Dell PowerSwitch S4048T-ON Manual

0 (0)
Dell PowerSwitch S4048T-ON Manual

Dell EMC Configuration Guide for the S4048T–ON System

9.14.2.4

Notes, cautions, and warnings

NOTE: A NOTE indicates important information that helps you make better use of your product.

CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.

WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

© 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.

2019 - 11

Rev. A00

Contents

1 About this Guide.........................................................................................................................

33

Audience...............................................................................................................................................................................

33

Conventions.........................................................................................................................................................................

33

Related Documents.............................................................................................................................................................

33

2 Configuration Fundamentals.......................................................................................................

34

Accessing the Command Line............................................................................................................................................

34

CLI Modes............................................................................................................................................................................

34

Navigating CLI Modes...................................................................................................................................................

36

The do Command................................................................................................................................................................

38

Undoing Commands............................................................................................................................................................

39

Obtaining Help.....................................................................................................................................................................

39

Entering and Editing Commands.......................................................................................................................................

39

Command History................................................................................................................................................................

40

Filtering show Command Outputs....................................................................................................................................

40

Multiple Users in Configuration Mode...............................................................................................................................

41

3 Getting Started..........................................................................................................................

42

Console Access....................................................................................................................................................................

42

Serial Console.................................................................................................................................................................

42

Accessing the CLI Interface and Running Scripts Using SSH.......................................................................................

43

Default Configuration..........................................................................................................................................................

44

Configuring a Host Name...................................................................................................................................................

44

Accessing the System Remotely.......................................................................................................................................

44

Configure the Management Port IP Address.............................................................................................................

44

Configure a Management Route.................................................................................................................................

45

Configuring a Username and Password.....................................................................................................................

45

Configuring the Enable Password.....................................................................................................................................

46

Configuration File Management........................................................................................................................................

46

Copy Files to and from the System.............................................................................................................................

46

Mounting an NFS File System......................................................................................................................................

47

Save the Running-Configuration.................................................................................................................................

48

Configure the Overload Bit for a Startup Scenario...................................................................................................

49

Viewing Files...................................................................................................................................................................

49

Compressing Configuration Files.................................................................................................................................

50

Managing the File System..................................................................................................................................................

52

Enabling Software Features on Devices Using a Command Option.............................................................................

52

View Command History......................................................................................................................................................

53

Upgrading Dell EMC Networking OS................................................................................................................................

54

Verify Software Images Before Installation......................................................................................................................

54

Using HTTP for File Transfers...........................................................................................................................................

55

4 Management..............................................................................................................................

57

Configuring Privilege Levels...............................................................................................................................................

57

Contents 3

Removing a Command from EXEC Mode..................................................................................................................

58

Moving a Command from EXEC Privilege Mode to EXEC Mode...........................................................................

58

Allowing Access to CONFIGURATION Mode Commands.......................................................................................

58

Allowing Access to Different Modes...........................................................................................................................

58

Applying a Privilege Level to a Username...................................................................................................................

60

Applying a Privilege Level to a Terminal Line.............................................................................................................

60

Configuring Logging............................................................................................................................................................

60

Audit and Security Logs................................................................................................................................................

60

Configuring Logging Format ................................................................................................................................

62

Display the Logging Buffer and the Logging Configuration.....................................................................................

62

Setting Up a Secure Connection to a Syslog Server.......................................................................................

63

Sending System Messages to a Syslog Server..........................................................................................................

64

Track Login Activity............................................................................................................................................................

64

Restrictions for Tracking Login Activity......................................................................................................................

64

Configuring Login Activity Tracking............................................................................................................................

64

Display Login Statistics.................................................................................................................................................

65

Limit Concurrent Login Sessions.......................................................................................................................................

66

Restrictions for Limiting the Number of Concurrent Sessions................................................................................

66

Configuring Concurrent Session Limit........................................................................................................................

66

Enabling the System to Clear Existing Sessions........................................................................................................

67

Enabling Secured CLI Mode...............................................................................................................................................

67

Log Messages in the Internal Buffer.................................................................................................................................

68

Disabling System Logging...................................................................................................................................................

68

Sending System Messages to a Syslog Server...............................................................................................................

68

Configuring a UNIX System as a Syslog Server........................................................................................................

68

Changing System Logging Settings..................................................................................................................................

69

Display the Logging Buffer and the Logging Configuration...........................................................................................

69

Configuring a UNIX Logging Facility Level.......................................................................................................................

70

Synchronizing Log Messages.............................................................................................................................................

71

Enabling Timestamp on Syslog Messages.........................................................................................................................

71

File Transfer Services..........................................................................................................................................................

74

Enabling the FTP Server...............................................................................................................................................

74

Configuring FTP Server Parameters...........................................................................................................................

74

Configuring FTP Client Parameters............................................................................................................................

75

Terminal Lines......................................................................................................................................................................

75

Denying and Permitting Access to a Terminal Line...................................................................................................

75

Configuring Login Authentication for Terminal Lines................................................................................................

76

Setting Timeout for EXEC Privilege Mode.......................................................................................................................

77

Using Telnet to get to Another Network Device.............................................................................................................

78

Lock CONFIGURATION Mode...........................................................................................................................................

78

LPC Bus Quality Degradation.............................................................................................................................................

79

Restoring the Factory Default Settings............................................................................................................................

79

Restoring Factory Default Environment Variables....................................................................................................

80

Viewing the Reason for Last System Reboot...................................................................................................................

81

5 802.1X.......................................................................................................................................

82

Port-Authentication Process.............................................................................................................................................

83

EAP over RADIUS..........................................................................................................................................................

84

Configuring 802.1X..............................................................................................................................................................

84

Important Points to Remember.........................................................................................................................................

85

4 Contents

Enabling 802.1X...................................................................................................................................................................

85

Configuring Request Identity Re-Transmissions.............................................................................................................

86

Configuring a Quiet Period after a Failed Authentication.........................................................................................

87

Forcibly Authorizing or Unauthorizing a Port...................................................................................................................

88

Re-Authenticating a Port...................................................................................................................................................

88

Configuring Timeouts..........................................................................................................................................................

89

Configuring Dynamic VLAN Assignment with Port Authentication..............................................................................

90

Guest and Authentication-Fail VLANs...............................................................................................................................

91

Configuring a Guest VLAN............................................................................................................................................

91

Configuring an Authentication-Fail VLAN...................................................................................................................

91

6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)..........................

93

Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................................................

93

Guidelines for Configuring ACL VLAN Groups................................................................................................................

93

Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters...................................................

94

Configuring ACL VLAN Groups...................................................................................................................................

94

Configuring FP Blocks for VLAN Parameters............................................................................................................

95

Viewing CAM Usage...........................................................................................................................................................

95

Allocating FP Blocks for VLAN Processes.......................................................................................................................

97

Unified Forwarding Table (UFT) Modes...........................................................................................................................

97

Configuring UFT Modes................................................................................................................................................

97

7 Access Control Lists (ACLs)........................................................................................................

98

IP Access Control Lists (ACLs).........................................................................................................................................

99

CAM Usage....................................................................................................................................................................

99

Implementing ACLs on Dell EMC Networking OS...................................................................................................

100

Important Points to Remember........................................................................................................................................

101

Configuration Task List for Route Maps....................................................................................................................

101

Configuring Match Routes..........................................................................................................................................

103

Configuring Set Conditions.........................................................................................................................................

104

Configure a Route Map for Route Redistribution....................................................................................................

105

Configure a Route Map for Route Tagging..............................................................................................................

106

Continue Clause...........................................................................................................................................................

106

IP Fragment Handling........................................................................................................................................................

106

IP Fragments ACL Examples......................................................................................................................................

106

Layer 4 ACL Rules Examples......................................................................................................................................

107

Configure a Standard IP ACL...........................................................................................................................................

108

Configuring a Standard IP ACL Filter........................................................................................................................

108

Configure an Extended IP ACL........................................................................................................................................

109

Configuring Filters with a Sequence Number...........................................................................................................

109

Configuring Filters Without a Sequence Number.....................................................................................................

110

Configure Layer 2 and Layer 3 ACLs................................................................................................................................

111

Assign an IP ACL to an Interface.......................................................................................................................................

111

Applying an IP ACL.............................................................................................................................................................

112

Counting ACL Hits........................................................................................................................................................

112

Configure Ingress ACLs.....................................................................................................................................................

112

Configure Egress ACLs......................................................................................................................................................

113

Applying Egress Layer 3 ACLs (Control-Plane)........................................................................................................

114

IP Prefix Lists.......................................................................................................................................................................

114

Contents 5

Configuration Task List for Prefix Lists......................................................................................................................

115

ACL Remarks.......................................................................................................................................................................

118

Configuring a Remark...................................................................................................................................................

118

Deleting a Remark.........................................................................................................................................................

118

ACL Resequencing.............................................................................................................................................................

119

Resequencing an ACL or Prefix List...........................................................................................................................

119

Route Maps........................................................................................................................................................................

120

Logging of ACL Processes................................................................................................................................................

121

Guidelines for Configuring ACL Logging....................................................................................................................

121

Configuring ACL Logging............................................................................................................................................

122

Flow-Based Monitoring.....................................................................................................................................................

122

Enabling Flow-Based Monitoring................................................................................................................................

124

Configuring UDF ACL........................................................................................................................................................

124

Configuring IP Mirror Access Group................................................................................................................................

127

Sample Configuration...................................................................................................................................................

127

Example of viewing IP mirror–access–group applied to an Interface...................................................................

127

8 Bidirectional Forwarding Detection (BFD)...................................................................................

129

How BFD Works.................................................................................................................................................................

129

BFD Packet Format.....................................................................................................................................................

130

BFD Sessions.................................................................................................................................................................

131

BFD Three-Way Handshake.......................................................................................................................................

132

Session State Changes................................................................................................................................................

133

Important Points to Remember........................................................................................................................................

133

Configure BFD....................................................................................................................................................................

133

Configure BFD for Physical Ports..............................................................................................................................

134

Configure BFD for Static Routes...............................................................................................................................

135

Configure BFD for IPv6 Static Routes......................................................................................................................

138

Configure BFD for OSPF............................................................................................................................................

