Dell Networking S3100 User Manual

Dell Conguration Guide for the S3100 Series
9.11(2.1)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
2017 - 06
Rev. A00
Contents
1 About this Guide...........................................................................................................................................33
Audience............................................................................................................................................................................33
Conventions......................................................................................................................................................................33
Related Documents......................................................................................................................................................... 33
2 Conguration Fundamentals........................................................................................................................34
Accessing the Command Line........................................................................................................................................34
CLI Modes.........................................................................................................................................................................34
Navigating CLI Modes...............................................................................................................................................36
The do Command............................................................................................................................................................ 39
Undoing Commands........................................................................................................................................................ 39
Obtaining Help..................................................................................................................................................................40
Entering and Editing Commands................................................................................................................................... 40
Command History.............................................................................................................................................................41
Filtering show Command Outputs..................................................................................................................................41
Example of the grep Keyword...................................................................................................................................41
Multiple Users in Conguration Mode...........................................................................................................................42
3 Getting Started............................................................................................................................................44
Console Access................................................................................................................................................................45
Serial Console.............................................................................................................................................................45
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................46
Entering CLI commands Using an SSH Connection..............................................................................................46
Executing Local CLI Scripts Using an SSH Connection........................................................................................46
Default Conguration.......................................................................................................................................................47
Conguring a Host Name................................................................................................................................................47
Accessing the System Remotely....................................................................................................................................47
Accessing the System Remotely..............................................................................................................................47
Congure the Management Port IP Address.........................................................................................................48
Congure a Management Route..............................................................................................................................48
Conguring a Username and Password..................................................................................................................48
Conguring the Enable Password..................................................................................................................................49
Conguration File Management.....................................................................................................................................49
Copy Files to and from the System......................................................................................................................... 49
Mounting an NFS File System..................................................................................................................................50
Save the Running-Conguration..............................................................................................................................52
Congure the Overload Bit for a Startup Scenario............................................................................................... 52
Viewing Files...............................................................................................................................................................52
Compressing Conguration Files............................................................................................................................. 53
Managing the File System.............................................................................................................................................. 56
Enabling Software Features on Devices Using a Command Option......................................................................... 56
View Command History...................................................................................................................................................57
Contents
3
Upgrading Dell Networking OS.......................................................................................................................................57
Verify Software Images Before Installation...................................................................................................................57
Using HTTP for File Transfers........................................................................................................................................ 58
4 Management............................................................................................................................................... 60
Conguring Privilege Levels........................................................................................................................................... 60
Creating a Custom Privilege Level...........................................................................................................................60
Removing a Command from EXEC Mode...............................................................................................................61
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................ 61
Allowing Access to CONFIGURATION Mode Commands.....................................................................................61
Allowing Access to Dierent Modes........................................................................................................................ 61
Applying a Privilege Level to a Username............................................................................................................... 63
Applying a Privilege Level to a Terminal Line.......................................................................................................... 63
Conguring Logging........................................................................................................................................................ 63
Audit and Security Logs............................................................................................................................................64
Conguring Logging Format ...................................................................................................................................65
Display the Logging Buer and the Logging Conguration..................................................................................66
Setting Up a Secure Connection to a Syslog Server.............................................................................................66
Sending System Messages to a Syslog Server......................................................................................................68
Track Login Activity......................................................................................................................................................... 68
Restrictions for Tracking Login Activity...................................................................................................................68
Conguring Login Activity Tracking......................................................................................................................... 68
Display Login Statistics..............................................................................................................................................69
Limit Concurrent Login Sessions....................................................................................................................................70
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................70
Conguring Concurrent Session Limit.....................................................................................................................70
Enabling the System to Clear Existing Sessions.....................................................................................................71
Enabling Secured CLI Mode............................................................................................................................................72
Log Messages in the Internal Buer..............................................................................................................................72
Conguration Task List for System Log Management.......................................................................................... 72
Disabling System Logging............................................................................................................................................... 72
Sending System Messages to a Syslog Server............................................................................................................ 73
Conguring a UNIX System as a Syslog Server.....................................................................................................73
Changing System Logging Settings...............................................................................................................................73
Display the Logging Buer and the Logging Conguration........................................................................................ 74
Conguring a UNIX Logging Facility Level.................................................................................................................... 74
Synchronizing Log Messages......................................................................................................................................... 75
Enabling Timestamp on Syslog Messages.................................................................................................................... 76
File Transfer Services.......................................................................................................................................................76
Conguration Task List for File Transfer Services.................................................................................................. 77
Enabling the FTP Server........................................................................................................................................... 77
Conguring FTP Server Parameters........................................................................................................................77
Conguring FTP Client Parameters.........................................................................................................................78
Terminal Lines................................................................................................................................................................... 78
Denying and Permitting Access to a Terminal Line................................................................................................ 78
Conguring Login Authentication for Terminal Lines.............................................................................................79
Contents
4
Setting Timeout for EXEC Privilege Mode...................................................................................................................80
Using Telnet to get to Another Network Device...........................................................................................................81
Lock CONFIGURATION Mode........................................................................................................................................ 81
Viewing the Conguration Lock Status................................................................................................................... 81
5 802.1X..........................................................................................................................................................83
Port-Authentication Process..........................................................................................................................................85
EAP over RADIUS......................................................................................................................................................85
Conguring 802.1X...........................................................................................................................................................86
Related Conguration Tasks..................................................................................................................................... 86
Important Points to Remember......................................................................................................................................86
Enabling 802.1X.................................................................................................................................................................87
Conguring dot1x Prole ................................................................................................................................................88
Conguring MAC addresses for a do1x Prole.............................................................................................................89
Conguring the Static MAB and MAB Prole .............................................................................................................89
Conguring Critical VLAN ..............................................................................................................................................90
Conguring Request Identity Re-Transmissions............................................................................................................91
Conguring a Quiet Period after a Failed Authentication......................................................................................91
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 92
Re-Authenticating a Port................................................................................................................................................93
Conguring Timeouts......................................................................................................................................................94
Conguring Dynamic VLAN Assignment with Port Authentication.......................................................................... 95
Guest and Authentication-Fail VLANs.......................................................................................................................... 96
Conguring a Guest VLAN....................................................................................................................................... 96
Conguring an Authentication-Fail VLAN...............................................................................................................96
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)....................................98
Optimizing CAM Utilization During the Attachment of ACLs to VLANs...................................................................98
Guidelines for Conguring ACL VLAN Groups.............................................................................................................99
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters................................................99
Conguring ACL VLAN Groups................................................................................................................................99
Conguring FP Blocks for VLAN Parameters.......................................................................................................100
Viewing CAM Usage.......................................................................................................................................................101
Allocating FP Blocks for VLAN Processes.................................................................................................................. 102
7 Access Control Lists (ACLs)....................................................................................................................... 104
IP Access Control Lists (ACLs).....................................................................................................................................105
CAM Usage...............................................................................................................................................................106
Implementing ACLs on Dell Networking OS..........................................................................................................106
Important Points to Remember.................................................................................................................................... 108
Conguration Task List for Route Maps................................................................................................................ 108
Conguring Match Routes.......................................................................................................................................110
Conguring Set Conditions.......................................................................................................................................111
Congure a Route Map for Route Redistribution..................................................................................................112
Congure a Route Map for Route Tagging............................................................................................................ 113
Continue Clause........................................................................................................................................................ 113
Contents
5
IP Fragment Handling..................................................................................................................................................... 114
IP Fragments ACL Examples....................................................................................................................................114
Layer 4 ACL Rules Examples................................................................................................................................... 114
Congure a Standard IP ACL.........................................................................................................................................115
Conguring a Standard IP ACL Filter......................................................................................................................116
Congure an Extended IP ACL...................................................................................................................................... 117
Conguring Filters with a Sequence Number........................................................................................................117
Conguring Filters Without a Sequence Number................................................................................................. 118
Congure Layer 2 and Layer 3 ACLs............................................................................................................................ 119
Assign an IP ACL to an Interface..................................................................................................................................120
Applying an IP ACL.........................................................................................................................................................120
Counting ACL Hits.....................................................................................................................................................121
Congure Ingress ACLs..................................................................................................................................................121
Congure Egress ACLs...................................................................................................................................................121
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 122
IP Prex Lists.................................................................................................................................................................. 123
Implementation Information.................................................................................................................................... 123
Conguration Task List for Prex Lists.................................................................................................................. 123
ACL Resequencing......................................................................................................................................................... 127
Resequencing an ACL or Prex List.......................................................................................................................127
Route Maps.....................................................................................................................................................................129
Implementation Information.................................................................................................................................... 129
Logging of ACL Processes............................................................................................................................................ 129
Guidelines for Conguring ACL Logging................................................................................................................130
Conguring ACL Logging........................................................................................................................................ 130
