Dell EMC Configuration Guide for the S4048T–ON System
9.14.2.4
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.
2019 - 11
Rev. A00
Contents
1 About this Guide......................................................................................................................... |
33 |
Audience............................................................................................................................................................................... |
33 |
Conventions......................................................................................................................................................................... |
33 |
Related Documents............................................................................................................................................................. |
33 |
2 Configuration Fundamentals....................................................................................................... |
34 |
Accessing the Command Line............................................................................................................................................ |
34 |
CLI Modes............................................................................................................................................................................ |
34 |
Navigating CLI Modes................................................................................................................................................... |
36 |
The do Command................................................................................................................................................................ |
38 |
Undoing Commands............................................................................................................................................................ |
39 |
Obtaining Help..................................................................................................................................................................... |
39 |
Entering and Editing Commands....................................................................................................................................... |
39 |
Command History................................................................................................................................................................ |
40 |
Filtering show Command Outputs.................................................................................................................................... |
40 |
Multiple Users in Configuration Mode............................................................................................................................... |
41 |
3 Getting Started.......................................................................................................................... |
42 |
Console Access.................................................................................................................................................................... |
42 |
Serial Console................................................................................................................................................................. |
42 |
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................... |
43 |
Default Configuration.......................................................................................................................................................... |
44 |
Configuring a Host Name................................................................................................................................................... |
44 |
Accessing the System Remotely....................................................................................................................................... |
44 |
Configure the Management Port IP Address............................................................................................................. |
44 |
Configure a Management Route................................................................................................................................. |
45 |
Configuring a Username and Password..................................................................................................................... |
45 |
Configuring the Enable Password..................................................................................................................................... |
46 |
Configuration File Management........................................................................................................................................ |
46 |
Copy Files to and from the System............................................................................................................................. |
46 |
Mounting an NFS File System...................................................................................................................................... |
47 |
Save the Running-Configuration................................................................................................................................. |
48 |
Configure the Overload Bit for a Startup Scenario................................................................................................... |
49 |
Viewing Files................................................................................................................................................................... |
49 |
Compressing Configuration Files................................................................................................................................. |
50 |
Managing the File System.................................................................................................................................................. |
52 |
Enabling Software Features on Devices Using a Command Option............................................................................. |
52 |
View Command History...................................................................................................................................................... |
53 |
Upgrading Dell EMC Networking OS................................................................................................................................ |
54 |
Verify Software Images Before Installation...................................................................................................................... |
54 |
Using HTTP for File Transfers........................................................................................................................................... |
55 |
4 Management.............................................................................................................................. |
57 |
Configuring Privilege Levels............................................................................................................................................... |
57 |
Contents 3
Removing a Command from EXEC Mode.................................................................................................................. |
58 |
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................... |
58 |
Allowing Access to CONFIGURATION Mode Commands....................................................................................... |
58 |
Allowing Access to Different Modes........................................................................................................................... |
58 |
Applying a Privilege Level to a Username................................................................................................................... |
60 |
Applying a Privilege Level to a Terminal Line............................................................................................................. |
60 |
Configuring Logging............................................................................................................................................................ |
60 |
Audit and Security Logs................................................................................................................................................ |
60 |
Configuring Logging Format ................................................................................................................................ |
62 |
Display the Logging Buffer and the Logging Configuration..................................................................................... |
62 |
Setting Up a Secure Connection to a Syslog Server....................................................................................... |
63 |
Sending System Messages to a Syslog Server.......................................................................................................... |
64 |
Track Login Activity............................................................................................................................................................ |
64 |
Restrictions for Tracking Login Activity...................................................................................................................... |
64 |
Configuring Login Activity Tracking............................................................................................................................ |
64 |
Display Login Statistics................................................................................................................................................. |
65 |
Limit Concurrent Login Sessions....................................................................................................................................... |
66 |
Restrictions for Limiting the Number of Concurrent Sessions................................................................................ |
66 |
Configuring Concurrent Session Limit........................................................................................................................ |
66 |
Enabling the System to Clear Existing Sessions........................................................................................................ |
67 |
Enabling Secured CLI Mode............................................................................................................................................... |
67 |
Log Messages in the Internal Buffer................................................................................................................................. |
68 |
Disabling System Logging................................................................................................................................................... |
68 |
Sending System Messages to a Syslog Server............................................................................................................... |
68 |
Configuring a UNIX System as a Syslog Server........................................................................................................ |
68 |
Changing System Logging Settings.................................................................................................................................. |
69 |
Display the Logging Buffer and the Logging Configuration........................................................................................... |
69 |
Configuring a UNIX Logging Facility Level....................................................................................................................... |
70 |
Synchronizing Log Messages............................................................................................................................................. |
71 |
Enabling Timestamp on Syslog Messages......................................................................................................................... |
71 |
File Transfer Services.......................................................................................................................................................... |
74 |
Enabling the FTP Server............................................................................................................................................... |
74 |
Configuring FTP Server Parameters........................................................................................................................... |