140

Configure BFD for OSPFv3........................................................................................................................................

145

Configure BFD for IS-IS...............................................................................................................................................

147

Configure BFD for BGP...............................................................................................................................................

149

Configure BFD for VRRP............................................................................................................................................

156

Configuring Protocol Liveness....................................................................................................................................

158

9 Border Gateway Protocol (BGP)................................................................................................

159

BGP IP version 4 (BGPv4) Overview.............................................................................................................................

159

BGP Autonomous Systems........................................................................................................................................

159

AS4 Number Representation.......................................................................................................................................

161

Four-Byte AS Numbers...............................................................................................................................................

163

BGP router ID...............................................................................................................................................................

163

Sessions and Peers......................................................................................................................................................

163

Establish a Session.......................................................................................................................................................

163

BGP Attributes for selecting Best Path....................................................................................................................

164

Multiprotocol BGP.......................................................................................................................................................

169

BGP global and address family configuration...........................................................................................................

170

Implement BGP with Dell EMC Networking OS.......................................................................................................

171

Configuration Information...........................................................................................................................................

174

Basic BGP configuration tasks.........................................................................................................................................

174

6 Contents

Prerequisite for configuring a BGP network.............................................................................................................

174

Restrictions...................................................................................................................................................................

174

Enabling BGP................................................................................................................................................................

174

Enabling four-byte autonomous system numbers...................................................................................................

176

Changing a BGP router ID...........................................................................................................................................

177

Configuring AS4 Number Representations...............................................................................................................

177

Configuring a BGP peer...............................................................................................................................................

178

Example-Configuring BGP routing between peers..................................................................................................

179

BGP peer group............................................................................................................................................................

180

Advanced BGP configuration tasks.................................................................................................................................

187

Route-refresh and Soft-reconfiguration...................................................................................................................

187

Aggregating Routes.....................................................................................................................................................

189

Filtering BGP..................................................................................................................................................................

191

Configuring BGP Fast Fall-Over.................................................................................................................................

196

Configuring Passive Peering.......................................................................................................................................

197

Enabling Graceful Restart...........................................................................................................................................

198

Redistributing Routes..................................................................................................................................................

199

Redistributing iBGP Routes into IGP.........................................................................................................................

199

Enabling Additional Paths...........................................................................................................................................

202

Configuring IP Community Lists................................................................................................................................

202

Configuring an IP Extended Community List...........................................................................................................

203

Configure BGP attributes...........................................................................................................................................

204

Enabling Multipath.......................................................................................................................................................

207

Route Reflectors.........................................................................................................................................................

208

Enabling Route Flap Dampening................................................................................................................................

209

Changing BGP keepalive and hold timers..................................................................................................................

211

Setting the extended timer.........................................................................................................................................

212

Enabling or disabling BGP neighbors.........................................................................................................................

212

Route Map Continue....................................................................................................................................................

213

Configuring BGP Confederations...............................................................................................................................

214

Configuring a BGP VRF address family.....................................................................................................................

214

Maintaining Existing AS Numbers During an AS Migration.....................................................................................

215

Allowing an AS Number to Appear in its Own AS Path...........................................................................................

216

Enabling MBGP Configurations..................................................................................................................................

217

MBGP support for IPv6...............................................................................................................................................

217

Configuring IPv6 MBGP between peers...................................................................................................................

217

Example-Configuring IPv4 and IPv6 neighbors........................................................................................................

218

Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor............................................

220

BGP Regular Expression Optimization......................................................................................................................

222

Debugging BGP...........................................................................................................................................................

222

10 Content Addressable Memory (CAM)........................................................................................

224

CAM Allocation..................................................................................................................................................................

224

Test CAM Usage...............................................................................................................................................................

225

View CAM-ACL Settings..................................................................................................................................................

226

View CAM Usage...............................................................................................................................................................

227

Configuring CAM Threshold and Silence Period...........................................................................................................

228

CAM Optimization.............................................................................................................................................................

229

Troubleshoot CAM Profiling.............................................................................................................................................

229

QoS CAM Region Limitation......................................................................................................................................

229

Contents 7

11 Control Plane Policing (CoPP)..................................................................................................

230

Configure Control Plane Policing.....................................................................................................................................

231

Configuring CoPP for Protocols................................................................................................................................

232

Configuring CoPP for CPU Queues..........................................................................................................................

233

CoPP for OSPFv3 Packets........................................................................................................................................

234

Configuring CoPP for OSPFv3..................................................................................................................................

236

Displaying CoPP Configuration .................................................................................................................................

237

12 Data Center Bridging (DCB).....................................................................................................

239

Ethernet Enhancements in Data Center Bridging.........................................................................................................

239

Priority-Based Flow Control.......................................................................................................................................

240

Enhanced Transmission Selection..............................................................................................................................

241

Data Center Bridging Exchange Protocol (DCBx)..................................................................................................

242

Data Center Bridging in a Traffic Flow.....................................................................................................................

242

Enabling Data Center Bridging.........................................................................................................................................

242

DCB Maps and its Attributes.....................................................................................................................................

243

Data Center Bridging: Default Configuration.................................................................................................................

243

Configuring Priority-Based Flow Control.......................................................................................................................

244

Configuring Lossless Queues.....................................................................................................................................

244

Configuring PFC in a DCB Map.......................................................................................................................................

246

Applying a DCB Map on a Port........................................................................................................................................

247

Configuring PFC without a DCB Map.............................................................................................................................

247

Priority-Based Flow Control Using Dynamic Buffer Method.......................................................................................

249

Behavior of Tagged Packets............................................................................................................................................

249

Configuration Example for DSCP and PFC Priorities...................................................................................................

250

Using PFC to Manage Converged Ethernet Traffic......................................................................................................

251

Configure Enhanced Transmission Selection.................................................................................................................

251

ETS Prerequisites and Restrictions...........................................................................................................................

251

Creating an ETS Priority Group..................................................................................................................................

251

ETS Operation with DCBx..........................................................................................................................................

252

Configuring Bandwidth Allocation for DCBx CIN....................................................................................................

253

Configuring ETS in a DCB Map.................................................................................................................................

253

Hierarchical Scheduling in ETS Output Policies............................................................................................................

254

Using ETS to Manage Converged Ethernet Traffic.....................................................................................................

255

Applying DCB Policies in a Switch Stack.......................................................................................................................

255

Configure a DCBx Operation...........................................................................................................................................

255

DCBx Operation...........................................................................................................................................................

255

DCBx Port Roles..........................................................................................................................................................

255

DCB Configuration Exchange....................................................................................................................................

257

Configuration Source Election...................................................................................................................................

257

Propagation of DCB Information...............................................................................................................................

257

Auto-Detection and Manual Configuration of the DCBx Version.........................................................................

258

DCBx Example.............................................................................................................................................................

258

DCBx Prerequisites and Restrictions........................................................................................................................

259

Configuring DCBx........................................................................................................................................................

259

Verifying the DCB Configuration.....................................................................................................................................

262

QoS dot1p Traffic Classification and Queue Assignment.............................................................................................

270

Configuring the Dynamic Buffer Method........................................................................................................................

271

8 Contents

Sample DCB Configuration..............................................................................................................................................

272

13 Dynamic Host Configuration Protocol (DHCP)...........................................................................

275

DHCP Packet Format and Options.................................................................................................................................

275

Assign an IP Address using DHCP...................................................................................................................................

276

Implementation Information.............................................................................................................................................

277

Configure the System to be a DHCP Server.................................................................................................................

278

Configuring the Server for Automatic Address Allocation.....................................................................................

278

Specifying a Default Gateway....................................................................................................................................

279

Configure a Method of Hostname Resolution.........................................................................................................

279

Using DNS for Address Resolution............................................................................................................................

279

Using NetBIOS WINS for Address Resolution.........................................................................................................

280

Creating Manual Binding Entries...............................................................................................................................

280

Debugging the DHCP Server.....................................................................................................................................

280

Using DHCP Clear Commands..................................................................................................................................

280

Configure the System to be a Relay Agent....................................................................................................................

281

Configure the System to be a DHCP Client..................................................................................................................

282

Configuring the DHCP Client System.......................................................................................................................

282

DHCP Client on a Management Interface................................................................................................................

283

DHCP Client Operation with Other Features..........................................................................................................

284

DHCP Relay When DHCP Server and Client are in Different VRFs...........................................................................

285

Configuring Route Leaking between VRFs on DHCP Relay Agent......................................................................

285

Non-default VRF configuration for DHCPv6 helper address......................................................................................

286

Configuring DHCP relay source interface......................................................................................................................

286

Global DHCP relay source IPv4 or IPv6 configuration ..........................................................................................

286

Interface level DHCP relay source IPv4 or IPv6 configuration .............................................................................

287

Configure the System for User Port Stacking (Option 230)......................................................................................

288

Configure Secure DHCP..................................................................................................................................................

288

Option 82 (DHCPv4 relay options)...........................................................................................................................

288

DHCPv6 relay agent options.....................................................................................................................................

289

DHCP Snooping...........................................................................................................................................................

289

Drop DHCP Packets on Snooped VLANs Only.......................................................................................................

293

Dynamic ARP Inspection............................................................................................................................................

294

Configuring Dynamic ARP Inspection.......................................................................................................................

294

Source Address Validation...............................................................................................................................................

295

Enabling IP Source Address Validation.....................................................................................................................

295

DHCP MAC Source Address Validation...................................................................................................................

296

Enabling IP+MAC Source Address Validation..........................................................................................................

296

Viewing the Number of SAV Dropped Packets.......................................................................................................

297

Clearing the Number of SAV Dropped Packets......................................................................................................

297

14 Equal Cost Multi-Path (ECMP).................................................................................................

298

ECMP for Flow-Based Affinity........................................................................................................................................

298

Configuring the Hash Algorithm................................................................................................................................

298

Enabling Deterministic ECMP Next Hop..................................................................................................................

298

Configuring the Hash Algorithm Seed......................................................................................................................

298

Link Bundle Monitoring.....................................................................................................................................................

299

Managing ECMP Group Paths..................................................................................................................................

299

Creating an ECMP Group Bundle.............................................................................................................................