Flow-Based Monitoring Support for ACLs...................................................................................................................131
Behavior of Flow-Based Monitoring....................................................................................................................... 131
Enabling Flow-Based Monitoring............................................................................................................................132
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 134
How BFD Works.............................................................................................................................................................134
BFD Packet Format..................................................................................................................................................135
BFD Sessions............................................................................................................................................................ 136
BFD Three-Way Handshake.................................................................................................................................... 137
Session State Changes............................................................................................................................................139
Important Points to Remember.................................................................................................................................... 139
Congure BFD................................................................................................................................................................ 139
Congure BFD for Physical Ports...........................................................................................................................140
Congure BFD for Static Routes.............................................................................................................................141
Congure BFD for OSPF.........................................................................................................................................144
Congure BFD for OSPFv3.....................................................................................................................................148
Congure BFD for IS-IS............................................................................................................................................151
Congure BFD for BGP...........................................................................................................................................153
Congure BFD for VRRP.........................................................................................................................................160
Conguring Protocol Liveness................................................................................................................................ 163
Troubleshooting BFD................................................................................................................................................163
Contents
6
9 Border Gateway Protocol IPv4 (BGPv4).................................................................................................... 165
Autonomous Systems (AS)...........................................................................................................................................165
Sessions and Peers.........................................................................................................................................................167
Establish a Session................................................................................................................................................... 167
Route Reectors.............................................................................................................................................................168
BGP Attributes................................................................................................................................................................169
Best Path Selection Criteria....................................................................................................................................169
Weight.........................................................................................................................................................................171
Local Preference........................................................................................................................................................171
Multi-Exit Discriminators (MEDs)...........................................................................................................................172
Origin..........................................................................................................................................................................173
AS Path...................................................................................................................................................................... 174
Next Hop....................................................................................................................................................................174
Multiprotocol BGP.......................................................................................................................................................... 174
Implement BGP with Dell Networking OS...................................................................................................................175
Additional Path (Add-Path) Support......................................................................................................................175
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ 175
Ignore Router-ID in Best-Path Calculation............................................................................................................ 176
Four-Byte AS Numbers............................................................................................................................................176
AS4 Number Representation.................................................................................................................................. 176
AS Number Migration...............................................................................................................................................178
BGP4 Management Information Base (MIB)........................................................................................................ 179
Important Points to Remember.............................................................................................................................. 179
Conguration Information..............................................................................................................................................180
BGP Conguration......................................................................................................................................................... 180
Enabling BGP.............................................................................................................................................................181
Conguring AS4 Number Representations........................................................................................................... 184
Conguring Peer Groups.........................................................................................................................................186
Conguring BGP Fast Fall-Over.............................................................................................................................188
Conguring Passive Peering...................................................................................................................................190
Maintaining Existing AS Numbers During an AS Migration.................................................................................190
Allowing an AS Number to Appear in its Own AS Path........................................................................................ 191
Enabling Graceful Restart........................................................................................................................................192
Enabling Neighbor Graceful Restart.......................................................................................................................193
Filtering on an AS-Path Attribute........................................................................................................................... 193
Regular Expressions as Filters.................................................................................................................................195
Redistributing Routes.............................................................................................................................................. 196
Enabling Additional Paths........................................................................................................................................ 197
Conguring IP Community Lists............................................................................................................................. 197
Conguring an IP Extended Community List........................................................................................................198
Filtering Routes with Community Lists..................................................................................................................199
Manipulating the COMMUNITY Attribute............................................................................................................200
Changing MED Attributes....................................................................................................................................... 201
Changing the LOCAL_PREFERENCE Attribute.................................................................................................. 201
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes............ 202
Contents
7
Changing the WEIGHT Attribute...........................................................................................................................203
Enabling Multipath...................................................................................................................................................203
Filtering BGP Routes...............................................................................................................................................203
Filtering BGP Routes Using Route Maps..............................................................................................................205
Filtering BGP Routes Using AS-PATH Information............................................................................................. 205
Conguring BGP Route Reectors....................................................................................................................... 206
Aggregating Routes................................................................................................................................................. 207
Conguring BGP Confederations...........................................................................................................................207
Enabling Route Flap Dampening............................................................................................................................208
Changing BGP Timers............................................................................................................................................. 210
Enabling BGP Neighbor Soft-Reconguration..................................................................................................... 210
Enabling or disabling BGP neighbors...................................................................................................................... 211
Route Map Continue................................................................................................................................................213
Enabling MBGP Congurations.................................................................................................................................... 213
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor..........................................214
BGP Regular Expression Optimization.........................................................................................................................214
Debugging BGP.............................................................................................................................................................. 214
Storing Last and Bad PDUs.....................................................................................................................................215
Capturing PDUs........................................................................................................................................................216
PDU Counters...........................................................................................................................................................217
Sample Congurations...................................................................................................................................................217
10 Content Addressable Memory (CAM).......................................................................................................224
CAM Allocation...............................................................................................................................................................224
Test CAM Usage............................................................................................................................................................226
View CAM-ACL Settings.............................................................................................................................................. 226
View CAM Usage...........................................................................................................................................................228
CAM Optimization......................................................................................................................................................... 228
Troubleshoot CAM Proling..........................................................................................................................................228
CAM Prole Mismatches........................................................................................................................................ 228
QoS CAM Region Limitation...................................................................................................................................229
11 Control Plane Policing (CoPP).................................................................................................................. 230
Congure Control Plane Policing.................................................................................................................................. 231
Conguring CoPP for Protocols............................................................................................................................ 232
Conguring CoPP for CPU Queues...................................................................................................................... 234
CoPP for OSPFv3 Packets.....................................................................................................................................235
Conguring CoPP for OSPFv3.............................................................................................................................. 238
Displaying CoPP Conguration .............................................................................................................................238
12 Dynamic Host Conguration Protocol (DHCP)..........................................................................................241
DHCP Packet Format and Options.............................................................................................................................. 241
Assign an IP Address using DHCP...............................................................................................................................243
Implementation Information..........................................................................................................................................244
Congure the System to be a DHCP Server..............................................................................................................244
Conguring the Server for Automatic Address Allocation..................................................................................245
Contents
8
Specifying a Default Gateway................................................................................................................................ 246
Congure a Method of Hostname Resolution......................................................................................................246
Using DNS for Address Resolution........................................................................................................................246
Using NetBIOS WINS for Address Resolution......................................................................................................247
Creating Manual Binding Entries............................................................................................................................247
Debugging the DHCP Server................................................................................................................................. 247
Using DHCP Clear Commands...............................................................................................................................248
Congure the System to be a Relay Agent................................................................................................................ 248
Congure the System to be a DHCP Client...............................................................................................................250
Conguring the DHCP Client System...................................................................................................................250
DHCP Client on a Management Interface.............................................................................................................251
DHCP Client Operation with Other Features....................................................................................................... 252
Congure the System for User Port Stacking (Option 230)....................................................................................253
Congure Secure DHCP...............................................................................................................................................253
Option 82..................................................................................................................................................................253
DHCP Snooping.......................................................................................................................................................254
Drop DHCP Packets on Snooped VLANs Only....................................................................................................257
Dynamic ARP Inspection........................................................................................................................................ 258
Conguring Dynamic ARP Inspection................................................................................................................... 259
Source Address Validation............................................................................................................................................260
Enabling IP Source Address Validation..................................................................................................................260
DHCP MAC Source Address Validation.................................................................................................................261
Enabling IP+MAC Source Address Validation....................................................................................................... 261
Viewing the Number of SAV Dropped Packets....................................................................................................262
Clearing the Number of SAV Dropped Packets................................................................................................... 262
13 Equal Cost Multi-Path (ECMP)................................................................................................................263
ECMP for Flow-Based Anity..................................................................................................................................... 263
Conguring the Hash Algorithm............................................................................................................................ 263
Enabling Deterministic ECMP Next Hop.............................................................................................................. 263
Conguring the Hash Algorithm Seed.................................................................................................................. 264
Link Bundle Monitoring................................................................................................................................................. 264
Managing ECMP Group Paths...............................................................................................................................265
Creating an ECMP Group Bundle..........................................................................................................................265
Modifying the ECMP Group Threshold................................................................................................................ 265
14 FIPS Cryptography...................................................................................................................................267
Conguration Tasks....................................................................................................................................................... 267
Preparing the System....................................................................................................................................................267
Enabling FIPS Mode...................................................................................................................................................... 268
Generating Host-Keys................................................................................................................................................... 268
Monitoring FIPS Mode Status......................................................................................................................................268
Disabling FIPS Mode..................................................................................................................................................... 269
15 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 270
Protocol Overview......................................................................................................................................................... 270
Contents
9
Ring Status................................................................................................................................................................271
