination MAC Address for BPDUs.............................................................................................

763

Setting Rate-Limit BPDUs......................................................................................................................................

763

Debugging Layer 2 Protocol Tunneling..................................................................................................................

764

Provider Backbone Bridging.........................................................................................................................................

764

48 sFlow.......................................................................................................................................................

765

Overview.........................................................................................................................................................................

765

Implementation Information..........................................................................................................................................

765

Important Points to Remember..............................................................................................................................

766

Enabling and Disabling sFlow on an Interface............................................................................................................

766

24 Contents

Enabling sFlow Max-Header Size Extended...............................................................................................................

766

sFlow Show Commands................................................................................................................................................

767

Displaying Show sFlow Global................................................................................................................................

768

Displaying Show sFlow on an Interface.................................................................................................................

768

Displaying Show sFlow on a Stack-unit................................................................................................................

769

Configuring Specify Collectors.....................................................................................................................................

769

Changing the Polling Intervals......................................................................................................................................

769

Back-Off Mechanism.....................................................................................................................................................

770

sFlow on LAG ports.......................................................................................................................................................

770

Enabling Extended sFlow..............................................................................................................................................

770

Important Points to Remember...............................................................................................................................

771

49 Simple Network Management Protocol (SNMP)......................................................................................

772

Protocol Overview.........................................................................................................................................................

773

Implementation Information..........................................................................................................................................

773

SNMPv3 Compliance With FIPS..................................................................................................................................

773

Configuration Task List for SNMP................................................................................................................................

774

Related Configuration Tasks....................................................................................................................................

774

Important Points to Remember....................................................................................................................................

775

Set up SNMP.................................................................................................................................................................

775

Creating a Community.............................................................................................................................................

775

Setting Up User-Based Security (SNMPv3)........................................................................................................

775

Reading Managed Object Values.................................................................................................................................

777

Writing Managed Object Values...................................................................................................................................

777

Configuring Contact and Location Information using SNMP...................................................................................

778

Subscribing to Managed Object Value Updates using SNMP..................................................................................

778

Enabling a Subset of SNMP Traps...............................................................................................................................

779

Enabling an SNMP Agent to Notify Syslog Server Failure........................................................................................

781

Copy Configuration Files Using SNMP........................................................................................................................

782

Copying a Configuration File...................................................................................................................................

783

Copying Configuration Files via SNMP.................................................................................................................

784

Copying the Startup-Config Files to the Running-Config..................................................................................

785

Copying the Startup-Config Files to the Server via FTP....................................................................................

785

Copying the Startup-Config Files to the Server via TFTP.................................................................................

785

Copy a Binary File to the Startup-Configuration.................................................................................................

786

Additional MIB Objects to View Copy Statistics..................................................................................................

786

Obtaining a Value for MIB Objects.........................................................................................................................

787

MIB Support for Power Monitoring.............................................................................................................................

787

MIB Support to Display the Available Memory Size on Flash...................................................................................

788

Viewing the Available Flash Memory Size.............................................................................................................

788

MIB Support to Display the Software Core Files Generated by the System..........................................................

789

Viewing the Software Core Files Generated by the System..............................................................................

789

SNMP Support for WRED Green/Yellow/Red Drop Counters................................................................................

790

MIB Support to Display the Available Partitions on Flash..........................................................................................

791

Viewing the Available Partitions on Flash..............................................................................................................

791

MIB Support to Display Egress Queue Statistics.......................................................................................................

792

Contents 25

MIB Support to Display Egress Queue Statistics.......................................................................................................

792

Viewing the ECMP Group Count Information......................................................................................................

792

MIB Support for entAliasMappingTable .....................................................................................................................

795

Viewing the entAliasMappingTable MIB................................................................................................................

795

MIB Support for LAG....................................................................................................................................................

796

Viewing the LAG MIB..............................................................................................................................................

797

Manage VLANs using SNMP.......................................................................................................................................

797

Creating a VLAN......................................................................................................................................................

797

Assigning a VLAN Alias............................................................................................................................................

797

Displaying the Ports in a VLAN..............................................................................................................................

798

Add Tagged and Untagged Ports to a VLAN.......................................................................................................

799

Managing Overload on Startup....................................................................................................................................

800

Enabling and Disabling a Port using SNMP................................................................................................................