300

Contents 9

Modifying the ECMP Group Threshold....................................................................................................................

300

RTAG7.................................................................................................................................................................................

301

Flow-based Hashing for ECMP.......................................................................................................................................

302

15 FIP Snooping..........................................................................................................................

305

Fibre Channel over Ethernet...........................................................................................................................................

305

Ensure Robustness in a Converged Ethernet Network...............................................................................................

305

FIP Snooping on Ethernet Bridges..................................................................................................................................

306

FIP Snooping in a Switch Stack......................................................................................................................................

308

Using FIP Snooping...........................................................................................................................................................

308

FIP Snooping Prerequisites........................................................................................................................................

308

Important Points to Remember.................................................................................................................................

308

Enabling the FCoE Transit Feature...........................................................................................................................

309

Enable FIP Snooping on VLANs................................................................................................................................

309

Configure the FC-MAP Value.....................................................................................................................................

310

Configure a Port for a Bridge-to-Bridge Link...........................................................................................................

310

Configure a Port for a Bridge-to-FCF Link...............................................................................................................

310

Impact on Other Software Features.........................................................................................................................

310

FIP Snooping Restrictions...........................................................................................................................................

310

Configuring FIP Snooping............................................................................................................................................

311

Displaying FIP Snooping Information................................................................................................................................

311

FCoE Transit Configuration Example..............................................................................................................................

316

16 FIPS Cryptography..................................................................................................................

318

Configuration Tasks...........................................................................................................................................................

318

Preparing the System........................................................................................................................................................

318

Enabling FIPS Mode...........................................................................................................................................................

318

Generating Host-Keys.......................................................................................................................................................

319

Monitoring FIPS Mode Status..........................................................................................................................................

319

Disabling FIPS Mode..........................................................................................................................................................

319

17 Force10 Resilient Ring Protocol (FRRP).....................................................................................

321

Protocol Overview.............................................................................................................................................................

321

Ring Status...................................................................................................................................................................

322

Multiple FRRP Rings...................................................................................................................................................

322

Important FRRP Points...............................................................................................................................................

323

Important FRRP Concepts.........................................................................................................................................

324

Implementing FRRP..........................................................................................................................................................

324

FRRP Configuration..........................................................................................................................................................

325

Creating the FRRP Group..........................................................................................................................................

325

Configuring the Control VLAN...................................................................................................................................

325

Configuring and Adding the Member VLANs..........................................................................................................

326

Setting the FRRP Timers............................................................................................................................................

327

Clearing the FRRP Counters......................................................................................................................................

327

Viewing the FRRP Configuration...............................................................................................................................

327

Viewing the FRRP Information..................................................................................................................................

327

Troubleshooting FRRP......................................................................................................................................................

328

Sample Configuration and Topology...............................................................................................................................

328

FRRP Support on VLT......................................................................................................................................................

329

10 Contents

18 GARP VLAN Registration Protocol (GVRP)................................................................................

332

Configure GVRP................................................................................................................................................................

333

Enabling GVRP Globally....................................................................................................................................................

333

Enabling GVRP on a Layer 2 Interface...........................................................................................................................

334

Configure GVRP Registration..........................................................................................................................................

334

Configure a GARP Timer..................................................................................................................................................

335

RPM Redundancy.............................................................................................................................................................

335

19 High Availability (HA)..............................................................................................................

336

Component Redundancy..................................................................................................................................................

336

Automatic and Manual Stack Unit Failover..............................................................................................................

336

Synchronization between Management and Standby Units..................................................................................

337

Forcing a Stack Unit Failover.....................................................................................................................................

337

Specifying an Auto-Failover Limit..............................................................................................................................

337

Disabling Auto-Reboot................................................................................................................................................

337

Pre-Configuring a Stack Unit Slot...................................................................................................................................

338

Removing a Provisioned Logical Stack Unit..................................................................................................................

338

Hitless Behavior.................................................................................................................................................................

338

Graceful Restart................................................................................................................................................................

338

Software Resiliency...........................................................................................................................................................

339

Software Component Health Monitoring.................................................................................................................

339

System Health Monitoring.........................................................................................................................................

339

Failure and Event Logging..........................................................................................................................................

339

Hot-Lock Behavior............................................................................................................................................................

340

20 Internet Group Management Protocol (IGMP)...........................................................................

341

IGMP Protocol Overview..................................................................................................................................................

341

IGMP Version 2............................................................................................................................................................

341

IGMP Version 3............................................................................................................................................................

342

Configure IGMP.................................................................................................................................................................

345

Viewing IGMP Enabled Interfaces...................................................................................................................................

345

Selecting an IGMP Version..............................................................................................................................................

346

Viewing IGMP Groups.......................................................................................................................................................

347

Adjusting Timers................................................................................................................................................................

347

Adjusting Query and Response Timers.....................................................................................................................

347

Preventing a Host from Joining a Group........................................................................................................................

348

Enabling IGMP Immediate-Leave....................................................................................................................................

350

IGMP Snooping..................................................................................................................................................................

351

Configuring IGMP Snooping.......................................................................................................................................

351

Removing a Group-Port Association.........................................................................................................................

351

Disabling Multicast Flooding.......................................................................................................................................

352

Specifying a Port as Connected to a Multicast Router..........................................................................................

352

Configuring the Switch as Querier............................................................................................................................

352

Fast Convergence after MSTP Topology Changes......................................................................................................

353

Egress Interface Selection (EIS) for HTTP and IGMP Applications...........................................................................

353

Designating a Multicast Router Interface......................................................................................................................

359

21 Interfaces...............................................................................................................................

360

Contents 11

Interface Types..................................................................................................................................................................

361

View Basic Interface Information.....................................................................................................................................

361

Resetting an Interface to its Factory Default State.....................................................................................................

363

Enabling a Physical Interface...........................................................................................................................................

363

Physical Interfaces............................................................................................................................................................

363

Configuration Task List for Physical Interfaces.......................................................................................................

364

Overview of Layer Modes..........................................................................................................................................

364

Configuring Layer 2 (Data Link) Mode.....................................................................................................................

364

Configuring Layer 2 (Interface) Mode......................................................................................................................

365

Configuring Layer 3 (Network) Mode......................................................................................................................

365

Configuring Layer 3 (Interface) Mode......................................................................................................................

365

Automatic recovery of an Err-disabled interface..........................................................................................................

366

Configuring an automatic recovery for an Err-disabled interface.........................................................................

366

Egress Interface Selection (EIS).....................................................................................................................................

367

Configuring EIS............................................................................................................................................................

367

Management Interfaces...................................................................................................................................................

368

Configuring Management Interfaces........................................................................................................................

368

Configuring a Management Interface on an Ethernet Port...................................................................................

369

VLAN Interfaces................................................................................................................................................................

370

Loopback Interfaces.........................................................................................................................................................

370

Null Interfaces.....................................................................................................................................................................

371

Configuring Port Delay......................................................................................................................................................

371

Port Channel Interfaces....................................................................................................................................................

371

Port Channel Definition and Standards.....................................................................................................................

371

Port Channel Benefits.................................................................................................................................................

372

Port Channel Implementation....................................................................................................................................

372

Interfaces in Port Channels........................................................................................................................................

372

Configuration Tasks for Port Channel Interfaces....................................................................................................

372

Creating a Port Channel.............................................................................................................................................

373

Adding a Physical Interface to a Port Channel........................................................................................................

373

Reassigning an Interface to a New Port Channel...................................................................................................

375

Configuring the Minimum Oper Up Links in a Port Channel..................................................................................

375

Adding or Removing a Port Channel from a VLAN.................................................................................................

375

Assigning an IP Address to a Port Channel..............................................................................................................

376

Deleting or Disabling a Port Channel.........................................................................................................................

377

Load Balancing Through Port Channels....................................................................................................................

377

Changing the Hash Algorithm....................................................................................................................................

377

Bulk Configuration.............................................................................................................................................................

378

Interface Range...........................................................................................................................................................

378

Bulk Configuration Examples......................................................................................................................................

378

Defining Interface Range Macros....................................................................................................................................

379

Define the Interface Range........................................................................................................................................

380

Choosing an Interface-Range Macro........................................................................................................................

380

Monitoring and Maintaining Interfaces...........................................................................................................................

380

Maintenance Using TDR..............................................................................................................................................

381

Non Dell-Qualified Transceivers.......................................................................................................................................

381

Splitting 40G Ports without Reload................................................................................................................................

382

Splitting QSFP Ports to SFP+ Ports..............................................................................................................................

383

Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port.....................................................................................

384

Link Dampening.................................................................................................................................................................

386

12 Contents

Enabling Link Dampening............................................................................................................................................

388

Link Bundle Monitoring.....................................................................................................................................................

389

Using Ethernet Pause Frames for Flow Control...........................................................................................................

389

Enabling Pause Frames...............................................................................................................................................

390

Configure the MTU Size on an Interface.......................................................................................................................

390

Port-Pipes...........................................................................................................................................................................

391

Auto-Negotiation on Ethernet Interfaces.......................................................................................................................

391

Setting the Speed of Ethernet Interfaces................................................................................................................

392

Set Auto-Negotiation Options...................................................................................................................................

393

View Advanced Interface Information............................................................................................................................

393

Configuring the Interface Sampling Size..................................................................................................................

394

Configuring the Traffic Sampling Size Globally.............................................................................................................

395

Dynamic Counters.............................................................................................................................................................

396

Clearing Interface Counters.......................................................................................................................................

397

Discard Counters...............................................................................................................................................................

397

Display discard counters.............................................................................................................................................

397

22 Internet Protocol Security (IPSec)...........................................................................................

399

Configuring IPSec ............................................................................................................................................................

399

23 IPv4 Routing...........................................................................................................................

401

IP Addresses......................................................................................................................................................................

402

Configuration Tasks for IP Addresses............................................................................................................................

402

Assigning IP Addresses to an Interface..........................................................................................................................

402

Configuring Static Routes................................................................................................................................................

403

Adding description for IPv4 and IPv6 static routes................................................................................................

404

Configure Static Routes for the Management Interface.............................................................................................

404

IPv4 Path MTU Discovery Overview..............................................................................................................................