74 |
Configuring FTP Client Parameters............................................................................................................................ |
75 |
Terminal Lines...................................................................................................................................................................... |
75 |
Denying and Permitting Access to a Terminal Line................................................................................................... |
75 |
Configuring Login Authentication for Terminal Lines................................................................................................ |
76 |
Setting Timeout for EXEC Privilege Mode....................................................................................................................... |
77 |
Using Telnet to get to Another Network Device............................................................................................................. |
78 |
Lock CONFIGURATION Mode........................................................................................................................................... |
78 |
LPC Bus Quality Degradation............................................................................................................................................. |
79 |
Restoring the Factory Default Settings............................................................................................................................ |
79 |
Restoring Factory Default Environment Variables.................................................................................................... |
80 |
Viewing the Reason for Last System Reboot................................................................................................................... |
81 |
5 802.1X....................................................................................................................................... |
82 |
Port-Authentication Process............................................................................................................................................. |
83 |
EAP over RADIUS.......................................................................................................................................................... |
84 |
Configuring 802.1X.............................................................................................................................................................. |
84 |
Important Points to Remember......................................................................................................................................... |
85 |
4 Contents
Enabling 802.1X................................................................................................................................................................... |
85 |
Configuring Request Identity Re-Transmissions............................................................................................................. |
86 |
Configuring a Quiet Period after a Failed Authentication......................................................................................... |
87 |
Forcibly Authorizing or Unauthorizing a Port................................................................................................................... |
88 |
Re-Authenticating a Port................................................................................................................................................... |
88 |
Configuring Timeouts.......................................................................................................................................................... |
89 |
Configuring Dynamic VLAN Assignment with Port Authentication.............................................................................. |
90 |
Guest and Authentication-Fail VLANs............................................................................................................................... |
91 |
Configuring a Guest VLAN............................................................................................................................................ |
91 |
Configuring an Authentication-Fail VLAN................................................................................................................... |
91 |
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).......................... |
93 |
Optimizing CAM Utilization During the Attachment of ACLs to VLANs...................................................................... |
93 |
Guidelines for Configuring ACL VLAN Groups................................................................................................................ |
93 |
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters................................................... |
94 |
Configuring ACL VLAN Groups................................................................................................................................... |
94 |
Configuring FP Blocks for VLAN Parameters............................................................................................................ |
95 |
Viewing CAM Usage........................................................................................................................................................... |
95 |
Allocating FP Blocks for VLAN Processes....................................................................................................................... |
97 |
Unified Forwarding Table (UFT) Modes........................................................................................................................... |
97 |
Configuring UFT Modes................................................................................................................................................ |
97 |
7 Access Control Lists (ACLs)........................................................................................................ |
98 |
IP Access Control Lists (ACLs)......................................................................................................................................... |
99 |
CAM Usage.................................................................................................................................................................... |
99 |
Implementing ACLs on Dell EMC Networking OS................................................................................................... |
100 |
Important Points to Remember........................................................................................................................................ |
101 |
Configuration Task List for Route Maps.................................................................................................................... |
101 |
Configuring Match Routes.......................................................................................................................................... |
103 |
Configuring Set Conditions......................................................................................................................................... |
104 |
Configure a Route Map for Route Redistribution.................................................................................................... |
105 |
Configure a Route Map for Route Tagging.............................................................................................................. |
106 |
Continue Clause........................................................................................................................................................... |
106 |
IP Fragment Handling........................................................................................................................................................ |
106 |
IP Fragments ACL Examples...................................................................................................................................... |
106 |
Layer 4 ACL Rules Examples...................................................................................................................................... |
107 |
Configure a Standard IP ACL........................................................................................................................................... |
108 |
Configuring a Standard IP ACL Filter........................................................................................................................ |
108 |
Configure an Extended IP ACL........................................................................................................................................ |
109 |
Configuring Filters with a Sequence Number........................................................................................................... |
109 |
Configuring Filters Without a Sequence Number..................................................................................................... |
110 |
Configure Layer 2 and Layer 3 ACLs................................................................................................................................ |
111 |
Assign an IP ACL to an Interface....................................................................................................................................... |
111 |
Applying an IP ACL............................................................................................................................................................. |
112 |
Counting ACL Hits........................................................................................................................................................ |
112 |
Configure Ingress ACLs..................................................................................................................................................... |
112 |
Configure Egress ACLs...................................................................................................................................................... |
113 |
Applying Egress Layer 3 ACLs (Control-Plane)........................................................................................................ |
114 |
IP Prefix Lists....................................................................................................................................................................... |
114 |
Contents 5
Configuration Task List for Prefix Lists...................................................................................................................... |
115 |
ACL Remarks....................................................................................................................................................................... |
118 |
Configuring a Remark................................................................................................................................................... |
118 |
Deleting a Remark......................................................................................................................................................... |
118 |
ACL Resequencing............................................................................................................................................................. |
119 |
Resequencing an ACL or Prefix List........................................................................................................................... |
119 |
Route Maps........................................................................................................................................................................ |
120 |
Logging of ACL Processes................................................................................................................................................ |
121 |
Guidelines for Configuring ACL Logging.................................................................................................................... |
121 |
Configuring ACL Logging............................................................................................................................................ |
122 |
Flow-Based Monitoring..................................................................................................................................................... |