800

Fetch Dynamic MAC Entries using SNMP..................................................................................................................

801

Deriving Interface Indices.............................................................................................................................................

802

Monitor Port-Channels.................................................................................................................................................

803

Enabling an SNMP Agent to Notify Syslog Server Failure.......................................................................................

804

Troubleshooting SNMP Operation...............................................................................................................................

805

Transceiver Monitoring.................................................................................................................................................

805

50 Stacking..................................................................................................................................................

807

Stacking Overview.........................................................................................................................................................

807

Cross Platform Stacking.........................................................................................................................................

807

Stack Management Roles.......................................................................................................................................

808

Stack Master Election.............................................................................................................................................

808

Virtual IP....................................................................................................................................................................

812

Failover Roles............................................................................................................................................................

812

MAC Addressing on Stacks.....................................................................................................................................

812

Stacking LAG............................................................................................................................................................

815

Supported Stacking Topologies..............................................................................................................................

815

High Availability on Stacks.......................................................................................................................................

816

Management Access on Stacks.............................................................................................................................

817

Important Points to Remember....................................................................................................................................

818

Stacking Installation Tasks.............................................................................................................................................

818

Create a Stack..........................................................................................................................................................

818

Add Units to an Existing Stack...............................................................................................................................

821

Split a Stack..............................................................................................................................................................

823

Stacking Configuration Tasks.......................................................................................................................................

824

Assigning Unit Numbers to Units in an Stack.......................................................................................................

824

Creating a Virtual Stack Unit on a Stack...............................................................................................................

824

Displaying Information about a Stack....................................................................................................................

825

Influencing Management Unit Selection on a Stack...........................................................................................

828

Managing Redundancy on a Stack........................................................................................................................

829

Resetting a Unit on a Stack....................................................................................................................................

829

Verify a Stack Configuration........................................................................................................................................

830

Displaying the Status of Stacking Ports...............................................................................................................

830

26 Contents

Removing a Unit from a Stack......................................................................................................................................

831

Troubleshoot a Stack.....................................................................................................................................................

833

Recover from Stack Link Flaps..............................................................................................................................

833

Recover from a Card Problem State on a Stack..................................................................................................

833

51 Storm Control..........................................................................................................................................

835

Configure Storm Control...............................................................................................................................................

835

Configuring Storm Control from INTERFACE Mode...........................................................................................

835

Configuring Storm Control from CONFIGURATION Mode................................................................................

836

52 Spanning Tree Protocol (STP).................................................................................................................

837

Protocol Overview.........................................................................................................................................................

837

Configure Spanning Tree...............................................................................................................................................

838

Related Configuration Tasks...................................................................................................................................

838

Important Points to Remember...................................................................................................................................

838

Configuring Interfaces for Layer 2 Mode....................................................................................................................

839

Enabling Spanning Tree Protocol Globally...................................................................................................................

840

Adding an Interface to the Spanning Tree Group......................................................................................................

842

Modifying Global Parameters.......................................................................................................................................

842

Modifying Interface STP Parameters..........................................................................................................................

843

Enabling PortFast..........................................................................................................................................................

843

Prevent Network Disruptions with BPDU Guard.................................................................................................

844

Selecting STP Root.......................................................................................................................................................

845

STP Root Guard.............................................................................................................................................................

846

Root Guard Scenario...............................................................................................................................................

846

Configuring Root Guard..........................................................................................................................................

847

Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................

848

Configuring Spanning Trees as Hitless........................................................................................................................

848

STP Loop Guard.............................................................................................................................................................

848

Configuring Loop Guard..........................................................................................................................................

849

Displaying STP Guard Configuration...........................................................................................................................

850

53 SupportAssist...........................................................................................................................................

851

Configuring SupportAssist Using a Configuration Wizard........................................................................................

852

Configuring SupportAssist Manually...........................................................................................................................

852

Configuring SupportAssist Activity.............................................................................................................................

854

Configuring SupportAssist Company..........................................................................................................................

855

Configuring SupportAssist Person..............................................................................................................................

856

Configuring SupportAssist Server...............................................................................................................................

856

Viewing SupportAssist Configuration..........................................................................................................................

857

54 System Time and Date.............................................................................................................................

859

Network Time Protocol.................................................................................................................................................

859

Protocol Overview...................................................................................................................................................

860

Configure the Network Time Protocol..................................................................................................................