Multiple FRRP Rings................................................................................................................................................ 271
Important FRRP Points........................................................................................................................................... 272
Important FRRP Concepts..................................................................................................................................... 273
Implementing FRRP....................................................................................................................................................... 274
FRRP Conguration.......................................................................................................................................................274
Creating the FRRP Group....................................................................................................................................... 274
Conguring the Control VLAN...............................................................................................................................275
Conguring and Adding the Member VLANs.......................................................................................................276
Setting the FRRP Timers........................................................................................................................................ 277
Clearing the FRRP Counters.................................................................................................................................. 277
Viewing the FRRP Conguration........................................................................................................................... 277
Viewing the FRRP Information...............................................................................................................................277
Troubleshooting FRRP...................................................................................................................................................278
Conguration Checks..............................................................................................................................................278
Sample Conguration and Topology............................................................................................................................ 278
16 GARP VLAN Registration Protocol (GVRP)..............................................................................................280
Important Points to Remember................................................................................................................................... 280
Congure GVRP............................................................................................................................................................. 281
Related Conguration Tasks....................................................................................................................................281
Enabling GVRP Globally................................................................................................................................................ 282
Enabling GVRP on a Layer 2 Interface........................................................................................................................282
Congure GVRP Registration.......................................................................................................................................282
Congure a GARP Timer.............................................................................................................................................. 283
RPM Redundancy..........................................................................................................................................................283
17 High Availability (HA)............................................................................................................................... 285
Component Redundancy..............................................................................................................................................285
Automatic and Manual Stack Unit Failover.......................................................................................................... 285
Synchronization between Management and Standby Units..............................................................................286
Forcing a Stack Unit Failover................................................................................................................................. 286
Disabling Auto-Reboot.............................................................................................................................................287
Manually Synchronizing Management and Standby Units..................................................................................287
Pre-Conguring a Stack Unit Slot................................................................................................................................287
Removing a Provisioned Logical Stack Unit............................................................................................................... 288
Hitless Behavior............................................................................................................................................................. 288
Graceful Restart.............................................................................................................................................................288
Software Resiliency....................................................................................................................................................... 289
Software Component Health Monitoring............................................................................................................. 289
System Health Monitoring......................................................................................................................................289
Failure and Event Logging.......................................................................................................................................289
Hot-Lock Behavior.........................................................................................................................................................290
18 Internet Group Management Protocol (IGMP)..........................................................................................291
IGMP Implementation Information............................................................................................................................... 291
10
Contents
IGMP Protocol Overview...............................................................................................................................................291
IGMP Version 2.........................................................................................................................................................291
IGMP Version 3........................................................................................................................................................293
Congure IGMP.............................................................................................................................................................296
Related Conguration Tasks...................................................................................................................................296
Viewing IGMP Enabled Interfaces............................................................................................................................... 297
Selecting an IGMP Version........................................................................................................................................... 297
Viewing IGMP Groups...................................................................................................................................................297
Adjusting Timers............................................................................................................................................................ 298
Adjusting Query and Response Timers.................................................................................................................298
Preventing a Host from Joining a Group.................................................................................................................... 299
Enabling IGMP Immediate-Leave.................................................................................................................................302
IGMP Snooping..............................................................................................................................................................302
IGMP Snooping Implementation Information....................................................................................................... 302
Conguring IGMP Snooping...................................................................................................................................302
Removing a Group-Port Association.....................................................................................................................303
Disabling Multicast Flooding...................................................................................................................................303
Specifying a Port as Connected to a Multicast Router...................................................................................... 304
Conguring the Switch as Querier........................................................................................................................304
Fast Convergence after MSTP Topology Changes...................................................................................................305
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................305
Protocol Separation.................................................................................................................................................305
Enabling and Disabling Management Egress Interface Selection......................................................................306
Handling of Management Route Conguration................................................................................................... 307
Handling of Switch-Initiated Trac....................................................................................................................... 308
Handling of Switch-Destined Trac......................................................................................................................308
Handling of Transit Trac (Trac Separation).................................................................................................... 309
Mapping of Management Applications and Trac Type.....................................................................................309
Behavior of Various Applications for Switch-Initiated Trac .............................................................................310
Behavior of Various Applications for Switch-Destined Trac ............................................................................ 311
Interworking of EIS With Various Applications......................................................................................................312
Designating a Multicast Router Interface....................................................................................................................312
19 Interfaces..................................................................................................................................................314
Basic Interface Conguration........................................................................................................................................314
Advanced Interface Conguration................................................................................................................................314
Interface Types............................................................................................................................................................... 315
Optional Modules............................................................................................................................................................315
View Basic Interface Information..................................................................................................................................316
Resetting an Interface to its Factory Default State....................................................................................................317
Enabling Energy Ecient Ethernet.............................................................................................................................. 318
View EEE Information.................................................................................................................................................... 318
Clear EEE Counters.......................................................................................................................................................322
Enabling a Physical Interface........................................................................................................................................323
Physical Interfaces.........................................................................................................................................................323
Conguration Task List for Physical Interfaces.................................................................................................... 324
Contents
11
Overview of Layer Modes.......................................................................................................................................324
Conguring Layer 2 (Data Link) Mode..................................................................................................................324
Conguring Layer 2 (Interface) Mode.................................................................................................................. 325
Conguring Layer 3 (Network) Mode...................................................................................................................325
Conguring Layer 3 (Interface) Mode.................................................................................................................. 326
Egress Interface Selection (EIS).................................................................................................................................. 326
Important Points to Remember............................................................................................................................. 326
Conguring EIS.........................................................................................................................................................327
Management Interfaces................................................................................................................................................327
Conguring Management Interfaces.....................................................................................................................327
Conguring a Management Interface on an Ethernet Port................................................................................329
VLAN Interfaces............................................................................................................................................................ 329
Loopback Interfaces...................................................................................................................................................... 330
Null Interfaces................................................................................................................................................................330
Port Channel Interfaces................................................................................................................................................330
Port Channel Denition and Standards..................................................................................................................331
Port Channel Benets..............................................................................................................................................331
Port Channel Implementation................................................................................................................................. 331
Interfaces in Port Channels.................................................................................................................................... 332
Conguration Tasks for Port Channel Interfaces.................................................................................................332
Creating a Port Channel..........................................................................................................................................332
Adding a Physical Interface to a Port Channel.....................................................................................................333
Reassigning an Interface to a New Port Channel................................................................................................ 334
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 335
Adding or Removing a Port Channel from a VLAN............................................................................................. 335
Assigning an IP Address to a Port Channel.......................................................................................................... 336
Deleting or Disabling a Port Channel..................................................................................................................... 337
Load Balancing Through Port Channels................................................................................................................ 337
Load-Balancing Method..........................................................................................................................................337
Changing the Hash Algorithm................................................................................................................................338
Bulk Conguration......................................................................................................................................................... 339
Interface Range........................................................................................................................................................339
Bulk Conguration Examples..................................................................................................................................339
Dening Interface Range Macros................................................................................................................................. 341
Dene the Interface Range.....................................................................................................................................341
Choosing an Interface-Range Macro..................................................................................................................... 341
Monitoring and Maintaining Interfaces........................................................................................................................342
Maintenance Using TDR.........................................................................................................................................343
Link Dampening..............................................................................................................................................................343
Important Points to Remember..............................................................................................................................343
Enabling Link Dampening........................................................................................................................................344
Link Bundle Monitoring................................................................................................................................................. 345
Using Ethernet Pause Frames for Flow Control........................................................................................................346
Enabling Pause Frames...........................................................................................................................................346
Congure the MTU Size on an Interface....................................................................................................................347
12
Contents
Port-Pipes.......................................................................................................................................................................348
Auto-Negotiation on Ethernet Interfaces...................................................................................................................348
Setting the Speed of Ethernet Interfaces............................................................................................................ 348
Set Auto-Negotiation Options............................................................................................................................... 350
Provisioning Combo Ports.............................................................................................................................................351
View Advanced Interface Information..........................................................................................................................351
Conguring the Interface Sampling Size.............................................................................................................. 352
Conguring the Trac Sampling Size Globally...........................................................................................................353
Dynamic Counters......................................................................................................................................................... 354
Clearing Interface Counters................................................................................................................................... 355
20 Internet Protocol Security (IPSec).......................................................................................................... 356
Conguring IPSec .........................................................................................................................................................356
21 IPv4 Routing............................................................................................................................................ 358
IP Addresses...................................................................................................................................................................359
Implementation Information....................................................................................................................................359
Conguration Tasks for IP Addresses......................................................................................................................... 359
Assigning IP Addresses to an Interface.......................................................................................................................359
Conguring Static Routes............................................................................................................................................ 360
Congure Static Routes for the Management Interface...........................................................................................361