122 |
Enabling Flow-Based Monitoring................................................................................................................................ |
124 |
Configuring UDF ACL........................................................................................................................................................ |
124 |
Configuring IP Mirror Access Group................................................................................................................................ |
127 |
Sample Configuration................................................................................................................................................... |
127 |
Example of viewing IP mirror–access–group applied to an Interface................................................................... |
127 |
8 Bidirectional Forwarding Detection (BFD)................................................................................... |
129 |
How BFD Works................................................................................................................................................................. |
129 |
BFD Packet Format..................................................................................................................................................... |
130 |
BFD Sessions................................................................................................................................................................. |
131 |
BFD Three-Way Handshake....................................................................................................................................... |
132 |
Session State Changes................................................................................................................................................ |
133 |
Important Points to Remember........................................................................................................................................ |
133 |
Configure BFD.................................................................................................................................................................... |
133 |
Configure BFD for Physical Ports.............................................................................................................................. |
134 |
Configure BFD for Static Routes............................................................................................................................... |
135 |
Configure BFD for IPv6 Static Routes...................................................................................................................... |
138 |
Configure BFD for OSPF............................................................................................................................................ |
140 |
Configure BFD for OSPFv3........................................................................................................................................ |
145 |
Configure BFD for IS-IS............................................................................................................................................... |
147 |
Configure BFD for BGP............................................................................................................................................... |
149 |
Configure BFD for VRRP............................................................................................................................................ |
156 |
Configuring Protocol Liveness.................................................................................................................................... |
158 |
9 Border Gateway Protocol (BGP)................................................................................................ |
159 |
BGP IP version 4 (BGPv4) Overview............................................................................................................................. |
159 |
BGP Autonomous Systems........................................................................................................................................ |
159 |
AS4 Number Representation....................................................................................................................................... |
161 |
Four-Byte AS Numbers............................................................................................................................................... |
163 |
BGP router ID............................................................................................................................................................... |
163 |
Sessions and Peers...................................................................................................................................................... |
163 |
Establish a Session....................................................................................................................................................... |
163 |
BGP Attributes for selecting Best Path.................................................................................................................... |
164 |
Multiprotocol BGP....................................................................................................................................................... |
169 |
BGP global and address family configuration........................................................................................................... |
170 |
Implement BGP with Dell EMC Networking OS....................................................................................................... |
171 |
Configuration Information........................................................................................................................................... |
174 |
Basic BGP configuration tasks......................................................................................................................................... |
174 |
6 Contents
Prerequisite for configuring a BGP network............................................................................................................. |
174 |
Restrictions................................................................................................................................................................... |
174 |
Enabling BGP................................................................................................................................................................ |
174 |
Enabling four-byte autonomous system numbers................................................................................................... |
176 |
Changing a BGP router ID........................................................................................................................................... |
177 |
Configuring AS4 Number Representations............................................................................................................... |
177 |
Configuring a BGP peer............................................................................................................................................... |
178 |
Example-Configuring BGP routing between peers.................................................................................................. |
179 |
BGP peer group............................................................................................................................................................ |
180 |
Advanced BGP configuration tasks................................................................................................................................. |
187 |
Route-refresh and Soft-reconfiguration................................................................................................................... |
187 |
Aggregating Routes..................................................................................................................................................... |
189 |
Filtering BGP.................................................................................................................................................................. |
191 |
Configuring BGP Fast Fall-Over................................................................................................................................. |
196 |
Configuring Passive Peering....................................................................................................................................... |
197 |
Enabling Graceful Restart........................................................................................................................................... |
198 |
Redistributing Routes.................................................................................................................................................. |
199 |
Redistributing iBGP Routes into IGP......................................................................................................................... |
199 |
Enabling Additional Paths........................................................................................................................................... |
202 |
Configuring IP Community Lists................................................................................................................................ |
202 |
Configuring an IP Extended Community List........................................................................................................... |
203 |
Configure BGP attributes........................................................................................................................................... |
204 |
Enabling Multipath....................................................................................................................................................... |
207 |
Route Reflectors......................................................................................................................................................... |
208 |
Enabling Route Flap Dampening................................................................................................................................ |
209 |
Changing BGP keepalive and hold timers.................................................................................................................. |
211 |
Setting the extended timer......................................................................................................................................... |
212 |
Enabling or disabling BGP neighbors......................................................................................................................... |
212 |
Route Map Continue.................................................................................................................................................... |
213 |
Configuring BGP Confederations............................................................................................................................... |
214 |
Configuring a BGP VRF address family..................................................................................................................... |
214 |
Maintaining Existing AS Numbers During an AS Migration..................................................................................... |
215 |
Allowing an AS Number to Appear in its Own AS Path........................................................................................... |
216 |
Enabling MBGP Configurations.................................................................................................................................. |
217 |
MBGP support for IPv6............................................................................................................................................... |
217 |
Configuring IPv6 MBGP between peers................................................................................................................... |
217 |
Example-Configuring IPv4 and IPv6 neighbors........................................................................................................ |
218 |
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor............................................ |