405

Using the Configured Source IP Address in ICMP Messages.....................................................................................

405

Configuring the Duration to Establish a TCP Connection...........................................................................................

406

Enabling Directed Broadcast...........................................................................................................................................

406

Resolution of Host Names...............................................................................................................................................

406

Enabling Dynamic Resolution of Host Names................................................................................................................

407

Specifying the Local System Domain and a List of Domains.......................................................................................

407

Configuring DNS with Traceroute...................................................................................................................................

407

ARP.....................................................................................................................................................................................

408

Configuration Tasks for ARP...........................................................................................................................................

408

Configuring Static ARP Entries.......................................................................................................................................

408

Enabling Proxy ARP..........................................................................................................................................................

409

Clearing ARP Cache..........................................................................................................................................................

409

ARP Learning via Gratuitous ARP...................................................................................................................................

409

Enabling ARP Learning via Gratuitous ARP....................................................................................................................

410

ARP Learning via ARP Request.......................................................................................................................................

410

Configuring ARP Retries....................................................................................................................................................

411

ICMP.....................................................................................................................................................................................

411

Configuration Tasks for ICMP...........................................................................................................................................

411

Enabling ICMP Unreachable Messages...........................................................................................................................

411

ICMP Redirects..................................................................................................................................................................

412

UDP Helper.........................................................................................................................................................................

412

Contents 13

Enabling UDP Helper.........................................................................................................................................................

413

Configuring a Broadcast Address....................................................................................................................................

413

Configurations Using UDP Helper....................................................................................................................................

414

UDP Helper with Broadcast-All Addresses.....................................................................................................................

414

UDP Helper with Subnet Broadcast Addresses.............................................................................................................

415

UDP Helper with Configured Broadcast Addresses......................................................................................................

415

UDP Helper with No Configured Broadcast Addresses................................................................................................

416

Troubleshooting UDP Helper............................................................................................................................................

416

24 IPv6 Routing...........................................................................................................................

417

Protocol Overview.............................................................................................................................................................

417

Extended Address Space............................................................................................................................................

417

Stateless Autoconfiguration........................................................................................................................................

417

IPv6 Headers................................................................................................................................................................

418

IPv6 Header Fields.......................................................................................................................................................

418

Extension Header Fields.............................................................................................................................................

420

Addressing.....................................................................................................................................................................

421

Implementing IPv6 with Dell EMC Networking OS.......................................................................................................

421

ICMPv6...............................................................................................................................................................................

423

Path MTU discovery.........................................................................................................................................................

423

IPv6 Neighbor Discovery..................................................................................................................................................

424

IPv6 Neighbor Discovery of MTU Packets..............................................................................................................

425

Configuration Task List for IPv6 RDNSS.......................................................................................................................

425

Configuring the IPv6 Recursive DNS Server...........................................................................................................

425

Debugging IPv6 RDNSS Information Sent to the Host .........................................................................................

426

Displaying IPv6 RDNSS Information.........................................................................................................................

426

Secure Shell (SSH) Over an IPv6 Transport.................................................................................................................

427

Configuration Tasks for IPv6...........................................................................................................................................

427

Adjusting Your CAM-Profile.......................................................................................................................................

427

Assigning an IPv6 Address to an Interface..............................................................................................................

428

Assigning a Static IPv6 Route....................................................................................................................................

428

Configuring Telnet with IPv6.....................................................................................................................................

429

SNMP over IPv6..........................................................................................................................................................

429

Displaying IPv6 Information........................................................................................................................................

429

Displaying an IPv6 Interface Information..................................................................................................................

430

Showing IPv6 Routes..................................................................................................................................................

430

Showing the Running-Configuration for an Interface.............................................................................................

431

Clearing IPv6 Routes...................................................................................................................................................

432

Disabling ND Entry Timeout.......................................................................................................................................

432

Configuring IPv6 RA Guard..............................................................................................................................................

432

Configuring IPv6 RA Guard on an Interface............................................................................................................

434

Monitoring IPv6 RA Guard.........................................................................................................................................

434

25 iSCSI Optimization.................................................................................................................

435

iSCSI Optimization Overview...........................................................................................................................................

435

Monitoring iSCSI Traffic Flows..................................................................................................................................

436

Application of Quality of Service to iSCSI Traffic Flows........................................................................................

436

Information Monitored in iSCSI Traffic Flows..........................................................................................................

437

Detection and Auto-Configuration for Dell EqualLogic Arrays..............................................................................

437

14 Contents

Configuring Detection and Ports for Dell Compellent Arrays................................................................................

438

Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer..................................................................

438

Enable and Disable iSCSI Optimization.....................................................................................................................

439

Default iSCSI Optimization Values..................................................................................................................................

439

iSCSI Optimization Prerequisites.....................................................................................................................................

439

Configuring iSCSI Optimization.......................................................................................................................................

440

Displaying iSCSI Optimization Information......................................................................................................................

441

26 Intermediate System to Intermediate System...........................................................................

443

IS-IS Protocol Overview...................................................................................................................................................

443

IS-IS Addressing................................................................................................................................................................

443

Multi-Topology IS-IS.........................................................................................................................................................

444

Transition Mode...........................................................................................................................................................

444

Interface Support........................................................................................................................................................

444

Adjacencies...................................................................................................................................................................

444

Graceful Restart................................................................................................................................................................

445

Timers...........................................................................................................................................................................

445

Implementation Information.............................................................................................................................................

445

Configuration Information................................................................................................................................................

446

Configuration Tasks for IS-IS.....................................................................................................................................

446

Configuring the Distance of a Route........................................................................................................................

453

Changing the IS-Type.................................................................................................................................................

453

Redistributing IPv4 Routes........................................................................................................................................

455

Redistributing IPv6 Routes........................................................................................................................................

455

Configuring Authentication Passwords....................................................................................................................

456

Setting the Overload Bit.............................................................................................................................................

456

Debugging IS-IS...........................................................................................................................................................

457

IS-IS Metric Styles............................................................................................................................................................

458

Configure Metric Values...................................................................................................................................................

458

Maximum Values in the Routing Table.....................................................................................................................

458

Change the IS-IS Metric Style in One Level Only...................................................................................................

458

Leaks from One Level to Another.............................................................................................................................

460

Sample Configurations.....................................................................................................................................................

460

27 Link Aggregation Control Protocol (LACP)................................................................................

463

Introduction to Dynamic LAGs and LACP......................................................................................................................

463

Important Points to Remember.................................................................................................................................

463

LACP Modes................................................................................................................................................................

463

Configuring LACP Commands...................................................................................................................................

464

LACP Configuration Tasks...............................................................................................................................................

464

Creating a LAG............................................................................................................................................................

464

Configuring the LAG Interfaces as Dynamic............................................................................................................

465

Setting the LACP Long Timeout...............................................................................................................................

465

Monitoring and Debugging LACP..............................................................................................................................

466

Shared LAG State Tracking.............................................................................................................................................

466

Configuring Shared LAG State Tracking..................................................................................................................

467

Important Points about Shared LAG State Tracking..............................................................................................

468

LACP Basic Configuration Example................................................................................................................................

468

Configure a LAG on ALPHA.......................................................................................................................................

468

Contents 15

28 Layer 2...................................................................................................................................

476

Manage the MAC Address Table....................................................................................................................................

476

Clearing the MAC Address Table..............................................................................................................................

476

Setting the Aging Time for Dynamic Entries............................................................................................................

476

Configuring a Static MAC Address...........................................................................................................................

476

Displaying the MAC Address Table............................................................................................................................

477

MAC Learning Limit...........................................................................................................................................................

477

Setting the MAC Learning Limit................................................................................................................................

477

mac learning-limit Dynamic.........................................................................................................................................

478

mac learning-limit mac-address-sticky.....................................................................................................................

478

mac learning-limit station-move................................................................................................................................

478

mac learning-limit no-station-move..........................................................................................................................

478

Learning Limit Violation Actions.................................................................................................................................

479

Setting Station Move Violation Actions....................................................................................................................

479

Recovering from Learning Limit and Station Move Violations...............................................................................

479

Enabling port security.................................................................................................................................................

480

NIC Teaming......................................................................................................................................................................

480

Configure Redundant Pairs...............................................................................................................................................

481

Far-End Failure Detection................................................................................................................................................

484

FEFD State Changes..................................................................................................................................................

484

Configuring FEFD........................................................................................................................................................

485

Enabling FEFD on an Interface..................................................................................................................................

486

Debugging FEFD..........................................................................................................................................................

486

29 Link Layer Discovery Protocol (LLDP).......................................................................................

488

802.1AB (LLDP) Overview...............................................................................................................................................

488

Protocol Data Units.....................................................................................................................................................

488

Optional TLVs....................................................................................................................................................................

489

Management TLVs......................................................................................................................................................

489

TIA-1057 (LLDP-MED) Overview...................................................................................................................................

490

TIA Organizationally Specific TLVs............................................................................................................................

491

Configure LLDP.................................................................................................................................................................

494

CONFIGURATION versus INTERFACE Configurations...............................................................................................

494

Enabling LLDP...................................................................................................................................................................

495

Disabling and Undoing LLDP......................................................................................................................................

495

Enabling LLDP on Management Ports...........................................................................................................................

495

Disabling and Undoing LLDP on Management Ports..............................................................................................

496

Advertising TLVs...............................................................................................................................................................

496

Storing and Viewing Unrecognized LLDP TLVs............................................................................................................

497

Viewing the LLDP Configuration.....................................................................................................................................

498

Viewing Information Advertised by Adjacent LLDP Neighbors...................................................................................

498

Examples of Viewing Information Advertised by Neighbors..................................................................................

498

Configuring LLDPDU Intervals.........................................................................................................................................

501

Configuring LLDP Notification Interval...........................................................................................................................

501

Configuring LLDP Notification Interval..........................................................................................................................

502

Configuring Transmit and Receive Mode.......................................................................................................................

502

Configuring the Time to Live Value................................................................................................................................

503

Debugging LLDP...............................................................................................................................................................

503

16 Contents

Relevant Management Objects.......................................................................................................................................

504

30 Microsoft Network Load Balancing...........................................................................................