IPv4 Path MTU Discovery Overview.......................................................................................................................... 362
Using the Congured Source IP Address in ICMP Messages..................................................................................362
Conguring the ICMP Source Interface............................................................................................................... 362
Conguring the Duration to Establish a TCP Connection........................................................................................ 363
Enabling Directed Broadcast........................................................................................................................................ 363
Resolution of Host Names............................................................................................................................................363
Enabling Dynamic Resolution of Host Names............................................................................................................364
Specifying the Local System Domain and a List of Domains................................................................................... 364
Conguring DNS with Traceroute............................................................................................................................... 365
ARP................................................................................................................................................................................. 365
Conguration Tasks for ARP........................................................................................................................................ 366
Conguring Static ARP Entries....................................................................................................................................366
Enabling Proxy ARP.......................................................................................................................................................366
Clearing ARP Cache...................................................................................................................................................... 367
ARP Learning via Gratuitous ARP................................................................................................................................367
Enabling ARP Learning via Gratuitous ARP................................................................................................................ 367
ARP Learning via ARP Request................................................................................................................................... 367
Conguring ARP Retries...............................................................................................................................................368
ICMP............................................................................................................................................................................... 369
Conguration Tasks for ICMP...................................................................................................................................... 369
Enabling ICMP Unreachable Messages......................................................................................................................369
UDP Helper.....................................................................................................................................................................369
Congure UDP Helper............................................................................................................................................ 369
Important Points to Remember..............................................................................................................................370
Enabling UDP Helper..................................................................................................................................................... 370
Contents
13
Conguring a Broadcast Address................................................................................................................................ 370
Congurations Using UDP Helper................................................................................................................................ 371
UDP Helper with Broadcast-All Addresses..................................................................................................................371
UDP Helper with Subnet Broadcast Addresses......................................................................................................... 372
UDP Helper with Congured Broadcast Addresses.................................................................................................. 372
UDP Helper with No Congured Broadcast Addresses............................................................................................373
Troubleshooting UDP Helper........................................................................................................................................ 373
22 IPv6 Routing............................................................................................................................................ 374
Protocol Overview......................................................................................................................................................... 374
Extended Address Space........................................................................................................................................375
Stateless Autoconguration....................................................................................................................................375
IPv6 Headers............................................................................................................................................................375
IPv6 Header Fields...................................................................................................................................................376
Extension Header Fields..........................................................................................................................................378
Addressing................................................................................................................................................................ 379
Implementing IPv6 with Dell Networking OS.............................................................................................................380
ICMPv6............................................................................................................................................................................381
Path MTU Discovery.....................................................................................................................................................382
IPv6 Neighbor Discovery.............................................................................................................................................. 382
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................383
Conguration Task List for IPv6 RDNSS.................................................................................................................... 383
Conguring the IPv6 Recursive DNS Server....................................................................................................... 383
Debugging IPv6 RDNSS Information Sent to the Host ..................................................................................... 384
Displaying IPv6 RDNSS Information......................................................................................................................385
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 385
Conguration Tasks for IPv6........................................................................................................................................ 386
Adjusting Your CAM-Prole....................................................................................................................................386
Assigning an IPv6 Address to an Interface........................................................................................................... 387
Assigning a Static IPv6 Route................................................................................................................................ 387
Conguring Telnet with IPv6..................................................................................................................................388
SNMP over IPv6......................................................................................................................................................388
Displaying IPv6 Information....................................................................................................................................388
Displaying an IPv6 Interface Information.............................................................................................................. 389
Showing IPv6 Routes..............................................................................................................................................389
Showing the Running-Conguration for an Interface..........................................................................................391
Clearing IPv6 Routes................................................................................................................................................391
Disabling ND Entry Timeout....................................................................................................................................391
Conguring IPv6 RA Guard.......................................................................................................................................... 392
Conguring IPv6 RA Guard on an Interface.........................................................................................................393
Monitoring IPv6 RA Guard......................................................................................................................................394
23 iSCSI Optimization.................................................................................................................................. 395
iSCSI Optimization Overview.......................................................................................................................................395
Monitoring iSCSI Trac Flows............................................................................................................................... 397
Application of Quality of Service to iSCSI Trac Flows......................................................................................397
14
Contents
Information Monitored in iSCSI Trac Flows....................................................................................................... 397
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 398
Conguring Detection and Ports for Dell Compellent Arrays............................................................................. 398
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................399
Enable and Disable iSCSI Optimization.................................................................................................................399
Default iSCSI Optimization Values...............................................................................................................................400
iSCSI Optimization Prerequisites................................................................................................................................. 400
Conguring iSCSI Optimization................................................................................................................................... 400
Displaying iSCSI Optimization Information..................................................................................................................402
24 Intermediate System to Intermediate System.......................................................................................... 404
IS-IS Protocol Overview............................................................................................................................................... 404
IS-IS Addressing.............................................................................................................................................................404
Multi-Topology IS-IS...................................................................................................................................................... 405
Transition Mode....................................................................................................................................................... 405
Interface Support.................................................................................................................................................... 406
Adjacencies...............................................................................................................................................................406
Graceful Restart............................................................................................................................................................ 406
Timers....................................................................................................................................................................... 406
Implementation Information......................................................................................................................................... 406
Conguration Information.............................................................................................................................................407
Conguration Tasks for IS-IS..................................................................................................................................408
Conguring the Distance of a Route......................................................................................................................415
Changing the IS-Type............................................................................................................................................... 416
Redistributing IPv4 Routes......................................................................................................................................418
Redistributing IPv6 Routes......................................................................................................................................419
Conguring Authentication Passwords.................................................................................................................420
Setting the Overload Bit.........................................................................................................................................420
Debugging IS-IS........................................................................................................................................................421
IS-IS Metric Styles.........................................................................................................................................................422
Congure Metric Values................................................................................................................................................422
Maximum Values in the Routing Table...................................................................................................................422
Change the IS-IS Metric Style in One Level Only................................................................................................422
Leaks from One Level to Another..........................................................................................................................424
Sample Congurations..................................................................................................................................................425
25 Link Aggregation Control Protocol (LACP)...............................................................................................427
Introduction to Dynamic LAGs and LACP...................................................................................................................427
Important Points to Remember..............................................................................................................................427
LACP Modes............................................................................................................................................................ 428
Conguring LACP Commands............................................................................................................................... 428
LACP Conguration Tasks............................................................................................................................................ 429
Creating a LAG.........................................................................................................................................................429
Conguring the LAG Interfaces as Dynamic........................................................................................................429
Setting the LACP Long Timeout............................................................................................................................430
Monitoring and Debugging LACP..........................................................................................................................430
Contents
15
Shared LAG State Tracking...........................................................................................................................................431
Conguring Shared LAG State Tracking................................................................................................................431
Important Points about Shared LAG State Tracking...........................................................................................433
LACP Basic Conguration Example.............................................................................................................................433
Congure a LAG on ALPHA................................................................................................................................... 433
26 Layer 2.....................................................................................................................................................442
Manage the MAC Address Table................................................................................................................................. 442
Clearing the MAC Address Table........................................................................................................................... 442
Setting the Aging Time for Dynamic Entries........................................................................................................442
Conguring a Static MAC Address........................................................................................................................443
Displaying the MAC Address Table........................................................................................................................443
MAC Learning Limit.......................................................................................................................................................443
Setting the MAC Learning Limit.............................................................................................................................444
mac learning-limit Dynamic.....................................................................................................................................444
mac learning-limit mac-address-sticky................................................................................................................. 444
mac learning-limit station-move............................................................................................................................ 445
mac learning-limit no-station-move...................................................................................................................... 445
Learning Limit Violation Actions.............................................................................................................................445
Setting Station Move Violation Actions................................................................................................................ 446
Recovering from Learning Limit and Station Move Violations........................................................................... 446
Disabling MAC Address Learning on the System.................................................................................................447
NIC Teaming................................................................................................................................................................... 447
Congure Redundant Pairs...........................................................................................................................................448
Important Points about Conguring Redundant Pairs........................................................................................450
Far-End Failure Detection..............................................................................................................................................451
FEFD State Changes...............................................................................................................................................452
Conguring FEFD.................................................................................................................................................... 453
Enabling FEFD on an Interface...............................................................................................................................453
Debugging FEFD......................................................................................................................................................454
27 Link Layer Discovery Protocol (LLDP)..................................................................................................... 456
802.1AB (LLDP) Overview............................................................................................................................................456
Protocol Data Units................................................................................................................................................. 456
Optional TLVs................................................................................................................................................................. 457
Management TLVs...................................................................................................................................................457
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 459
TIA Organizationally Specic TLVs........................................................................................................................ 459
Congure LLDP..............................................................................................................................................................463
Related Conguration Tasks...................................................................................................................................463
Important Points to Remember............................................................................................................................. 463
LLDP Compatibility..................................................................................................................................................464