220 |
BGP Regular Expression Optimization...................................................................................................................... |
222 |
Debugging BGP........................................................................................................................................................... |
222 |
10 Content Addressable Memory (CAM)........................................................................................ |
224 |
CAM Allocation.................................................................................................................................................................. |
224 |
Test CAM Usage............................................................................................................................................................... |
225 |
View CAM-ACL Settings.................................................................................................................................................. |
226 |
View CAM Usage............................................................................................................................................................... |
227 |
Configuring CAM Threshold and Silence Period........................................................................................................... |
228 |
CAM Optimization............................................................................................................................................................. |
229 |
Troubleshoot CAM Profiling............................................................................................................................................. |
229 |
QoS CAM Region Limitation...................................................................................................................................... |
229 |
Contents 7
11 Control Plane Policing (CoPP).................................................................................................. |
230 |
Configure Control Plane Policing..................................................................................................................................... |
231 |
Configuring CoPP for Protocols................................................................................................................................ |
232 |
Configuring CoPP for CPU Queues.......................................................................................................................... |
233 |
CoPP for OSPFv3 Packets........................................................................................................................................ |
234 |
Configuring CoPP for OSPFv3.................................................................................................................................. |
236 |
Displaying CoPP Configuration ................................................................................................................................. |
237 |
12 Data Center Bridging (DCB)..................................................................................................... |
239 |
Ethernet Enhancements in Data Center Bridging......................................................................................................... |
239 |
Priority-Based Flow Control....................................................................................................................................... |
240 |
Enhanced Transmission Selection.............................................................................................................................. |
241 |
Data Center Bridging Exchange Protocol (DCBx).................................................................................................. |
242 |
Data Center Bridging in a Traffic Flow..................................................................................................................... |
242 |
Enabling Data Center Bridging......................................................................................................................................... |
242 |
DCB Maps and its Attributes..................................................................................................................................... |
243 |
Data Center Bridging: Default Configuration................................................................................................................. |
243 |
Configuring Priority-Based Flow Control....................................................................................................................... |
244 |
Configuring Lossless Queues..................................................................................................................................... |
244 |
Configuring PFC in a DCB Map....................................................................................................................................... |
246 |
Applying a DCB Map on a Port........................................................................................................................................ |
247 |
Configuring PFC without a DCB Map............................................................................................................................. |
247 |
Priority-Based Flow Control Using Dynamic Buffer Method....................................................................................... |
249 |
Behavior of Tagged Packets............................................................................................................................................ |
249 |
Configuration Example for DSCP and PFC Priorities................................................................................................... |
250 |
Using PFC to Manage Converged Ethernet Traffic...................................................................................................... |
251 |
Configure Enhanced Transmission Selection................................................................................................................. |
251 |
ETS Prerequisites and Restrictions........................................................................................................................... |
251 |
Creating an ETS Priority Group.................................................................................................................................. |
251 |
ETS Operation with DCBx.......................................................................................................................................... |
252 |
Configuring Bandwidth Allocation for DCBx CIN.................................................................................................... |
253 |
Configuring ETS in a DCB Map................................................................................................................................. |
253 |
Hierarchical Scheduling in ETS Output Policies............................................................................................................ |
254 |
Using ETS to Manage Converged Ethernet Traffic..................................................................................................... |
255 |
Applying DCB Policies in a Switch Stack....................................................................................................................... |
255 |
Configure a DCBx Operation........................................................................................................................................... |
255 |
DCBx Operation........................................................................................................................................................... |
255 |
DCBx Port Roles.......................................................................................................................................................... |
255 |
DCB Configuration Exchange.................................................................................................................................... |
257 |
Configuration Source Election................................................................................................................................... |
257 |
Propagation of DCB Information............................................................................................................................... |
257 |
Auto-Detection and Manual Configuration of the DCBx Version......................................................................... |
258 |
DCBx Example............................................................................................................................................................. |
258 |
DCBx Prerequisites and Restrictions........................................................................................................................ |
259 |
Configuring DCBx........................................................................................................................................................ |
259 |
Verifying the DCB Configuration..................................................................................................................................... |
262 |
QoS dot1p Traffic Classification and Queue Assignment............................................................................................. |
270 |
Configuring the Dynamic Buffer Method........................................................................................................................ |
271 |
8 Contents
Sample DCB Configuration.............................................................................................................................................. |
272 |
13 Dynamic Host Configuration Protocol (DHCP)........................................................................... |
275 |
DHCP Packet Format and Options................................................................................................................................. |
275 |
Assign an IP Address using DHCP................................................................................................................................... |
276 |
Implementation Information............................................................................................................................................. |
277 |
Configure the System to be a DHCP Server................................................................................................................. |
278 |
Configuring the Server for Automatic Address Allocation..................................................................................... |
278 |
Specifying a Default Gateway.................................................................................................................................... |
279 |
Configure a Method of Hostname Resolution......................................................................................................... |
279 |
Using DNS for Address Resolution............................................................................................................................ |
279 |
Using NetBIOS WINS for Address Resolution......................................................................................................... |
280 |
Creating Manual Binding Entries............................................................................................................................... |
280 |
Debugging the DHCP Server..................................................................................................................................... |
280 |
Using DHCP Clear Commands.................................................................................................................................. |
280 |
Configure the System to be a Relay Agent.................................................................................................................... |
281 |
Configure the System to be a DHCP Client.................................................................................................................. |
282 |
Configuring the DHCP Client System....................................................................................................................... |