860

Enabling NTP............................................................................................................................................................

861

Contents 27

Configuring NTP Broadcasts..................................................................................................................................

861

Disabling NTP on an Interface................................................................................................................................

862

Configuring a Source IP Address for NTP Packets.............................................................................................

862

Configuring NTP Authentication............................................................................................................................

862

Dell Networking OS Time and Date.............................................................................................................................

865

Configuration Task List ..........................................................................................................................................

865

Setting the Time and Date for the Switch Software Clock...............................................................................

865

Setting the Timezone..............................................................................................................................................

865

Set Daylight Saving Time........................................................................................................................................

866

Setting Daylight Saving Time Once.......................................................................................................................

866

Setting Recurring Daylight Saving Time................................................................................................................

867

Configuring a Custom-defined Period for NTP time Synchronization..............................................................

868

55 Tunneling.................................................................................................................................................

869

Configuring a Tunnel......................................................................................................................................................

869

Configuring Tunnel Keepalive Settings........................................................................................................................

870

Configuring a Tunnel Interface.....................................................................................................................................

870

Configuring Tunnel Allow-Remote Decapsulation.......................................................................................................

871

Configuring the Tunnel Source Anylocal......................................................................................................................

871

56 Uplink Failure Detection (UFD)................................................................................................................

873

Feature Description........................................................................................................................................................

873

How Uplink Failure Detection Works............................................................................................................................

874

UFD and NIC Teaming...................................................................................................................................................

875

Important Points to Remember....................................................................................................................................

875

Configuring Uplink Failure Detection...........................................................................................................................

876

Clearing a UFD-Disabled Interface...............................................................................................................................

877

Displaying Uplink Failure Detection..............................................................................................................................

878

Sample Configuration: Uplink Failure Detection.........................................................................................................

880

57 Upgrade Procedures................................................................................................................................

882

Get Help with Upgrades...............................................................................................................................................

882

58 Virtual LANs (VLANs)..............................................................................................................................

883

Default VLAN.................................................................................................................................................................

884

Port-Based VLANs........................................................................................................................................................

884

VLANs and Port Tagging..............................................................................................................................................

885

Configuration Task List..................................................................................................................................................

885

Creating a Port-Based VLAN.................................................................................................................................

885

Assigning Interfaces to a VLAN.............................................................................................................................

886

Moving Untagged Interfaces..................................................................................................................................

887

Assigning an IP Address to a VLAN.......................................................................................................................

888

Configuring Native VLANs...........................................................................................................................................

888

Enabling Null VLAN as the Default VLAN...................................................................................................................

889

59 Virtual Link Trunking (VLT)......................................................................................................................

890

28 Contents

Overview........................................................................................................................................................................

890

VLT Terminology.......................................................................................................................................................

893

Layer-2 Traffic in VLT Domains...............................................................................................................................

894

Interspersed VLANs................................................................................................................................................

895

VLT on Core Switches............................................................................................................................................

895

Enhanced VLT..........................................................................................................................................................

896

Configure Virtual Link Trunking....................................................................................................................................

897

Important Points to Remember..............................................................................................................................

897

Configuration Notes................................................................................................................................................

898

Primary and Secondary VLT Peers.........................................................................................................................

901

RSTP and VLT..........................................................................................................................................................

901

VLT Bandwidth Monitoring.....................................................................................................................................

902

VLT and Stacking.....................................................................................................................................................

902

VLT and IGMP Snooping........................................................................................................................................

902

VLT IPv6...................................................................................................................................................................

902

VLT Port Delayed Restoration................................................................................................................................

903

PIM-Sparse Mode Support on VLT.......................................................................................................................

903

VLT Routing .............................................................................................................................................................

905

Non-VLT ARP Sync.................................................................................................................................................

908

RSTP Configuration......................................................................................................................................................

909

Preventing Forwarding Loops in a VLT Domain...................................................................................................

909

Sample RSTP Configuration...................................................................................................................................

909

Configuring VLT........................................................................................................................................................

910

PVST+ Configuration.....................................................................................................................................................

920

Sample PVST+ Configuration.................................................................................................................................

920

Peer Routing Configuration Example...........................................................................................................................

921

Dell-1 Switch Configuration.....................................................................................................................................

922

Dell-2 Switch Configuration....................................................................................................................................