CONFIGURATION versus INTERFACE Congurations............................................................................................ 464
Enabling LLDP................................................................................................................................................................464
Disabling and Undoing LLDP..................................................................................................................................465
Enabling LLDP on Management Ports........................................................................................................................465
16
Contents
Disabling and Undoing LLDP on Management Ports..........................................................................................465
Advertising TLVs............................................................................................................................................................465
Viewing the LLDP Conguration................................................................................................................................. 466
Viewing Information Advertised by Adjacent LLDP Agents......................................................................................467
Conguring LLDPDU Intervals.....................................................................................................................................468
Conguring Transmit and Receive Mode....................................................................................................................469
Conguring the Time to Live Value............................................................................................................................. 469
Debugging LLDP............................................................................................................................................................ 470
Relevant Management Objects.................................................................................................................................... 471
28 Microsoft Network Load Balancing.......................................................................................................... 476
NLB Unicast Mode Scenario........................................................................................................................................ 476
NLB Multicast Mode Scenario..................................................................................................................................... 476
Limitations of the NLB Feature.................................................................................................................................... 477
Microsoft Clustering......................................................................................................................................................477
Enable and Disable VLAN Flooding .............................................................................................................................477
Conguring a Switch for NLB ..................................................................................................................................... 477
Enabling a Switch for Multicast NLB.....................................................................................................................478
29 Multicast Source Discovery Protocol (MSDP)......................................................................................... 479
Protocol Overview......................................................................................................................................................... 479
Anycast RP.....................................................................................................................................................................480
Implementation Information.......................................................................................................................................... 481
Congure Multicast Source Discovery Protocol.........................................................................................................481
Related Conguration Tasks....................................................................................................................................481
Enable MSDP................................................................................................................................................................. 485
Manage the Source-Active Cache.............................................................................................................................. 486
Viewing the Source-Active Cache.........................................................................................................................486
Limiting the Source-Active Cache.........................................................................................................................486
Clearing the Source-Active Cache........................................................................................................................ 487
Enabling the Rejected Source-Active Cache........................................................................................................487
Accept Source-Active Messages that Fail the RFP Check......................................................................................487
Specifying Source-Active Messages...........................................................................................................................490
Limiting the Source-Active Messages from a Peer....................................................................................................491
Preventing MSDP from Caching a Local Source........................................................................................................491
Preventing MSDP from Caching a Remote Source.................................................................................................. 492
Preventing MSDP from Advertising a Local Source..................................................................................................492
Logging Changes in Peership States...........................................................................................................................493
Terminating a Peership..................................................................................................................................................493
Clearing Peer Statistics.................................................................................................................................................494
Debugging MSDP.......................................................................................................................................................... 494
MSDP with Anycast RP................................................................................................................................................495
Conguring Anycast RP................................................................................................................................................496
Reducing Source-Active Message Flooding.........................................................................................................497
Specifying the RP Address Used in SA Messages...............................................................................................497
MSDP Sample Congurations......................................................................................................................................499
Contents
17
30 Multiple Spanning Tree Protocol (MSTP)................................................................................................ 502
Protocol Overview.........................................................................................................................................................502
Spanning Tree Variations.............................................................................................................................................. 503
Implementation Information................................................................................................................................... 503
Congure Multiple Spanning Tree Protocol................................................................................................................503
Related Conguration Tasks...................................................................................................................................504
Enable Multiple Spanning Tree Globally...................................................................................................................... 504
Adding and Removing Interfaces.................................................................................................................................504
Creating Multiple Spanning Tree Instances................................................................................................................505
Inuencing MSTP Root Selection............................................................................................................................... 506
Interoperate with Non-Dell Bridges.............................................................................................................................506
Changing the Region Name or Revision..................................................................................................................... 507
Modifying Global Parameters....................................................................................................................................... 507
Modifying the Interface Parameters........................................................................................................................... 508
Conguring an EdgePort..............................................................................................................................................509
Flush MAC Addresses after a Topology Change........................................................................................................ 510
MSTP Sample Congurations.......................................................................................................................................510
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.........................................................................................511
Debugging and Verifying MSTP Congurations.........................................................................................................514
31 Multicast Features.................................................................................................................................... 516
Enabling IP Multicast......................................................................................................................................................516
Implementation Information.......................................................................................................................................... 516
Multicast Policies............................................................................................................................................................517
IPv4 Multicast Policies............................................................................................................................................. 517
Understanding Multicast Traceroute (mtrace).....................................................................................................524
Printing Multicast Traceroute (mtrace) Paths..................................................................................................... 525
Supported Error Codes...........................................................................................................................................526
mtrace Scenarios..................................................................................................................................................... 527
32 Object Tracking........................................................................................................................................533
Object Tracking Overview............................................................................................................................................ 533
Track Layer 2 Interfaces..........................................................................................................................................534
Track Layer 3 Interfaces..........................................................................................................................................534
Track IPv4 and IPv6 Routes...................................................................................................................................535
Set Tracking Delays................................................................................................................................................. 536
VRRP Object Tracking............................................................................................................................................ 536
Object Tracking Conguration..................................................................................................................................... 536
Tracking a Layer 2 Interface................................................................................................................................... 536
Tracking a Layer 3 Interface................................................................................................................................... 537
Track an IPv4/IPv6 Route......................................................................................................................................539
Displaying Tracked Objects...........................................................................................................................................542
33 Open Shortest Path First (OSPFv2 and OSPFv3)....................................................................................544
18
Contents
Protocol Overview.........................................................................................................................................................544
Autonomous System (AS) Areas........................................................................................................................... 544
Area Types................................................................................................................................................................ 545
Networks and Neighbors........................................................................................................................................546
Router Types............................................................................................................................................................ 546
Designated and Backup Designated Routers.......................................................................................................548
Link-State Advertisements (LSAs)........................................................................................................................548
Router Priority and Cost.........................................................................................................................................549
OSPF with Dell Networking OS...................................................................................................................................550
Graceful Restart....................................................................................................................................................... 551
Fast Convergence (OSPFv2, IPv4 Only)..............................................................................................................552
Multi-Process OSPFv2 with VRF..........................................................................................................................552
OSPF ACK Packing.................................................................................................................................................552
Setting OSPF Adjacency with Cisco Routers...................................................................................................... 552
Conguration Information.............................................................................................................................................553
Conguration Task List for OSPFv2 (OSPF for IPv4)........................................................................................ 553
Conguration Task List for OSPFv3 (OSPF for IPv6)...............................................................................................567
Enabling IPv6 Unicast Routing...............................................................................................................................568
Applying cost for OSPFv3......................................................................................................................................568
Assigning IPv6 Addresses on an Interface........................................................................................................... 569
Assigning Area ID on an Interface..........................................................................................................................569
Assigning OSPFv3 Process ID and Router ID Globally........................................................................................569
Assigning OSPFv3 Process ID and Router ID to a VRF......................................................................................570
Conguring Stub Areas...........................................................................................................................................570
Conguring Passive-Interface.................................................................................................................................571
Redistributing Routes...............................................................................................................................................571
Conguring a Default Route....................................................................................................................................571
Enabling OSPFv3 Graceful Restart....................................................................................................................... 572
OSPFv3 Authentication Using IPsec..................................................................................................................... 574
Troubleshooting OSPFv3........................................................................................................................................580
34 Policy-based Routing (PBR).................................................................................................................... 582
Overview.........................................................................................................................................................................582
Implementing PBR.........................................................................................................................................................583
Conguration Task List for Policy-based Routing......................................................................................................583
PBR Exceptions (Permit)....................................................................................................................................... 583
Create a Redirect List..............................................................................................................................................584
Create a Rule for a Redirect-list.............................................................................................................................584
Apply a Redirect-list to an Interface using a Redirect-group............................................................................. 586
Sample Conguration....................................................................................................................................................588
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View Redirect-List GOLD..... 589
35 PIM Sparse-Mode (PIM-SM).................................................................................................................. 592
Implementation Information..........................................................................................................................................592
Protocol Overview.........................................................................................................................................................592
Requesting Multicast Trac...................................................................................................................................592
Contents
19
Refuse Multicast Trac..........................................................................................................................................593
Send Multicast Trac............................................................................................................................................. 593
Conguring PIM-SM..................................................................................................................................................... 593
Related Conguration Tasks...................................................................................................................................594
Enable PIM-SM..............................................................................................................................................................594
Conguring S,G Expiry Timers..................................................................................................................................... 594
Conguring a Static Rendezvous Point......................................................................................................................595
Overriding Bootstrap Router Updates.................................................................................................................. 595
Conguring a Designated Router................................................................................................................................ 596
Creating Multicast Boundaries and Domains............................................................................................................. 596
36 PIM Source-Specic Mode (PIM-SSM).................................................................................................. 597
Implementation Information..........................................................................................................................................597
Important Points to Remember..............................................................................................................................597
Congure PIM-SSM......................................................................................................................................................598
Related Conguration Tasks...................................................................................................................................598
Enabling PIM-SSM........................................................................................................................................................ 598
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................598
Conguring PIM-SSM with IGMPv2.................................................................................................................... 599