282 |
DHCP Client on a Management Interface................................................................................................................ |
283 |
DHCP Client Operation with Other Features.......................................................................................................... |
284 |
DHCP Relay When DHCP Server and Client are in Different VRFs........................................................................... |
285 |
Configuring Route Leaking between VRFs on DHCP Relay Agent...................................................................... |
285 |
Non-default VRF configuration for DHCPv6 helper address...................................................................................... |
286 |
Configuring DHCP relay source interface...................................................................................................................... |
286 |
Global DHCP relay source IPv4 or IPv6 configuration .......................................................................................... |
286 |
Interface level DHCP relay source IPv4 or IPv6 configuration ............................................................................. |
287 |
Configure the System for User Port Stacking (Option 230)...................................................................................... |
288 |
Configure Secure DHCP.................................................................................................................................................. |
288 |
Option 82 (DHCPv4 relay options)........................................................................................................................... |
288 |
DHCPv6 relay agent options..................................................................................................................................... |
289 |
DHCP Snooping........................................................................................................................................................... |
289 |
Drop DHCP Packets on Snooped VLANs Only....................................................................................................... |
293 |
Dynamic ARP Inspection............................................................................................................................................ |
294 |
Configuring Dynamic ARP Inspection....................................................................................................................... |
294 |
Source Address Validation............................................................................................................................................... |
295 |
Enabling IP Source Address Validation..................................................................................................................... |
295 |
DHCP MAC Source Address Validation................................................................................................................... |
296 |
Enabling IP+MAC Source Address Validation.......................................................................................................... |
296 |
Viewing the Number of SAV Dropped Packets....................................................................................................... |
297 |
Clearing the Number of SAV Dropped Packets...................................................................................................... |
297 |
14 Equal Cost Multi-Path (ECMP)................................................................................................. |
298 |
ECMP for Flow-Based Affinity........................................................................................................................................ |
298 |
Configuring the Hash Algorithm................................................................................................................................ |
298 |
Enabling Deterministic ECMP Next Hop.................................................................................................................. |
298 |
Configuring the Hash Algorithm Seed...................................................................................................................... |
298 |
Link Bundle Monitoring..................................................................................................................................................... |
299 |
Managing ECMP Group Paths.................................................................................................................................. |
299 |
Creating an ECMP Group Bundle............................................................................................................................. |
300 |
Contents 9
Modifying the ECMP Group Threshold.................................................................................................................... |
300 |
RTAG7................................................................................................................................................................................. |
301 |
Flow-based Hashing for ECMP....................................................................................................................................... |
302 |
15 FIP Snooping.......................................................................................................................... |
305 |
Fibre Channel over Ethernet........................................................................................................................................... |
305 |
Ensure Robustness in a Converged Ethernet Network............................................................................................... |
305 |
FIP Snooping on Ethernet Bridges.................................................................................................................................. |
306 |
FIP Snooping in a Switch Stack...................................................................................................................................... |
308 |
Using FIP Snooping........................................................................................................................................................... |
308 |
FIP Snooping Prerequisites........................................................................................................................................ |
308 |
Important Points to Remember................................................................................................................................. |
308 |
Enabling the FCoE Transit Feature........................................................................................................................... |
309 |
Enable FIP Snooping on VLANs................................................................................................................................ |
309 |
Configure the FC-MAP Value..................................................................................................................................... |
310 |
Configure a Port for a Bridge-to-Bridge Link........................................................................................................... |
310 |
Configure a Port for a Bridge-to-FCF Link............................................................................................................... |
310 |
Impact on Other Software Features......................................................................................................................... |
310 |
FIP Snooping Restrictions........................................................................................................................................... |
310 |
Configuring FIP Snooping............................................................................................................................................ |
311 |
Displaying FIP Snooping Information................................................................................................................................ |
311 |
FCoE Transit Configuration Example.............................................................................................................................. |
316 |
16 FIPS Cryptography.................................................................................................................. |
318 |
Configuration Tasks........................................................................................................................................................... |
318 |
Preparing the System........................................................................................................................................................ |
318 |
Enabling FIPS Mode........................................................................................................................................................... |
318 |
Generating Host-Keys....................................................................................................................................................... |
319 |
Monitoring FIPS Mode Status.......................................................................................................................................... |
319 |
Disabling FIPS Mode.......................................................................................................................................................... |
319 |
17 Force10 Resilient Ring Protocol (FRRP)..................................................................................... |
321 |
Protocol Overview............................................................................................................................................................. |
321 |
Ring Status................................................................................................................................................................... |
322 |
Multiple FRRP Rings................................................................................................................................................... |
322 |
Important FRRP Points............................................................................................................................................... |
323 |
Important FRRP Concepts......................................................................................................................................... |
324 |
Implementing FRRP.......................................................................................................................................................... |
324 |
FRRP Configuration.......................................................................................................................................................... |
325 |
Creating the FRRP Group.......................................................................................................................................... |
325 |
Configuring the Control VLAN................................................................................................................................... |
325 |
Configuring and Adding the Member VLANs.......................................................................................................... |
326 |
Setting the FRRP Timers............................................................................................................................................ |
327 |
Clearing the FRRP Counters...................................................................................................................................... |
327 |
Viewing the FRRP Configuration............................................................................................................................... |
327 |
Viewing the FRRP Information.................................................................................................................................. |
327 |
Troubleshooting FRRP...................................................................................................................................................... |
328 |
Sample Configuration and Topology............................................................................................................................... |