509

Configuring a Switch for NLB .........................................................................................................................................

510

Enabling a Switch for Multicast NLB.........................................................................................................................

510

31 Multicast Source Discovery Protocol (MSDP)............................................................................

512

Anycast RP.........................................................................................................................................................................

513

Implementation Information..............................................................................................................................................

514

Configure Multicast Source Discovery Protocol............................................................................................................

514

Related Configuration Tasks.......................................................................................................................................

514

Enable MSDP......................................................................................................................................................................

518

Manage the Source-Active Cache..................................................................................................................................

519

Viewing the Source-Active Cache.............................................................................................................................

519

Limiting the Source-Active Cache.............................................................................................................................

519

Clearing the Source-Active Cache............................................................................................................................

519

Enabling the Rejected Source-Active Cache..........................................................................................................

520

Accept Source-Active Messages that Fail the RFP Check.........................................................................................

520

Specifying Source-Active Messages..............................................................................................................................

522

Limiting the Source-Active Messages from a Peer......................................................................................................

523

Preventing MSDP from Caching a Local Source..........................................................................................................

523

Preventing MSDP from Caching a Remote Source.....................................................................................................

523

Preventing MSDP from Advertising a Local Source.....................................................................................................

524

Logging Changes in Peership States..............................................................................................................................

525

Terminating a Peership.....................................................................................................................................................

525

Clearing Peer Statistics....................................................................................................................................................

525

Debugging MSDP..............................................................................................................................................................

526

MSDP with Anycast RP...................................................................................................................................................

526

Configuring Anycast RP...................................................................................................................................................

527

Reducing Source-Active Message Flooding............................................................................................................

528

Specifying the RP Address Used in SA Messages..................................................................................................

528

MSDP Sample Configurations.........................................................................................................................................

530

32 Multicast Listener Discovery Protocol......................................................................................

533

MLD timers........................................................................................................................................................................

536

Reducing Host Response Burstiness........................................................................................................................

536

Configuring MLD Version.................................................................................................................................................

536

Clearing MLD groups........................................................................................................................................................

537

Debugging MLD.................................................................................................................................................................

537

Explicit Tracking.................................................................................................................................................................

537

Reducing Leave Latency..................................................................................................................................................

537

Displaying MLD groups table...........................................................................................................................................

537

Displaying MLD Interfaces...............................................................................................................................................

538

33 Multiple Spanning Tree Protocol (MSTP).................................................................................

539

Spanning Tree Variations.................................................................................................................................................

540

Implementation Information.......................................................................................................................................

540

Configure Multiple Spanning Tree Protocol...................................................................................................................

540

Related Configuration Tasks......................................................................................................................................

540

Contents 17

Enable Multiple Spanning Tree Globally..........................................................................................................................

541

Adding and Removing Interfaces.....................................................................................................................................

541

Creating Multiple Spanning Tree Instances....................................................................................................................

541

Influencing MSTP Root Selection...................................................................................................................................

542

Interoperate with Non-Dell Bridges................................................................................................................................

543

Changing the Region Name or Revision.........................................................................................................................

543

Modifying Global Parameters..........................................................................................................................................

543

Modifying the Interface Parameters...............................................................................................................................

544

Setting STP path cost as constant................................................................................................................................

545

Configuring an EdgePort..................................................................................................................................................

545

Flush MAC Addresses after a Topology Change..........................................................................................................

546

MSTP Sample Configurations.........................................................................................................................................

546

Debugging and Verifying MSTP Configurations...........................................................................................................

550

34 Multicast Features..................................................................................................................

552

Enabling IP Multicast........................................................................................................................................................

552

Implementation Information.............................................................................................................................................

552

Multicast Policies...............................................................................................................................................................

553

IPv4 Multicast Policies................................................................................................................................................

553

Understanding Multicast Traceroute (mtrace).............................................................................................................

559

Printing Multicast Traceroute (mtrace) Paths..............................................................................................................

559

Supported Error Codes.....................................................................................................................................................

561

mtrace Scenarios...............................................................................................................................................................

561

35 Multicast Listener Discovery Protocol......................................................................................

567

MLD timers........................................................................................................................................................................

570

Reducing Host Response Burstiness........................................................................................................................

570

Clearing MLD groups........................................................................................................................................................

570

Debugging MLD..................................................................................................................................................................

571

Explicit Tracking.................................................................................................................................................................

571

Reducing Leave Latency...................................................................................................................................................

571

Displaying MLD groups table............................................................................................................................................

571

Displaying MLD Interfaces................................................................................................................................................

571

MLD Snooping...................................................................................................................................................................

572

Enable MLD Snooping.................................................................................................................................................

572

Disable MLD Snooping................................................................................................................................................

572

Configure the switch as a querier.............................................................................................................................

572

Specify port as connected to multicast router........................................................................................................

573

Enable Snooping Explicit Tracking.............................................................................................................................

573

Display the MLD Snooping Table...............................................................................................................................

573

36 Object Tracking......................................................................................................................

574

Object Tracking Overview................................................................................................................................................

574

Track Layer 2 Interfaces.............................................................................................................................................

575

Track Layer 3 Interfaces.............................................................................................................................................

575

Track IPv4 and IPv6 Routes......................................................................................................................................

575

Set Tracking Delays.....................................................................................................................................................

576

VRRP Object Tracking................................................................................................................................................

577

Object Tracking Configuration.........................................................................................................................................

577

18 Contents

Tracking a Layer 2 Interface.......................................................................................................................................

577

Tracking a Layer 3 Interface......................................................................................................................................

578

Track an IPv4/IPv6 Route.........................................................................................................................................

579

Displaying Tracked Objects..............................................................................................................................................

582

37 Open Shortest Path First (OSPFv2 and OSPFv3)......................................................................

584

Protocol Overview............................................................................................................................................................

584

Autonomous System (AS) Areas..............................................................................................................................

584

Area Types...................................................................................................................................................................

585

Networks and Neighbors............................................................................................................................................

586

Router Types...............................................................................................................................................................

586

Designated and Backup Designated Routers...........................................................................................................

587

Link-State Advertisements (LSAs)...........................................................................................................................

587

Router Priority and Cost.............................................................................................................................................

588

OSPF with Dell EMC Networking OS.............................................................................................................................

589

Graceful Restart..........................................................................................................................................................

589

Fast Convergence (OSPFv2, IPv4 Only).................................................................................................................

590

Multi-Process OSPFv2 with VRF.............................................................................................................................

590

OSPF ACK Packing......................................................................................................................................................

591

Setting OSPF Adjacency with Cisco Routers..........................................................................................................

591

Configuration Information.................................................................................................................................................

591

Configuration Task List for OSPFv2 (OSPF for IPv4)...........................................................................................

592

OSPFv3 NSSA.............................................................................................................................................................

603

Configuration Task List for OSPFv3 (OSPF for IPv6)...........................................................................................

604

MIB Support for OSPFv3.................................................................................................................................................

615

Viewing the OSPFv3 MIB...........................................................................................................................................

615

Configuration Task List for OSPFv3 (OSPF for IPv6)..................................................................................................

616

Enabling IPv6 Unicast Routing...................................................................................................................................

616

Applying cost for OSPFv3..........................................................................................................................................

616

Assigning IPv6 Addresses on an Interface................................................................................................................

617

Assigning Area ID on an Interface..............................................................................................................................

617

Assigning OSPFv3 Process ID and Router ID Globally............................................................................................

617

Assigning OSPFv3 Process ID and Router ID to a VRF..........................................................................................

618

Configuring Stub Areas...............................................................................................................................................

618

Configuring Passive-Interface....................................................................................................................................

618

Redistributing Routes..................................................................................................................................................

619

Configuring a Default Route.......................................................................................................................................

619

Enabling OSPFv3 Graceful Restart...........................................................................................................................

619

OSPFv3 Authentication Using IPsec.........................................................................................................................

621

Troubleshooting OSPFv3...........................................................................................................................................

627

38 Policy-based Routing (PBR)....................................................................................................

628

Overview............................................................................................................................................................................

628

Implementing PBR.............................................................................................................................................................

629

Configuration Task List for Policy-based Routing........................................................................................................

629

Create a Redirect List.................................................................................................................................................

630

Create a Rule for a Redirect-list................................................................................................................................

630

Apply a Redirect-list to an Interface using a Redirect-group.................................................................................

631

Sample Configuration.......................................................................................................................................................

634

Contents 19

39 PIM Sparse-Mode (PIM-SM)...................................................................................................

638

Implementation Information.............................................................................................................................................

638

Protocol Overview............................................................................................................................................................

638

Requesting Multicast Traffic......................................................................................................................................

638

Refuse Multicast Traffic.............................................................................................................................................

638

Send Multicast Traffic................................................................................................................................................

639

Configuring PIM-SM.........................................................................................................................................................

639

Related Configuration Tasks......................................................................................................................................

639

Enable PIM-SM.................................................................................................................................................................

639

Configuring S,G Expiry Timers.........................................................................................................................................

641

Configuring a Static Rendezvous Point.........................................................................................................................

642

Overriding Bootstrap Router Updates......................................................................................................................

642

Configuring a Designated Router....................................................................................................................................

643

Creating Multicast Boundaries and Domains.................................................................................................................

644

Electing an RP using the BSR Mechanism....................................................................................................................

644

40 PIM Source-Specific Mode (PIM-SSM)....................................................................................

646

Implementation Information.............................................................................................................................................

646

Configure PIM-SSM.........................................................................................................................................................

646

Enabling PIM-SSM............................................................................................................................................................

647

Use PIM-SSM with IGMP Version 2 Hosts...................................................................................................................

647

Electing an RP using the BSR Mechanism....................................................................................................................

649

Enabling RP to Server Specific Multicast Groups..................................................................................................

650

41 Port Monitoring.......................................................................................................................

651

Important Points to Remember.......................................................................................................................................

651

Port Monitoring..................................................................................................................................................................

651

Configuring Port Monitoring............................................................................................................................................

654

Configuring Monitor Multicast Queue............................................................................................................................

655

Enabling Flow-Based Monitoring....................................................................................................................................

655

Remote Port Mirroring.....................................................................................................................................................

656

Remote Port Mirroring Example................................................................................................................................