Electing an RP using the BSR Mechanism.................................................................................................................600
Enabling RP to Server Specic Multicast Groups...............................................................................................600
37 Power over Ethernet (PoE)..................................................................................................................... 602
Conguring PoE or PoE+..............................................................................................................................................602
Enable PoE/PoE+....................................................................................................................................................603
Upgrading the PoE Controller................................................................................................................................ 603
Manage Ports using Power Priority and Power Budget...........................................................................................604
Determine the Power Priority................................................................................................................................ 604
Manage Inline Power...............................................................................................................................................605
Set the Threshold Limit for the PoE Power Budget........................................................................................... 605
Manage Power Priorities........................................................................................................................................ 606
Power Allocation to Ports.......................................................................................................................................606
Power Allocation to Additional Ports.....................................................................................................................607
Manage Legacy Devices...............................................................................................................................................607
Suspend Power Delivery on a Port..............................................................................................................................607
Restore Power Delivery on a Port............................................................................................................................... 608
Display the Power Details............................................................................................................................................. 608
38 Port Monitoring.......................................................................................................................................609
Important Points to Remember................................................................................................................................... 609
Port Monitoring.............................................................................................................................................................. 610
Conguring Port Monitoring......................................................................................................................................... 612
Conguring Monitor Multicast Queue......................................................................................................................... 613
Enabling Flow-Based Monitoring..................................................................................................................................614
Remote Port Mirroring...................................................................................................................................................615
Remote Port Mirroring Example............................................................................................................................. 615
20
Contents
Conguring Remote Port Mirroring........................................................................................................................616
Displaying Remote-Port Mirroring Congurations................................................................................................618
Conguring the Sample Remote Port Mirroring...................................................................................................618
Encapsulated Remote Port Monitoring....................................................................................................................... 621
ERPM Behavior on a typical Dell Networking OS .....................................................................................................623
Decapsulation of ERPM packets at the Destination IP/ Analyzer..................................................................... 623
Port Monitoring on VLT.................................................................................................................................................624
VLT Non-fail over Scenario.....................................................................................................................................624
VLT Fail-over Scenario............................................................................................................................................ 625
RPM over VLT Scenarios........................................................................................................................................625
39 Private VLANs (PVLAN).......................................................................................................................... 627
Private VLAN Concepts................................................................................................................................................627
Using the Private VLAN Commands...........................................................................................................................628
Conguration Task List..................................................................................................................................................629
Creating PVLAN ports............................................................................................................................................ 629
Creating a Primary VLAN....................................................................................................................................... 630
Creating a Community VLAN..................................................................................................................................631
Creating an Isolated VLAN...................................................................................................................................... 631
Private VLAN Conguration Example.........................................................................................................................633
Inspecting the Private VLAN Conguration............................................................................................................... 634
40 Per-VLAN Spanning Tree Plus (PVST+)................................................................................................... 636
Protocol Overview.........................................................................................................................................................636
Implementation Information..........................................................................................................................................637
Congure Per-VLAN Spanning Tree Plus....................................................................................................................637
Related Conguration Tasks................................................................................................................................... 637
Enabling PVST+..............................................................................................................................................................637
Disabling PVST+.............................................................................................................................................................638
Inuencing PVST+ Root Selection...............................................................................................................................638
Modifying Global PVST+ Parameters..........................................................................................................................640
Modifying Interface PVST+ Parameters......................................................................................................................641
Conguring an EdgePort.............................................................................................................................................. 642
PVST+ in Multi-Vendor Networks............................................................................................................................... 642
Enabling PVST+ Extend System ID............................................................................................................................. 642
PVST+ Sample Congurations.....................................................................................................................................643
41 Quality of Service (QoS).......................................................................................................................... 646
Implementation Information..........................................................................................................................................648
Port-Based QoS Congurations.................................................................................................................................. 648
Setting dot1p Priorities for Incoming Trac......................................................................................................... 648
Honoring dot1p Priorities on Ingress Trac..........................................................................................................649
Conguring Port-Based Rate Policing.................................................................................................................. 650
Conguring Port-Based Rate Shaping..................................................................................................................650
Policy-Based QoS Congurations................................................................................................................................ 651
Classify Trac...........................................................................................................................................................651
Contents
21
Create a QoS Policy................................................................................................................................................ 654
Create Policy Maps..................................................................................................................................................657
DSCP Color Maps......................................................................................................................................................... 660
Creating a DSCP Color Map...................................................................................................................................661
Displaying DSCP Color Maps................................................................................................................................. 662
Displaying a DSCP Color Policy Conguration .................................................................................................... 662
Enabling QoS Rate Adjustment....................................................................................................................................663
Enabling Strict-Priority Queueing................................................................................................................................663
Weighted Random Early Detection..............................................................................................................................663
Creating WRED Proles..........................................................................................................................................664
Applying a WRED Prole to Trac........................................................................................................................665
Displaying Default and Congured WRED Proles..............................................................................................665
Displaying WRED Drop Statistics...........................................................................................................................665
Displaying egress–queue Statistics.......................................................................................................................666
Pre-Calculating Available QoS CAM Space................................................................................................................666
Conguring Weights and ECN for WRED ..................................................................................................................667
Global Service Pools With WRED and ECN Settings..........................................................................................668
Conguring WRED and ECN Attributes..................................................................................................................... 669
Guidelines for Conguring ECN for Classifying and Color-Marking Packets.........................................................669
Sample conguration to mark non-ecn packets as “yellow” with Multiple trac class..................................670
Classifying Incoming Packets Using ECN and Color-Marking............................................................................670
Sample conguration to mark non-ecn packets as “yellow” with single trac class......................................672
Applying Layer 2 Match Criteria on a Layer 3 Interface............................................................................................673
Applying DSCP and VLAN Match Criteria on a Service Queue............................................................................... 674
Classifying Incoming Packets Using ECN and Color-Marking..................................................................................675
Guidelines for Conguring ECN for Classifying and Color-Marking Packets......................................................... 676
Sample conguration to mark non-ecn packets as “yellow” with Multiple trac class........................................ 677
Sample conguration to mark non-ecn packets as “yellow” with single trac class............................................ 677
42 Routing Information Protocol (RIP)......................................................................................................... 679
Protocol Overview......................................................................................................................................................... 679
RIPv1..........................................................................................................................................................................679
RIPv2.........................................................................................................................................................................679
Implementation Information......................................................................................................................................... 680
Conguration Information.............................................................................................................................................680
Conguration Task List............................................................................................................................................680
RIP Conguration Example.....................................................................................................................................686
43 Remote Monitoring (RMON)................................................................................................................... 692
Implementation Information..........................................................................................................................................692
Fault Recovery...............................................................................................................................................................692
Setting the RMON Alarm....................................................................................................................................... 693
Conguring an RMON Event................................................................................................................................. 693
Conguring RMON Collection Statistics.............................................................................................................. 694
Conguring the RMON Collection History...........................................................................................................694
22
Contents
44 Rapid Spanning Tree Protocol (RSTP)..................................................................................................... 696
Protocol Overview.........................................................................................................................................................696
Conguring Rapid Spanning Tree................................................................................................................................ 696
Related Conguration Tasks...................................................................................................................................696
Important Points to Remember................................................................................................................................... 696
RSTP and VLT.......................................................................................................................................................... 697
Conguring Interfaces for Layer 2 Mode....................................................................................................................697
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................698
Adding and Removing Interfaces................................................................................................................................. 700
Modifying Global Parameters....................................................................................................................................... 700
Enabling SNMP Traps for Root Elections and Topology Changes..................................................................... 702
Modifying Interface Parameters...................................................................................................................................702
Enabling SNMP Traps for Root Elections and Topology Changes........................................................................... 702
Inuencing RSTP Root Selection.................................................................................................................................702
Conguring an EdgePort.............................................................................................................................................. 703
Conguring Fast Hellos for Link State Detection.......................................................................................................704
45 Software-Dened Networking (SDN)......................................................................................................705
46 Security................................................................................................................................................... 706
AAA Accounting.............................................................................................................................................................706
Conguration Task List for AAA Accounting........................................................................................................ 706
AAA Authentication....................................................................................................................................................... 708
Conguration Task List for AAA Authentication.................................................................................................. 709
Obscuring Passwords and Keys....................................................................................................................................712
AAA Authorization.......................................................................................................................................................... 712
Privilege Levels Overview........................................................................................................................................712
Conguration Task List for Privilege Levels...........................................................................................................713
RADIUS............................................................................................................................................................................ 717
RADIUS Authentication............................................................................................................................................717
Conguration Task List for RADIUS....................................................................................................................... 718
TACACS+........................................................................................................................................................................ 722
Conguration Task List for TACACS+................................................................................................................... 722
TACACS+ Remote Authentication.........................................................................................................................723
Command Authorization......................................................................................................................................... 725
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 725
Enabling SCP and SSH..................................................................................................................................................725
Using SCP with SSH to Copy a Software Image.................................................................................................726
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................727
Conguring When to Re-generate an SSH Key ..................................................................................................727
Conguring the SSH Server Key Exchange Algorithm....................................................................................... 728
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 728
Conguring the SSH Server Cipher List...............................................................................................................729
Secure Shell Authentication................................................................................................................................... 729
Troubleshooting SSH............................................................................................................................................... 732
Contents
23
Telnet............................................................................................................................................................................... 732