926

R1 Configuration.......................................................................................................................................................

929

Access Switch A1 Configurations and Verification..............................................................................................

930

eVLT Configuration Example.........................................................................................................................................

931

eVLT Configuration Step Examples........................................................................................................................

931

PIM-Sparse Mode Configuration Example.................................................................................................................

933

Verifying a VLT Configuration.......................................................................................................................................

934

Additional VLT Sample Configurations........................................................................................................................

937

Troubleshooting VLT......................................................................................................................................................

939

Reconfiguring Stacked Switches as VLT....................................................................................................................

940

Specifying VLT Nodes in a PVLAN..............................................................................................................................

940

Association of VLTi as a Member of a PVLAN.....................................................................................................

941

MAC Synchronization for VLT Nodes in a PVLAN...............................................................................................

941

PVLAN Operations When One VLT Peer is Down...............................................................................................

942

PVLAN Operations When a VLT Peer is Restarted.............................................................................................

942

Interoperation of VLT Nodes in a PVLAN with ARP Requests..........................................................................

942

Scenarios for VLAN Membership and MAC Synchronization With VLT Nodes in PVLAN............................

942

Configuring a VLT VLAN or LAG in a PVLAN............................................................................................................

944

Contents 29

Creating a VLT LAG or a VLT VLAN......................................................................................................................

944

Associating the VLT LAG or VLT VLAN in a PVLAN...........................................................................................

945

Proxy ARP Capability on VLT Peer Nodes..................................................................................................................

946

Working of Proxy ARP for VLT Peer Nodes.........................................................................................................

946

VLT Nodes as Rendezvous Points for Multicast Resiliency......................................................................................

947

Configuring VLAN-Stack over VLT..............................................................................................................................

947

IPv6 Peer Routing in VLT Domains Overview.............................................................................................................

951

IPv6 Peer Routing....................................................................................................................................................

951

Synchronization of IPv6 ND Entries in a VLT Domain.........................................................................................

951

Synchronization of IPv6 ND Entries in a Non-VLT Domain................................................................................

952

Tunneling IPv6 ND in a VLT Domain......................................................................................................................

952

Sample Configuration of IPv6 Peer Routing in a VLT Domain...........................................................................

953

60 VLT Proxy Gateway..................................................................................................................................

957

Proxy Gateway in VLT Domains...................................................................................................................................

957

Guidelines for Enabling the VLT Proxy Gateway..................................................................................................

958

Enable VLT Proxy Gateway....................................................................................................................................

959

LLDP Organizational TLV for Proxy Gateway......................................................................................................

959

LLDP VLT Proxy Gateway in a Square VLT Topology..........................................................................................

961

Configuring a Static VLT Proxy Gateway...................................................................................................................

962

Configuring an LLDP VLT Proxy Gateway..................................................................................................................

962

VLT Proxy Gateway Sample Topology.........................................................................................................................

962

VLT Domain Configuration......................................................................................................................................

963

Dell-1 VLT Configuration..........................................................................................................................................

963

Dell-2 VLT Configuration.........................................................................................................................................

964

Dell-3 VLT Configuration.........................................................................................................................................

965

Dell-4 VLT Configuration........................................................................................................................................

966

61 Virtual Routing and Forwarding (VRF)......................................................................................................

967

VRF Overview................................................................................................................................................................

967

VRF Configuration Notes.............................................................................................................................................

968

DHCP.........................................................................................................................................................................

970

VRF Configuration.........................................................................................................................................................

970

Loading VRF CAM...................................................................................................................................................

970

Creating a Non-Default VRF Instance...................................................................................................................

970

Assigning an Interface to a VRF..............................................................................................................................

971

Assigning a Front-end Port to a Management VRF.............................................................................................

971

View VRF Instance Information..............................................................................................................................

971

Assigning an OSPF Process to a VRF Instance...................................................................................................

972

Configuring VRRP on a VRF Instance...................................................................................................................

972

Configuring Management VRF...............................................................................................................................

973

Configuring a Static Route......................................................................................................................................

973

Sample VRF Configuration............................................................................................................................................

974

Route Leaking VRFs......................................................................................................................................................

979

Dynamic Route Leaking................................................................................................................................................

980

Configuring Route Leaking without Filtering Criteria..........................................................................................

980

30 Contents

Loading...
+ 1010 hidden pages