328 |
FRRP Support on VLT...................................................................................................................................................... |
329 |
10 Contents
18 GARP VLAN Registration Protocol (GVRP)................................................................................ |
332 |
Configure GVRP................................................................................................................................................................ |
333 |
Enabling GVRP Globally.................................................................................................................................................... |
333 |
Enabling GVRP on a Layer 2 Interface........................................................................................................................... |
334 |
Configure GVRP Registration.......................................................................................................................................... |
334 |
Configure a GARP Timer.................................................................................................................................................. |
335 |
RPM Redundancy............................................................................................................................................................. |
335 |
19 High Availability (HA).............................................................................................................. |
336 |
Component Redundancy.................................................................................................................................................. |
336 |
Automatic and Manual Stack Unit Failover.............................................................................................................. |
336 |
Synchronization between Management and Standby Units.................................................................................. |
337 |
Forcing a Stack Unit Failover..................................................................................................................................... |
337 |
Specifying an Auto-Failover Limit.............................................................................................................................. |
337 |
Disabling Auto-Reboot................................................................................................................................................ |
337 |
Pre-Configuring a Stack Unit Slot................................................................................................................................... |
338 |
Removing a Provisioned Logical Stack Unit.................................................................................................................. |
338 |
Hitless Behavior................................................................................................................................................................. |
338 |
Graceful Restart................................................................................................................................................................ |
338 |
Software Resiliency........................................................................................................................................................... |
339 |
Software Component Health Monitoring................................................................................................................. |
339 |
System Health Monitoring......................................................................................................................................... |
339 |
Failure and Event Logging.......................................................................................................................................... |
339 |
Hot-Lock Behavior............................................................................................................................................................ |
340 |
20 Internet Group Management Protocol (IGMP)........................................................................... |
341 |
IGMP Protocol Overview.................................................................................................................................................. |
341 |
IGMP Version 2............................................................................................................................................................ |
341 |
IGMP Version 3............................................................................................................................................................ |
342 |
Configure IGMP................................................................................................................................................................. |
345 |
Viewing IGMP Enabled Interfaces................................................................................................................................... |
345 |
Selecting an IGMP Version.............................................................................................................................................. |
346 |
Viewing IGMP Groups....................................................................................................................................................... |
347 |
Adjusting Timers................................................................................................................................................................ |
347 |
Adjusting Query and Response Timers..................................................................................................................... |
347 |
Preventing a Host from Joining a Group........................................................................................................................ |
348 |
Enabling IGMP Immediate-Leave.................................................................................................................................... |
350 |
IGMP Snooping.................................................................................................................................................................. |
351 |
Configuring IGMP Snooping....................................................................................................................................... |
351 |
Removing a Group-Port Association......................................................................................................................... |
351 |
Disabling Multicast Flooding....................................................................................................................................... |
352 |
Specifying a Port as Connected to a Multicast Router.......................................................................................... |
352 |
Configuring the Switch as Querier............................................................................................................................ |
352 |
Fast Convergence after MSTP Topology Changes...................................................................................................... |
353 |
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................... |
353 |
Designating a Multicast Router Interface...................................................................................................................... |
359 |
21 Interfaces............................................................................................................................... |
360 |
Contents 11
Interface Types.................................................................................................................................................................. |
361 |
View Basic Interface Information..................................................................................................................................... |
361 |
Resetting an Interface to its Factory Default State..................................................................................................... |
363 |
Enabling a Physical Interface........................................................................................................................................... |
363 |
Physical Interfaces............................................................................................................................................................ |
363 |
Configuration Task List for Physical Interfaces....................................................................................................... |
364 |
Overview of Layer Modes.......................................................................................................................................... |
364 |
Configuring Layer 2 (Data Link) Mode..................................................................................................................... |
364 |
Configuring Layer 2 (Interface) Mode...................................................................................................................... |
365 |
Configuring Layer 3 (Network) Mode...................................................................................................................... |
365 |
Configuring Layer 3 (Interface) Mode...................................................................................................................... |
365 |
Automatic recovery of an Err-disabled interface.......................................................................................................... |
366 |
Configuring an automatic recovery for an Err-disabled interface......................................................................... |
366 |
Egress Interface Selection (EIS)..................................................................................................................................... |
367 |
Configuring EIS............................................................................................................................................................ |
367 |
Management Interfaces................................................................................................................................................... |
368 |
Configuring Management Interfaces........................................................................................................................ |
368 |
Configuring a Management Interface on an Ethernet Port................................................................................... |
369 |
VLAN Interfaces................................................................................................................................................................ |
370 |
Loopback Interfaces......................................................................................................................................................... |
370 |
Null Interfaces..................................................................................................................................................................... |
371 |
Configuring Port Delay...................................................................................................................................................... |
371 |
Port Channel Interfaces.................................................................................................................................................... |
371 |
Port Channel Definition and Standards..................................................................................................................... |
371 |
Port Channel Benefits................................................................................................................................................. |
372 |
Port Channel Implementation.................................................................................................................................... |
372 |
Interfaces in Port Channels........................................................................................................................................ |
372 |