657

Configuring Remote Port Mirroring..........................................................................................................................

657

Displaying Remote-Port Mirroring Configurations..................................................................................................

659

Configuration procedure for Remote Port Mirroring..............................................................................................

659

Encapsulated Remote Port Monitoring..........................................................................................................................

663

ERPM Behavior on a typical Dell EMC Networking OS ..............................................................................................

665

Port Monitoring on VLT...................................................................................................................................................

666

42 Private VLANs (PVLAN)..........................................................................................................

669

Private VLAN Concepts...................................................................................................................................................

669

Using the Private VLAN Commands...............................................................................................................................

670

Configuration Task List......................................................................................................................................................

671

Creating PVLAN ports.................................................................................................................................................

671

Creating a Primary VLAN............................................................................................................................................

671

Creating a Community VLAN.....................................................................................................................................

672

Creating an Isolated VLAN.........................................................................................................................................

673

Private VLAN Configuration Example.............................................................................................................................

674

20 Contents

Inspecting the Private VLAN Configuration...................................................................................................................

675

43 Per-VLAN Spanning Tree Plus (PVST+)....................................................................................

677

Protocol Overview.............................................................................................................................................................

677

Implementation Information.............................................................................................................................................

678

Configure Per-VLAN Spanning Tree Plus......................................................................................................................

678

Enabling PVST+.................................................................................................................................................................

678

Disabling PVST+................................................................................................................................................................

678

Influencing PVST+ Root Selection..................................................................................................................................

679

Modifying Global PVST+ Parameters.............................................................................................................................

680

Modifying Interface PVST+ Parameters.........................................................................................................................

681

Configuring an EdgePort...................................................................................................................................................

681

PVST+ in Multi-Vendor Networks..................................................................................................................................

682

Enabling PVST+ Extend System ID................................................................................................................................

682

PVST+ Sample Configurations........................................................................................................................................

683

44 Quality of Service (QoS).........................................................................................................

685

Implementation Information.............................................................................................................................................

687

Port-Based QoS Configurations......................................................................................................................................

687

Setting dot1p Priorities for Incoming Traffic............................................................................................................

687

Honoring dot1p Priorities on Ingress Traffic.............................................................................................................

688

Configuring Port-Based Rate Policing......................................................................................................................

688

Configuring Port-Based Rate Shaping.....................................................................................................................

688

Policy-Based QoS Configurations...................................................................................................................................

689

Classify Traffic.............................................................................................................................................................

689

Create a QoS Policy....................................................................................................................................................

692

Create Policy Maps.....................................................................................................................................................

694

DSCP Color Maps.............................................................................................................................................................

697

Creating a DSCP Color Map......................................................................................................................................

697

Displaying DSCP Color Maps.....................................................................................................................................

698

Displaying a DSCP Color Policy Configuration .......................................................................................................

698

Enabling QoS Rate Adjustment.......................................................................................................................................

699

Enabling Strict-Priority Queueing....................................................................................................................................

699

Weighted Random Early Detection.................................................................................................................................

699

Creating WRED Profiles.............................................................................................................................................

700

Applying a WRED Profile to Traffic...........................................................................................................................

700

Displaying Default and Configured WRED Profiles..................................................................................................

701

Displaying WRED Drop Statistics...............................................................................................................................

701

Displaying egress–queue Statistics............................................................................................................................

701

Pre-Calculating Available QoS CAM Space....................................................................................................................

701

Configuring Weights and ECN for WRED .....................................................................................................................

702

Configuring WRED and ECN Attributes.........................................................................................................................

704

Guidelines for Configuring ECN for Classifying and Color-Marking Packets............................................................

704

Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class....................................

705

Classifying Incoming Packets Using ECN and Color-Marking...............................................................................

705

Sample configuration to mark non-ecn packets as “yellow” with single traffic class.........................................

707

Applying Layer 2 Match Criteria on a Layer 3 Interface...............................................................................................

708

Applying DSCP and VLAN Match Criteria on a Service Queue..................................................................................

708

Classifying Incoming Packets Using ECN and Color-Marking.....................................................................................

709

Contents 21

Guidelines for Configuring ECN for Classifying and Color-Marking Packets.............................................................

710

Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class............................................

711

Sample configuration to mark non-ecn packets as “yellow” with single traffic class................................................

711

Enabling Buffer Statistics Tracking .................................................................................................................................

712

45 Routing Information Protocol (RIP)..........................................................................................

715

Protocol Overview.............................................................................................................................................................

715

RIPv1..............................................................................................................................................................................

715

RIPv2.............................................................................................................................................................................

715

Implementation Information..............................................................................................................................................

715

Configuration Information.................................................................................................................................................

716

Configuration Task List................................................................................................................................................

716

RIP Configuration Example.........................................................................................................................................

721

46 Remote Monitoring (RMON)....................................................................................................

726

Implementation Information.............................................................................................................................................

726

Fault Recovery...................................................................................................................................................................

726

Setting the RMON Alarm...........................................................................................................................................

726

Configuring an RMON Event.....................................................................................................................................

727

Configuring RMON Collection Statistics..................................................................................................................

728

Configuring the RMON Collection History...............................................................................................................

728

47 Rapid Spanning Tree Protocol (RSTP)......................................................................................

729

Protocol Overview............................................................................................................................................................

729

Configuring Rapid Spanning Tree....................................................................................................................................

729

Important Points to Remember.......................................................................................................................................

729

RSTP and VLT.............................................................................................................................................................

730

Configuring Interfaces for Layer 2 Mode.......................................................................................................................

730

Enabling Rapid Spanning Tree Protocol Globally...........................................................................................................

730

Adding and Removing Interfaces....................................................................................................................................

732

Modifying Global Parameters...........................................................................................................................................

732

Enabling SNMP Traps for Root Elections and Topology Changes........................................................................

733

Modifying Interface Parameters......................................................................................................................................

734

Enabling SNMP Traps for Root Elections and Topology Changes.............................................................................

734

Influencing RSTP Root Selection....................................................................................................................................

734

Configuring an EdgePort..................................................................................................................................................

734

Configuring Fast Hellos for Link State Detection..........................................................................................................

735

48 Software-Defined Networking (SDN).......................................................................................

737

49 Security.................................................................................................................................

738

AAA Accounting.................................................................................................................................................................

738

Configuration Task List for AAA Accounting...........................................................................................................

738

RADIUS Accounting....................................................................................................................................................

740

AAA Authentication...........................................................................................................................................................

745

Configuration Task List for AAA Authentication.....................................................................................................

745

Obscuring Passwords and Keys.......................................................................................................................................

747

AAA Authorization.............................................................................................................................................................

748

Privilege Levels Overview...........................................................................................................................................

748

22 Contents

Configuration Task List for Privilege Levels.............................................................................................................

748

RADIUS...............................................................................................................................................................................

752

RADIUS Authentication..............................................................................................................................................

752

Configuration Task List for RADIUS..........................................................................................................................

753

Support for Change of Authorization and Disconnect Messages packets..........................................................

756

TACACS+...........................................................................................................................................................................

765

Configuration Task List for TACACS+......................................................................................................................

765

TACACS+ Remote Authentication............................................................................................................................

766

Command Authorization.............................................................................................................................................

767

Protection from TCP Tiny and Overlapping Fragment Attacks..................................................................................

768

Enabling SCP and SSH.....................................................................................................................................................

768

Using SCP with SSH to Copy a Software Image....................................................................................................

768

Removing the RSA Host Keys and Zeroizing Storage ...........................................................................................

769

Configuring When to Re-generate an SSH Key .....................................................................................................

769

Configuring the SSH Server Key Exchange Algorithm...........................................................................................

770

Configuring the HMAC Algorithm for the SSH Server...........................................................................................

770

Configuring the SSH Server Cipher List....................................................................................................................

771

Configuring DNS in the SSH Server..........................................................................................................................

771

Secure Shell Authentication.......................................................................................................................................

772

Troubleshooting SSH..................................................................................................................................................

774

Telnet..................................................................................................................................................................................

774

VTY Line and Access-Class Configuration.....................................................................................................................

774

VTY Line Local Authentication and Authorization...................................................................................................

775

VTY Line Remote Authentication and Authorization..............................................................................................

775

VTY MAC-SA Filter Support......................................................................................................................................

775

Role-Based Access Control..............................................................................................................................................

776

Overview of RBAC......................................................................................................................................................

776

User Roles.....................................................................................................................................................................

778

AAA Authentication and Authorization for Roles.....................................................................................................

781

Role Accounting...........................................................................................................................................................

783

Display Information About User Roles.......................................................................................................................

784

Two Factor Authentication (2FA)...................................................................................................................................

785

Handling Access-Challenge Message.......................................................................................................................

785

Configuring Challenge Response Authentication for SSHv2.................................................................................

785

SMS-OTP Mechanism................................................................................................................................................

786

Configuring the System to Drop Certain ICMP Reply Messages...............................................................................

786

Dell EMC Networking OS Security Hardening...............................................................................................................

788

Dell EMC Networking OS Image Verification...........................................................................................................

788

Startup Configuration Verification............................................................................................................................

789

Configuring the root User Password........................................................................................................................

790

Locking Access to GRUB Interface..........................................................................................................................

790

Enabling User Lockout for Failed Login Attempts...................................................................................................

791

50 Service Provider Bridging........................................................................................................

792

VLAN Stacking...................................................................................................................................................................

792

Configure VLAN Stacking...........................................................................................................................................

793

Creating Access and Trunk Ports..............................................................................................................................

794

Enable VLAN-Stacking for a VLAN...........................................................................................................................

794

Configuring the Protocol Type Value for the Outer VLAN Tag............................................................................

795

Configuring Dell EMC Networking OS Options for Trunk Ports...........................................................................

795

Contents 23

Debugging VLAN Stacking.........................................................................................................................................

796

VLAN Stacking in Multi-Vendor Networks..............................................................................................................

796

VLAN Stacking Packet Drop Precedence.....................................................................................................................

800

Enabling Drop Eligibility...............................................................................................................................................

800

Honoring the Incoming DEI Value.............................................................................................................................

800

Marking Egress Packets with a DEI Value................................................................................................................