VTY Line and Access-Class Conguration................................................................................................................. 732
VTY Line Local Authentication and Authorization............................................................................................... 733
VTY Line Remote Authentication and Authorization...........................................................................................733
VTY MAC-SA Filter Support...................................................................................................................................734
Role-Based Access Control..........................................................................................................................................734
Overview of RBAC...................................................................................................................................................735
User Roles.................................................................................................................................................................737
AAA Authentication and Authorization for Roles.................................................................................................740
Role Accounting....................................................................................................................................................... 743
Display Information About User Roles................................................................................................................... 743
Two Factor Authentication (2FA).................................................................................................................................745
Handling Access-Challenge Message....................................................................................................................745
Conguring Challenge Response Authentication for SSHv2............................................................................. 745
SMS-OTP Mechanism............................................................................................................................................ 746
Conguring the System to Drop Certain ICMP Reply Messages............................................................................ 746
47 Service Provider Bridging.........................................................................................................................748
VLAN Stacking............................................................................................................................................................... 748
Important Points to Remember..............................................................................................................................749
Congure VLAN Stacking.......................................................................................................................................749
Creating Access and Trunk Ports.......................................................................................................................... 750
Enable VLAN-Stacking for a VLAN........................................................................................................................751
Conguring the Protocol Type Value for the Outer VLAN Tag........................................................................... 751
Conguring Dell Networking OS Options for Trunk Ports................................................................................... 751
Debugging VLAN Stacking..................................................................................................................................... 752
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 753
VLAN Stacking Packet Drop Precedence...................................................................................................................757
Enabling Drop Eligibility............................................................................................................................................757
Honoring the Incoming DEI Value..........................................................................................................................758
Marking Egress Packets with a DEI Value............................................................................................................758
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................759
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................760
Layer 2 Protocol Tunneling............................................................................................................................................ 761
Implementation Information....................................................................................................................................762
Enabling Layer 2 Protocol Tunneling......................................................................................................................763
Specifying a Destination MAC Address for BPDUs.............................................................................................763
Setting Rate-Limit BPDUs......................................................................................................................................763
Debugging Layer 2 Protocol Tunneling..................................................................................................................764
Provider Backbone Bridging.........................................................................................................................................764
48 sFlow....................................................................................................................................................... 765
Overview.........................................................................................................................................................................765
Implementation Information..........................................................................................................................................765
Important Points to Remember..............................................................................................................................766
Enabling and Disabling sFlow on an Interface............................................................................................................ 766
24
Contents
Enabling sFlow Max-Header Size Extended...............................................................................................................766
sFlow Show Commands................................................................................................................................................767
Displaying Show sFlow Global................................................................................................................................768
Displaying Show sFlow on an Interface.................................................................................................................768
Displaying Show sFlow on a Stack-unit................................................................................................................ 769
Conguring Specify Collectors.....................................................................................................................................769
Changing the Polling Intervals......................................................................................................................................769
Back-O Mechanism.....................................................................................................................................................770
sFlow on LAG ports....................................................................................................................................................... 770
Enabling Extended sFlow..............................................................................................................................................770
Important Points to Remember...............................................................................................................................771
49 Simple Network Management Protocol (SNMP)......................................................................................772
Protocol Overview......................................................................................................................................................... 773
Implementation Information..........................................................................................................................................773
SNMPv3 Compliance With FIPS..................................................................................................................................773
Conguration Task List for SNMP................................................................................................................................774
Related Conguration Tasks....................................................................................................................................774
Important Points to Remember....................................................................................................................................775
Set up SNMP................................................................................................................................................................. 775
Creating a Community.............................................................................................................................................775
Setting Up User-Based Security (SNMPv3)........................................................................................................775
Reading Managed Object Values................................................................................................................................. 777
Writing Managed Object Values................................................................................................................................... 777
Conguring Contact and Location Information using SNMP...................................................................................778
Subscribing to Managed Object Value Updates using SNMP..................................................................................778
Enabling a Subset of SNMP Traps...............................................................................................................................779
Enabling an SNMP Agent to Notify Syslog Server Failure........................................................................................ 781
Copy Conguration Files Using SNMP........................................................................................................................782
Copying a Conguration File...................................................................................................................................783
Copying Conguration Files via SNMP................................................................................................................. 784
Copying the Startup-Cong Files to the Running-Cong.................................................................................. 785
Copying the Startup-Cong Files to the Server via FTP....................................................................................785
Copying the Startup-Cong Files to the Server via TFTP................................................................................. 785
Copy a Binary File to the Startup-Conguration................................................................................................. 786
Additional MIB Objects to View Copy Statistics..................................................................................................786
Obtaining a Value for MIB Objects.........................................................................................................................787
MIB Support for Power Monitoring............................................................................................................................. 787
MIB Support to Display the Available Memory Size on Flash...................................................................................788
Viewing the Available Flash Memory Size.............................................................................................................788
MIB Support to Display the Software Core Files Generated by the System..........................................................789
Viewing the Software Core Files Generated by the System..............................................................................789
SNMP Support for WRED Green/Yellow/Red Drop Counters................................................................................790
MIB Support to Display the Available Partitions on Flash..........................................................................................791
Viewing the Available Partitions on Flash.............................................................................................................. 791
MIB Support to Display Egress Queue Statistics.......................................................................................................792
Contents
25
MIB Support to Display Egress Queue Statistics.......................................................................................................792
Viewing the ECMP Group Count Information...................................................................................................... 792
MIB Support for entAliasMappingTable ..................................................................................................................... 795
Viewing the entAliasMappingTable MIB................................................................................................................795
MIB Support for LAG.................................................................................................................................................... 796
Viewing the LAG MIB.............................................................................................................................................. 797
Manage VLANs using SNMP....................................................................................................................................... 797
Creating a VLAN...................................................................................................................................................... 797
Assigning a VLAN Alias............................................................................................................................................797
Displaying the Ports in a VLAN.............................................................................................................................. 798
Add Tagged and Untagged Ports to a VLAN....................................................................................................... 799
Managing Overload on Startup....................................................................................................................................800
Enabling and Disabling a Port using SNMP................................................................................................................800
Fetch Dynamic MAC Entries using SNMP..................................................................................................................801
Deriving Interface Indices............................................................................................................................................. 802
Monitor Port-Channels................................................................................................................................................. 803
Enabling an SNMP Agent to Notify Syslog Server Failure.......................................................................................804
Troubleshooting SNMP Operation...............................................................................................................................805
Transceiver Monitoring................................................................................................................................................. 805
50 Stacking.................................................................................................................................................. 807
Stacking Overview.........................................................................................................................................................807
Cross Platform Stacking......................................................................................................................................... 807
Stack Management Roles.......................................................................................................................................808
Stack Master Election.............................................................................................................................................808
Virtual IP.................................................................................................................................................................... 812
Failover Roles............................................................................................................................................................812
MAC Addressing on Stacks.....................................................................................................................................812
Stacking LAG............................................................................................................................................................ 815
Supported Stacking Topologies.............................................................................................................................. 815
High Availability on Stacks.......................................................................................................................................816
Management Access on Stacks............................................................................................................................. 817
Important Points to Remember.................................................................................................................................... 818
Stacking Installation Tasks............................................................................................................................................. 818
Create a Stack.......................................................................................................................................................... 818
Add Units to an Existing Stack............................................................................................................................... 821
Split a Stack..............................................................................................................................................................823
Stacking Conguration Tasks....................................................................................................................................... 824
Assigning Unit Numbers to Units in an Stack.......................................................................................................824
Creating a Virtual Stack Unit on a Stack...............................................................................................................824
Displaying Information about a Stack....................................................................................................................825
Inuencing Management Unit Selection on a Stack........................................................................................... 828
Managing Redundancy on a Stack........................................................................................................................829
Resetting a Unit on a Stack....................................................................................................................................829
Verify a Stack Conguration........................................................................................................................................ 830
Displaying the Status of Stacking Ports............................................................................................................... 830
26
Contents
Removing a Unit from a Stack......................................................................................................................................831
Troubleshoot a Stack.....................................................................................................................................................833
Recover from Stack Link Flaps.............................................................................................................................. 833
Recover from a Card Problem State on a Stack..................................................................................................833
51 Storm Control.......................................................................................................................................... 835
Congure Storm Control...............................................................................................................................................835
Conguring Storm Control from INTERFACE Mode...........................................................................................835
Conguring Storm Control from CONFIGURATION Mode................................................................................836
52 Spanning Tree Protocol (STP)................................................................................................................. 837
Protocol Overview......................................................................................................................................................... 837
Congure Spanning Tree...............................................................................................................................................838
Related Conguration Tasks...................................................................................................................................838
Important Points to Remember................................................................................................................................... 838
Conguring Interfaces for Layer 2 Mode....................................................................................................................839
Enabling Spanning Tree Protocol Globally...................................................................................................................840
Adding an Interface to the Spanning Tree Group...................................................................................................... 842
Modifying Global Parameters....................................................................................................................................... 842
Modifying Interface STP Parameters..........................................................................................................................843
Enabling PortFast.......................................................................................................................................................... 843
Prevent Network Disruptions with BPDU Guard.................................................................................................844