Configuration Tasks for Port Channel Interfaces.................................................................................................... |
372 |
Creating a Port Channel............................................................................................................................................. |
373 |
Adding a Physical Interface to a Port Channel........................................................................................................ |
373 |
Reassigning an Interface to a New Port Channel................................................................................................... |
375 |
Configuring the Minimum Oper Up Links in a Port Channel.................................................................................. |
375 |
Adding or Removing a Port Channel from a VLAN................................................................................................. |
375 |
Assigning an IP Address to a Port Channel.............................................................................................................. |
376 |
Deleting or Disabling a Port Channel......................................................................................................................... |
377 |
Load Balancing Through Port Channels.................................................................................................................... |
377 |
Changing the Hash Algorithm.................................................................................................................................... |
377 |
Bulk Configuration............................................................................................................................................................. |
378 |
Interface Range........................................................................................................................................................... |
378 |
Bulk Configuration Examples...................................................................................................................................... |
378 |
Defining Interface Range Macros.................................................................................................................................... |
379 |
Define the Interface Range........................................................................................................................................ |
380 |
Choosing an Interface-Range Macro........................................................................................................................ |
380 |
Monitoring and Maintaining Interfaces........................................................................................................................... |
380 |
Maintenance Using TDR.............................................................................................................................................. |
381 |
Non Dell-Qualified Transceivers....................................................................................................................................... |
381 |
Splitting 40G Ports without Reload................................................................................................................................ |
382 |
Splitting QSFP Ports to SFP+ Ports.............................................................................................................................. |
383 |
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..................................................................................... |
384 |
Link Dampening................................................................................................................................................................. |
386 |
12 Contents
Enabling Link Dampening............................................................................................................................................ |
388 |
Link Bundle Monitoring..................................................................................................................................................... |
389 |
Using Ethernet Pause Frames for Flow Control........................................................................................................... |
389 |
Enabling Pause Frames............................................................................................................................................... |
390 |
Configure the MTU Size on an Interface....................................................................................................................... |
390 |
Port-Pipes........................................................................................................................................................................... |
391 |
Auto-Negotiation on Ethernet Interfaces....................................................................................................................... |
391 |
Setting the Speed of Ethernet Interfaces................................................................................................................ |
392 |
Set Auto-Negotiation Options................................................................................................................................... |
393 |
View Advanced Interface Information............................................................................................................................ |
393 |
Configuring the Interface Sampling Size.................................................................................................................. |
394 |
Configuring the Traffic Sampling Size Globally............................................................................................................. |
395 |
Dynamic Counters............................................................................................................................................................. |
396 |
Clearing Interface Counters....................................................................................................................................... |
397 |
Discard Counters............................................................................................................................................................... |
397 |
Display discard counters............................................................................................................................................. |
397 |
22 Internet Protocol Security (IPSec)........................................................................................... |
399 |
Configuring IPSec ............................................................................................................................................................ |
399 |
23 IPv4 Routing........................................................................................................................... |
401 |
IP Addresses...................................................................................................................................................................... |
402 |
Configuration Tasks for IP Addresses............................................................................................................................ |
402 |
Assigning IP Addresses to an Interface.......................................................................................................................... |
402 |
Configuring Static Routes................................................................................................................................................ |
403 |
Adding description for IPv4 and IPv6 static routes................................................................................................ |
404 |
Configure Static Routes for the Management Interface............................................................................................. |
404 |
IPv4 Path MTU Discovery Overview.............................................................................................................................. |
405 |
Using the Configured Source IP Address in ICMP Messages..................................................................................... |
405 |
Configuring the Duration to Establish a TCP Connection........................................................................................... |
406 |
Enabling Directed Broadcast........................................................................................................................................... |
406 |
Resolution of Host Names............................................................................................................................................... |
406 |
Enabling Dynamic Resolution of Host Names................................................................................................................ |
407 |
Specifying the Local System Domain and a List of Domains....................................................................................... |
407 |
Configuring DNS with Traceroute................................................................................................................................... |
407 |
ARP..................................................................................................................................................................................... |
408 |
Configuration Tasks for ARP........................................................................................................................................... |
408 |
Configuring Static ARP Entries....................................................................................................................................... |
408 |
Enabling Proxy ARP.......................................................................................................................................................... |
409 |
Clearing ARP Cache.......................................................................................................................................................... |
409 |
ARP Learning via Gratuitous ARP................................................................................................................................... |
409 |
Enabling ARP Learning via Gratuitous ARP.................................................................................................................... |
410 |
ARP Learning via ARP Request....................................................................................................................................... |
410 |
Configuring ARP Retries.................................................................................................................................................... |
411 |
ICMP..................................................................................................................................................................................... |
411 |
Configuration Tasks for ICMP........................................................................................................................................... |
411 |
Enabling ICMP Unreachable Messages........................................................................................................................... |
411 |
ICMP Redirects.................................................................................................................................................................. |
412 |
UDP Helper......................................................................................................................................................................... |
412 |
Contents 13
Enabling UDP Helper......................................................................................................................................................... |
413 |
Configuring a Broadcast Address.................................................................................................................................... |
413 |
Configurations Using UDP Helper.................................................................................................................................... |
414 |
UDP Helper with Broadcast-All Addresses..................................................................................................................... |