801

Dynamic Mode CoS for VLAN Stacking.........................................................................................................................

801

Mapping C-Tag to S-Tag dot1p Values....................................................................................................................

803

Layer 2 Protocol Tunneling..............................................................................................................................................

803

Enabling Layer 2 Protocol Tunneling........................................................................................................................

805

Specifying a Destination MAC Address for BPDUs................................................................................................

806

Setting Rate-Limit BPDUs.........................................................................................................................................

806

Debugging Layer 2 Protocol Tunneling....................................................................................................................

806

Provider Backbone Bridging............................................................................................................................................

806

51 sFlow.....................................................................................................................................

808

Overview............................................................................................................................................................................

808

Implementation Information.............................................................................................................................................

808

Enabling Extended sFlow.................................................................................................................................................

809

Enabling and Disabling sFlow on an Interface................................................................................................................

810

Enabling sFlow Max-Header Size Extended...................................................................................................................

810

sFlow Show Commands....................................................................................................................................................

811

Displaying Show sFlow Global.....................................................................................................................................

811

Displaying Show sFlow on an Interface......................................................................................................................

811

Displaying Show sFlow on a Stack-unit.....................................................................................................................

812

Configuring Specify Collectors.........................................................................................................................................

812

Changing the Polling Intervals..........................................................................................................................................

812

Back-Off Mechanism........................................................................................................................................................

813

sFlow on LAG ports...........................................................................................................................................................

813

Enabling Extended sFlow..................................................................................................................................................

813

Important Points to Remember..................................................................................................................................

814

52 Simple Network Management Protocol (SNMP)........................................................................

815

Protocol Overview.............................................................................................................................................................

816

Implementation Information..............................................................................................................................................

816

SNMPv3 Compliance With FIPS......................................................................................................................................

816

Configuration Task List for SNMP...................................................................................................................................

817

Important Points to Remember........................................................................................................................................

817

Set up SNMP......................................................................................................................................................................

817

Creating a Community.................................................................................................................................................

818

Setting Up User-Based Security (SNMPv3)............................................................................................................

818

Enable SNMPv3 traps.................................................................................................................................................

819

Reading Managed Object Values.....................................................................................................................................

819

Writing Managed Object Values......................................................................................................................................

820

Configuring Contact and Location Information using SNMP......................................................................................

820

Subscribing to Managed Object Value Updates using SNMP.....................................................................................

821

Enabling a Subset of SNMP Traps..................................................................................................................................

821

Enabling an SNMP Agent to Notify Syslog Server Failure...........................................................................................

823

Copy Configuration Files Using SNMP...........................................................................................................................

824

24 Contents

Copying a Configuration File......................................................................................................................................

825

Copying Configuration Files via SNMP.....................................................................................................................

826

Copying the Startup-Config Files to the Running-Config......................................................................................

826

Copying the Startup-Config Files to the Server via FTP.......................................................................................

827

Copying the Startup-Config Files to the Server via TFTP.....................................................................................

827

Copy a Binary File to the Startup-Configuration.....................................................................................................

827

Additional MIB Objects to View Copy Statistics.....................................................................................................

828

Obtaining a Value for MIB Objects............................................................................................................................

828

MIB Support to Display Reason for Last System Reboot............................................................................................

829

Viewing the Reason for Last System Reboot Using SNMP..................................................................................

829

MIB Support for Power Monitoring................................................................................................................................

829

MIB Support to Display the Available Memory Size on Flash......................................................................................

830

Viewing the Available Flash Memory Size................................................................................................................

830

MIB Support to Display the Software Core Files Generated by the System............................................................

830

Viewing the Software Core Files Generated by the System..................................................................................

831

MIB Support to Display the Available Partitions on Flash.............................................................................................

831

Viewing the Available Partitions on Flash.................................................................................................................

832

MIB Support to Display Egress Queue Statistics..........................................................................................................

833

MIB Support to ECMP Group Count..............................................................................................................................

833

Viewing the ECMP Group Count Information.........................................................................................................

833

MIB Support for entAliasMappingTable ........................................................................................................................

836

Viewing the entAliasMappingTable MIB...................................................................................................................

836

MIB Support for LAG........................................................................................................................................................

836

Viewing the LAG MIB..................................................................................................................................................

837

MIB Support to Display Unrecognized LLDP TLVs......................................................................................................

838

MIB Support to Display Reserved Unrecognized LLDP TLVs...............................................................................

838

MIB Support to Display Organizational Specific Unrecognized LLDP TLVs........................................................

839

MIB Support for LLDP Notification Interval..................................................................................................................

839

MIB support for Port Security.........................................................................................................................................

840

Global MIB objects for port security.........................................................................................................................

840

MIB support for interface level port security...........................................................................................................

840

MIB objects for configuring MAC addresses............................................................................................................

841

MIB objects for configuring MAC addresses...........................................................................................................

842

Manage VLANs using SNMP...........................................................................................................................................

843

Creating a VLAN..........................................................................................................................................................

843

Assigning a VLAN Alias...............................................................................................................................................

843

Displaying the Ports in a VLAN..................................................................................................................................

843

Add Tagged and Untagged Ports to a VLAN..........................................................................................................

844

Managing Overload on Startup.......................................................................................................................................

845

Enabling and Disabling a Port using SNMP....................................................................................................................

845

Fetch Dynamic MAC Entries using SNMP.....................................................................................................................

846

Example of Deriving the Interface Index Number.........................................................................................................

847

MIB Objects for Viewing the System Image on Flash Partitions...........................................................................

847

Monitoring BGP sessions via SNMP...............................................................................................................................

847

Monitor Port-Channels.....................................................................................................................................................

849

Enabling an SNMP Agent to Notify Syslog Server Failure..........................................................................................

850

Troubleshooting SNMP Operation..................................................................................................................................

851

Transceiver Monitoring.....................................................................................................................................................

851

Configuring SNMP context name...................................................................................................................................

852

Contents 25

53 Stacking................................................................................................................................

854

Stacking Overview............................................................................................................................................................

854

Stack Management Roles..........................................................................................................................................

854

Stack Master Election................................................................................................................................................

855

Virtual IP.......................................................................................................................................................................

856

Failover Roles...............................................................................................................................................................

857

MAC Addressing on Stacks........................................................................................................................................

857

Stacking LAG...............................................................................................................................................................

858

Supported Stacking Topologies.................................................................................................................................

858

High Availability on Stacks.........................................................................................................................................

858

Management Access on Stacks................................................................................................................................

859

Mixed-mode Stacking.................................................................................................................................................

860

Important Points to Remember.......................................................................................................................................

861

Stacking Installation Tasks................................................................................................................................................

861

Create a Stack..............................................................................................................................................................

861

Add Units to an Existing Stack..................................................................................................................................

865

Split a Stack.................................................................................................................................................................

867

Stacking Configuration Tasks..........................................................................................................................................

867

Assigning Unit Numbers to Units in an Stack..........................................................................................................

867

Creating a Virtual Stack Unit on a Stack..................................................................................................................

868

Displaying Information about a Stack.......................................................................................................................

868

Influencing Management Unit Selection on a Stack...............................................................................................

870

Managing Redundancy on a Stack.............................................................................................................................

871

Resetting a Unit on a Stack........................................................................................................................................

871

Enabling Mixed-mode Stacking..................................................................................................................................

871

Verify a Stack Configuration............................................................................................................................................

872

Displaying the Status of Stacking Ports...................................................................................................................

872

Remove Units or Front End Ports from a Stack...........................................................................................................

873

Removing a Unit from a Stack...................................................................................................................................

873

Removing Front End Port Stacking..........................................................................................................................

874

Troubleshoot a Stack........................................................................................................................................................

874

Recover from Stack Link Flaps..................................................................................................................................

875

Recover from a Card Problem State on a Stack.....................................................................................................

875

54 Storm Control.........................................................................................................................

877

Configure Storm Control..................................................................................................................................................

877

Configuring Storm Control from INTERFACE Mode..............................................................................................

877

Configuring Storm Control from CONFIGURATION Mode...................................................................................

878

55 Spanning Tree Protocol (STP).................................................................................................

879

Protocol Overview............................................................................................................................................................

879

Configure Spanning Tree..................................................................................................................................................

879

Important Points to Remember.......................................................................................................................................

880

Configuring Interfaces for Layer 2 Mode.......................................................................................................................

880

Enabling Spanning Tree Protocol Globally......................................................................................................................

881

Adding an Interface to the Spanning Tree Group.........................................................................................................

883

Modifying Global Parameters..........................................................................................................................................

883

Modifying Interface STP Parameters.............................................................................................................................

884

26 Contents

Enabling PortFast..............................................................................................................................................................

884

Prevent Network Disruptions with BPDU Guard....................................................................................................

885

Selecting STP Root...........................................................................................................................................................

887

STP Root Guard................................................................................................................................................................

887

Root Guard Scenario...................................................................................................................................................

887

Configuring Root Guard..............................................................................................................................................

888

Enabling SNMP Traps for Root Elections and Topology Changes.............................................................................

889

Configuring Spanning Trees as Hitless...........................................................................................................................

889

STP Loop Guard................................................................................................................................................................

889

Configuring Loop Guard.............................................................................................................................................

890

Displaying STP Guard Configuration...............................................................................................................................

891

56 SupportAssist........................................................................................................................

892

Configuring SupportAssist Using a Configuration Wizard...........................................................................................

892

Configuring SupportAssist Manually...............................................................................................................................

893

Configuring SupportAssist Activity.................................................................................................................................

894

Configuring SupportAssist Company.............................................................................................................................

896

Configuring SupportAssist Person..................................................................................................................................

896

Configuring SupportAssist Server...................................................................................................................................

897

Viewing SupportAssist Configuration.............................................................................................................................

898

57 System Time and Date............................................................................................................

900

Network Time Protocol....................................................................................................................................................

900

Protocol Overview.......................................................................................................................................................

901

Configure the Network Time Protocol......................................................................................................................

901

Enabling NTP................................................................................................................................................................

901

Configuring NTP Broadcasts.....................................................................................................................................

902

Disabling NTP on an Interface...................................................................................................................................