Selecting STP Root.......................................................................................................................................................845
STP Root Guard.............................................................................................................................................................846
Root Guard Scenario...............................................................................................................................................846
Conguring Root Guard..........................................................................................................................................847
Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................848
Conguring Spanning Trees as Hitless........................................................................................................................848
STP Loop Guard.............................................................................................................................................................848
Conguring Loop Guard..........................................................................................................................................849
Displaying STP Guard Conguration...........................................................................................................................850
53 SupportAssist...........................................................................................................................................851
Conguring SupportAssist Using a Conguration Wizard........................................................................................ 852
Conguring SupportAssist Manually........................................................................................................................... 852
Conguring SupportAssist Activity............................................................................................................................. 854
Conguring SupportAssist Company..........................................................................................................................855
Conguring SupportAssist Person.............................................................................................................................. 856
Conguring SupportAssist Server...............................................................................................................................856
Viewing SupportAssist Conguration..........................................................................................................................857
54 System Time and Date.............................................................................................................................859
Network Time Protocol.................................................................................................................................................859
Protocol Overview...................................................................................................................................................860
Congure the Network Time Protocol..................................................................................................................860
Enabling NTP............................................................................................................................................................ 861
Contents
27
Conguring NTP Broadcasts..................................................................................................................................861
Disabling NTP on an Interface................................................................................................................................862
Conguring a Source IP Address for NTP Packets.............................................................................................862
Conguring NTP Authentication............................................................................................................................862
Dell Networking OS Time and Date.............................................................................................................................865
Conguration Task List .......................................................................................................................................... 865
Setting the Time and Date for the Switch Software Clock............................................................................... 865
Setting the Timezone..............................................................................................................................................865
Set Daylight Saving Time........................................................................................................................................866
Setting Daylight Saving Time Once.......................................................................................................................866
Setting Recurring Daylight Saving Time................................................................................................................867
Conguring a Custom-dened Period for NTP time Synchronization..............................................................868
55 Tunneling................................................................................................................................................. 869
Conguring a Tunnel......................................................................................................................................................869
Conguring Tunnel Keepalive Settings........................................................................................................................870
Conguring a Tunnel Interface..................................................................................................................................... 870
Conguring Tunnel Allow-Remote Decapsulation.......................................................................................................871
Conguring the Tunnel Source Anylocal...................................................................................................................... 871
56 Uplink Failure Detection (UFD)................................................................................................................ 873
Feature Description........................................................................................................................................................873
How Uplink Failure Detection Works............................................................................................................................874
UFD and NIC Teaming...................................................................................................................................................875
Important Points to Remember....................................................................................................................................875
Conguring Uplink Failure Detection........................................................................................................................... 876
Clearing a UFD-Disabled Interface...............................................................................................................................877
Displaying Uplink Failure Detection.............................................................................................................................. 878
Sample Conguration: Uplink Failure Detection.........................................................................................................880
57 Upgrade Procedures................................................................................................................................ 882
Get Help with Upgrades............................................................................................................................................... 882
58 Virtual LANs (VLANs)..............................................................................................................................883
Default VLAN................................................................................................................................................................. 884
Port-Based VLANs........................................................................................................................................................ 884
VLANs and Port Tagging.............................................................................................................................................. 885
Conguration Task List..................................................................................................................................................885
Creating a Port-Based VLAN.................................................................................................................................885
Assigning Interfaces to a VLAN............................................................................................................................. 886
Moving Untagged Interfaces.................................................................................................................................. 887
Assigning an IP Address to a VLAN.......................................................................................................................888
Conguring Native VLANs........................................................................................................................................... 888
Enabling Null VLAN as the Default VLAN...................................................................................................................889
59 Virtual Link Trunking (VLT)...................................................................................................................... 890
28
Contents
Overview........................................................................................................................................................................ 890
VLT Terminology.......................................................................................................................................................893
Layer-2 Trac in VLT Domains...............................................................................................................................894
Interspersed VLANs................................................................................................................................................ 895
VLT on Core Switches............................................................................................................................................ 895
Enhanced VLT.......................................................................................................................................................... 896
Congure Virtual Link Trunking.................................................................................................................................... 897
Important Points to Remember..............................................................................................................................897
Conguration Notes................................................................................................................................................ 898
Primary and Secondary VLT Peers.........................................................................................................................901
RSTP and VLT.......................................................................................................................................................... 901
VLT Bandwidth Monitoring.....................................................................................................................................902
VLT and Stacking.....................................................................................................................................................902
VLT and IGMP Snooping........................................................................................................................................ 902
VLT IPv6................................................................................................................................................................... 902
VLT Port Delayed Restoration................................................................................................................................903
PIM-Sparse Mode Support on VLT.......................................................................................................................903
VLT Routing .............................................................................................................................................................905
Non-VLT ARP Sync................................................................................................................................................. 908
RSTP Conguration...................................................................................................................................................... 909
Preventing Forwarding Loops in a VLT Domain................................................................................................... 909
Sample RSTP Conguration...................................................................................................................................909
Conguring VLT........................................................................................................................................................910
PVST+ Conguration.....................................................................................................................................................920
Sample PVST+ Conguration.................................................................................................................................920
Peer Routing Conguration Example...........................................................................................................................921
Dell-1 Switch Conguration.....................................................................................................................................922
Dell-2 Switch Conguration....................................................................................................................................926
R1 Conguration.......................................................................................................................................................929
Access Switch A1 Congurations and Verication.............................................................................................. 930
eVLT Conguration Example.........................................................................................................................................931
eVLT Conguration Step Examples........................................................................................................................931
PIM-Sparse Mode Conguration Example.................................................................................................................933
Verifying a VLT Conguration.......................................................................................................................................934
Additional VLT Sample Congurations........................................................................................................................ 937
Troubleshooting VLT......................................................................................................................................................939
Reconguring Stacked Switches as VLT....................................................................................................................940
Specifying VLT Nodes in a PVLAN..............................................................................................................................940
Association of VLTi as a Member of a PVLAN..................................................................................................... 941
MAC Synchronization for VLT Nodes in a PVLAN............................................................................................... 941
PVLAN Operations When One VLT Peer is Down...............................................................................................942
PVLAN Operations When a VLT Peer is Restarted.............................................................................................942
Interoperation of VLT Nodes in a PVLAN with ARP Requests..........................................................................942
Scenarios for VLAN Membership and MAC Synchronization With VLT Nodes in PVLAN............................ 942
Conguring a VLT VLAN or LAG in a PVLAN............................................................................................................ 944
Contents
29
Creating a VLT LAG or a VLT VLAN......................................................................................................................944
Associating the VLT LAG or VLT VLAN in a PVLAN...........................................................................................945
Proxy ARP Capability on VLT Peer Nodes..................................................................................................................946
Working of Proxy ARP for VLT Peer Nodes......................................................................................................... 946
VLT Nodes as Rendezvous Points for Multicast Resiliency......................................................................................947
Conguring VLAN-Stack over VLT..............................................................................................................................947
IPv6 Peer Routing in VLT Domains Overview.............................................................................................................951
IPv6 Peer Routing.................................................................................................................................................... 951
Synchronization of IPv6 ND Entries in a VLT Domain......................................................................................... 951
Synchronization of IPv6 ND Entries in a Non-VLT Domain................................................................................ 952
Tunneling IPv6 ND in a VLT Domain......................................................................................................................952
Sample Conguration of IPv6 Peer Routing in a VLT Domain........................................................................... 953
60 VLT Proxy Gateway..................................................................................................................................957
Proxy Gateway in VLT Domains................................................................................................................................... 957
Guidelines for Enabling the VLT Proxy Gateway..................................................................................................958
Enable VLT Proxy Gateway.................................................................................................................................... 959
LLDP Organizational TLV for Proxy Gateway...................................................................................................... 959
LLDP VLT Proxy Gateway in a Square VLT Topology.......................................................................................... 961
Conguring a Static VLT Proxy Gateway................................................................................................................... 962
Conguring an LLDP VLT Proxy Gateway.................................................................................................................. 962
VLT Proxy Gateway Sample Topology.........................................................................................................................962
VLT Domain Conguration......................................................................................................................................963
Dell-1 VLT Conguration..........................................................................................................................................963
Dell-2 VLT Conguration.........................................................................................................................................964
Dell-3 VLT Conguration.........................................................................................................................................965
Dell-4 VLT Conguration........................................................................................................................................ 966
61 Virtual Routing and Forwarding (VRF)......................................................................................................967
VRF Overview................................................................................................................................................................ 967
VRF Conguration Notes............................................................................................................................................. 968
DHCP.........................................................................................................................................................................970
VRF Conguration......................................................................................................................................................... 970
Loading VRF CAM................................................................................................................................................... 970
Creating a Non-Default VRF Instance...................................................................................................................970
Assigning an Interface to a VRF..............................................................................................................................971
Assigning a Front-end Port to a Management VRF............................................................................................. 971
View VRF Instance Information.............................................................................................................................. 971
Assigning an OSPF Process to a VRF Instance...................................................................................................972
Conguring VRRP on a VRF Instance...................................................................................................................972
Conguring Management VRF...............................................................................................................................973
Conguring a Static Route......................................................................................................................................973
Sample VRF Conguration............................................................................................................................................974
Route Leaking VRFs......................................................................................................................................................979
Dynamic Route Leaking................................................................................................................................................ 980
Conguring Route Leaking without Filtering Criteria..........................................................................................980
30
Contents
Loading...
+ 1010 hidden pages