902

Configuring a Source IP Address for NTP Packets................................................................................................

902

Configuring NTP Authentication...............................................................................................................................

903

Configuring NTP control key password...................................................................................................................

905

Configuring the NTP Step-Threshold......................................................................................................................

905

Dell EMC Networking OS Time and Date......................................................................................................................

905

Configuration Task List .............................................................................................................................................

905

Setting the Time and Date for the Switch Software Clock...................................................................................

905

Setting the Timezone.................................................................................................................................................

906

Set Daylight Saving Time...........................................................................................................................................

906

Setting Daylight Saving Time Once..........................................................................................................................

906

Setting Recurring Daylight Saving Time...................................................................................................................

907

58 Tunneling...............................................................................................................................

909

Configuring a Tunnel.........................................................................................................................................................

909

Configuring Tunnel Keepalive Settings...........................................................................................................................

910

Configuring a Tunnel Interface.........................................................................................................................................

910

Configuring Tunnel Allow-Remote Decapsulation..........................................................................................................

911

Configuring the Tunnel Source Anylocal..........................................................................................................................

911

59 Uplink Failure Detection (UFD).................................................................................................

912

Feature Description...........................................................................................................................................................

912

Contents 27

How Uplink Failure Detection Works...............................................................................................................................

913

UFD and NIC Teaming.......................................................................................................................................................

914

Important Points to Remember.......................................................................................................................................

914

Configuring Uplink Failure Detection...............................................................................................................................

915

Clearing a UFD-Disabled Interface..................................................................................................................................

916

Displaying Uplink Failure Detection..................................................................................................................................

917

Sample Configuration: Uplink Failure Detection.............................................................................................................

918

60 Upgrade Procedures...............................................................................................................

920

61 Virtual LANs (VLANs)...............................................................................................................

921

Default VLAN......................................................................................................................................................................

921

Port-Based VLANs............................................................................................................................................................

922

VLANs and Port Tagging..................................................................................................................................................

922

Configuration Task List.....................................................................................................................................................

923

Creating a Port-Based VLAN.....................................................................................................................................

923

Assigning Interfaces to a VLAN.................................................................................................................................

923

Moving Untagged Interfaces.....................................................................................................................................

924

Assigning an IP Address to a VLAN..........................................................................................................................

925

Configuring Native VLANs...............................................................................................................................................

926

Enabling Null VLAN as the Default VLAN......................................................................................................................

926

62 Virtual Link Trunking (VLT)......................................................................................................

927

Overview............................................................................................................................................................................

927

VLT Terminology.........................................................................................................................................................

929

Layer-2 Traffic in VLT Domains.................................................................................................................................

929

Interspersed VLANs....................................................................................................................................................

930

VLT on Core Switches.................................................................................................................................................

931

Enhanced VLT..............................................................................................................................................................

931

Configure Virtual Link Trunking.......................................................................................................................................

932

Important Points to Remember.................................................................................................................................

932

Configuration Notes....................................................................................................................................................

933

Primary and Secondary VLT Peers...........................................................................................................................

936

RSTP and VLT.............................................................................................................................................................

936

VLT Bandwidth Monitoring........................................................................................................................................

937

VLT and Stacking........................................................................................................................................................

937

VLT and IGMP Snooping............................................................................................................................................

937

VLT IPv6.......................................................................................................................................................................

937

VLT Port Delayed Restoration...................................................................................................................................

937

PIM-Sparse Mode Support on VLT..........................................................................................................................

938

VLT Routing ................................................................................................................................................................

939

Non-VLT ARP Sync....................................................................................................................................................

942

RSTP Configuration..........................................................................................................................................................

942

Preventing Forwarding Loops in a VLT Domain......................................................................................................

942

Sample RSTP configuration.......................................................................................................................................

943

Configuring VLT...........................................................................................................................................................

943

PVST+ Configuration........................................................................................................................................................

952

Peer Routing Configuration Example.............................................................................................................................

953

Dell-1 Switch Configuration........................................................................................................................................

953

28 Contents

Dell-2 Switch Configuration.......................................................................................................................................

957

R1 Configuration..........................................................................................................................................................

960

Access Switch A1 Configurations and Verification..................................................................................................

961

eVLT Configuration Example...........................................................................................................................................

962

PIM-Sparse Mode Configuration Example....................................................................................................................

964

Verifying a VLT Configuration.........................................................................................................................................

964

Additional VLT Sample Configurations...........................................................................................................................

967

Troubleshooting VLT........................................................................................................................................................

969

Reconfiguring Stacked Switches as VLT.......................................................................................................................

970

Specifying VLT Nodes in a PVLAN.................................................................................................................................

970

Configuring a VLT VLAN or LAG in a PVLAN................................................................................................................

973

Creating a VLT LAG or a VLT VLAN.........................................................................................................................

973

Associating the VLT LAG or VLT VLAN in a PVLAN..............................................................................................

974

Proxy ARP Capability on VLT Peer Nodes.....................................................................................................................

975

VLT Nodes as Rendezvous Points for Multicast Resiliency........................................................................................

976

Configuring VLAN-Stack over VLT.................................................................................................................................

976

IPv6 Peer Routing in VLT Domains Overview...............................................................................................................

979

Configure BFD in VLT Domain.........................................................................................................................................

983

Sample BFD configuration in VLT domain................................................................................................................

983

VXLAN on VLT..................................................................................................................................................................

987

63 VLT Proxy Gateway.................................................................................................................

989

Proxy Gateway in VLT Domains......................................................................................................................................

989

LLDP VLT Proxy Gateway in a Square VLT Topology...........................................................................................

992

Configuring a Static VLT Proxy Gateway......................................................................................................................

993

Configuring an LLDP VLT Proxy Gateway.....................................................................................................................

993

VLT Proxy Gateway Sample Topology...........................................................................................................................

993

VLT Domain Configuration.........................................................................................................................................

994

Dell-1 VLT Configuration.............................................................................................................................................

994

Dell-2 VLT Configuration............................................................................................................................................

995

Dell-3 VLT Configuration............................................................................................................................................

996

Dell-4 VLT Configuration............................................................................................................................................

997

64 Virtual Extensible LAN (VXLAN)...............................................................................................

998

advertise-local-mac..........................................................................................................................................................

999

Components of VXLAN network....................................................................................................................................

999

Functional Overview of VXLAN Gateway....................................................................................................................

1000

VXLAN Frame Format....................................................................................................................................................

1000

Limitations on VXLAN .....................................................................................................................................................

1001

Configuring and Controlling VXLAN from the NSX Controller GUI..........................................................................

1002

Configuring and Controling VXLAN from Nuage Controller GUI..............................................................................

1006

Configuring VxLAN Gateway.........................................................................................................................................

1007

Connecting to an NVP Controller............................................................................................................................

1007

Advertising VXLAN Access Ports to Controller.....................................................................................................

1008

Displaying VXLAN Configurations.................................................................................................................................

1008

VXLAN Service nodes for BFD......................................................................................................................................

1009

Static Virtual Extensible LAN (VXLAN).........................................................................................................................

1010

Configuring Static VXLAN.........................................................................................................................................

1010

Displaying Static VXLAN Configurations..................................................................................................................

1011

Contents 29

Disabling MAC Address Learning on Static VXLAN Tunnels.................................................................................

1011

Preserving 802.1 p value across VXLAN tunnels..........................................................................................................

1012

VXLAN Scenario...............................................................................................................................................................

1012

Routing in and out of VXLAN tunnels............................................................................................................................

1013

Configuring VXLAN RIOT..........................................................................................................................................

1014

VLT Scenario...............................................................................................................................................................

1015

NSX Controller-based VXLAN for VLT.........................................................................................................................

1016

Important Points to Remember................................................................................................................................

1016

Configure NSX Controller-based VxLAN in VLT Setup.........................................................................................

1017

Configuring BFD and UFD for VXLAN.....................................................................................................................

1017

Configuring NSX-based VxLAN on VLT Peer Devices..........................................................................................

1017

Configuring VLT for NSX-based VxLAN.................................................................................................................

1018

Configuring and Controlling VXLAN from the NSX Controller GUI.....................................................................

1022

65 Virtual Routing and Forwarding (VRF).....................................................................................

1027

VRF Overview..................................................................................................................................................................

1027

VRF Configuration Notes...............................................................................................................................................

1028

DHCP...........................................................................................................................................................................

1029

VRF Configuration...........................................................................................................................................................

1029

Loading VRF CAM.....................................................................................................................................................

1029

Creating a Non-Default VRF Instance....................................................................................................................

1029

Assigning an Interface to a VRF..............................................................................................................................

1030

Assigning a Front-end Port to a Management VRF..............................................................................................

1030

View VRF Instance Information...............................................................................................................................

1030

Assigning an OSPF Process to a VRF Instance.....................................................................................................

1030

Configuring VRRP on a VRF Instance......................................................................................................................

1031

Configuring Management VRF.................................................................................................................................

1031

Configuring a Static Route.......................................................................................................................................

1032

Sample VRF Configuration.............................................................................................................................................

1032

Route Leaking VRFs........................................................................................................................................................

1038

Dynamic Route Leaking..................................................................................................................................................

1038

Configuring Route Leaking without Filtering Criteria............................................................................................

1039

Configuring Route Leaking with Filtering................................................................................................................

1041

66 Virtual Router Redundancy Protocol (VRRP)...........................................................................

1044

VRRP Overview...............................................................................................................................................................

1044

VRRP Benefits.................................................................................................................................................................

1045

VRRP Implementation.....................................................................................................................................................

1045

VRRP Configuration........................................................................................................................................................

1046

Configuration Task List.............................................................................................................................................

1046

Setting VRRP Initialization Delay.............................................................................................................................

1054

Sample Configurations....................................................................................................................................................

1054

VRRP in a VRF Configuration..................................................................................................................................

1058

VRRP for IPv6 Configuration...................................................................................................................................

1063

Proxy Gateway with VRRP............................................................................................................................................

1066

67 Debugging and Diagnostics.....................................................................................................

1071

Offline Diagnostics............................................................................................................................................................

1071

Important Points to Remember................................................................................................................................

1071

30 Contents

Loading...
+ 1078 hidden pages