414 |
UDP Helper with Subnet Broadcast Addresses............................................................................................................. |
415 |
UDP Helper with Configured Broadcast Addresses...................................................................................................... |
415 |
UDP Helper with No Configured Broadcast Addresses................................................................................................ |
416 |
Troubleshooting UDP Helper............................................................................................................................................ |
416 |
24 IPv6 Routing........................................................................................................................... |
417 |
Protocol Overview............................................................................................................................................................. |
417 |
Extended Address Space............................................................................................................................................ |
417 |
Stateless Autoconfiguration........................................................................................................................................ |
417 |
IPv6 Headers................................................................................................................................................................ |
418 |
IPv6 Header Fields....................................................................................................................................................... |
418 |
Extension Header Fields............................................................................................................................................. |
420 |
Addressing..................................................................................................................................................................... |
421 |
Implementing IPv6 with Dell EMC Networking OS....................................................................................................... |
421 |
ICMPv6............................................................................................................................................................................... |
423 |
Path MTU discovery......................................................................................................................................................... |
423 |
IPv6 Neighbor Discovery.................................................................................................................................................. |
424 |
IPv6 Neighbor Discovery of MTU Packets.............................................................................................................. |
425 |
Configuration Task List for IPv6 RDNSS....................................................................................................................... |
425 |
Configuring the IPv6 Recursive DNS Server........................................................................................................... |
425 |
Debugging IPv6 RDNSS Information Sent to the Host ......................................................................................... |
426 |
Displaying IPv6 RDNSS Information......................................................................................................................... |
426 |
Secure Shell (SSH) Over an IPv6 Transport................................................................................................................. |
427 |
Configuration Tasks for IPv6........................................................................................................................................... |
427 |
Adjusting Your CAM-Profile....................................................................................................................................... |
427 |
Assigning an IPv6 Address to an Interface.............................................................................................................. |
428 |
Assigning a Static IPv6 Route.................................................................................................................................... |
428 |
Configuring Telnet with IPv6..................................................................................................................................... |
429 |
SNMP over IPv6.......................................................................................................................................................... |
429 |
Displaying IPv6 Information........................................................................................................................................ |
429 |
Displaying an IPv6 Interface Information.................................................................................................................. |
430 |
Showing IPv6 Routes.................................................................................................................................................. |
430 |
Showing the Running-Configuration for an Interface............................................................................................. |
431 |
Clearing IPv6 Routes................................................................................................................................................... |
432 |
Disabling ND Entry Timeout....................................................................................................................................... |
432 |
Configuring IPv6 RA Guard.............................................................................................................................................. |
432 |
Configuring IPv6 RA Guard on an Interface............................................................................................................ |
434 |
Monitoring IPv6 RA Guard......................................................................................................................................... |
434 |
25 iSCSI Optimization................................................................................................................. |
435 |
iSCSI Optimization Overview........................................................................................................................................... |
435 |
Monitoring iSCSI Traffic Flows.................................................................................................................................. |
436 |
Application of Quality of Service to iSCSI Traffic Flows........................................................................................ |
436 |
Information Monitored in iSCSI Traffic Flows.......................................................................................................... |
437 |
Detection and Auto-Configuration for Dell EqualLogic Arrays.............................................................................. |
437 |
14 Contents
Configuring Detection and Ports for Dell Compellent Arrays................................................................................ |
438 |
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................. |
438 |
Enable and Disable iSCSI Optimization..................................................................................................................... |
439 |
Default iSCSI Optimization Values.................................................................................................................................. |
439 |
iSCSI Optimization Prerequisites..................................................................................................................................... |
439 |
Configuring iSCSI Optimization....................................................................................................................................... |
440 |
Displaying iSCSI Optimization Information...................................................................................................................... |
441 |
26 Intermediate System to Intermediate System........................................................................... |
443 |
IS-IS Protocol Overview................................................................................................................................................... |
443 |
IS-IS Addressing................................................................................................................................................................ |
443 |
Multi-Topology IS-IS......................................................................................................................................................... |
444 |
Transition Mode........................................................................................................................................................... |
444 |
Interface Support........................................................................................................................................................ |
444 |
Adjacencies................................................................................................................................................................... |
444 |
Graceful Restart................................................................................................................................................................ |
445 |
Timers........................................................................................................................................................................... |
445 |
Implementation Information............................................................................................................................................. |
445 |
Configuration Information................................................................................................................................................ |
446 |
Configuration Tasks for IS-IS..................................................................................................................................... |
446 |
Configuring the Distance of a Route........................................................................................................................ |
453 |
Changing the IS-Type................................................................................................................................................. |
453 |
Redistributing IPv4 Routes........................................................................................................................................ |
455 |
Redistributing IPv6 Routes........................................................................................................................................ |
455 |
Configuring Authentication Passwords.................................................................................................................... |
456 |
Setting the Overload Bit............................................................................................................................................. |
456 |
Debugging IS-IS........................................................................................................................................................... |
457 |
IS-IS Metric Styles............................................................................................................................................................ |
458 |
Configure Metric Values................................................................................................................................................... |
458 |
Maximum Values in the Routing Table..................................................................................................................... |
458 |
Change the IS-IS Metric Style in One Level Only................................................................................................... |
458 |
Leaks from One Level to Another............................................................................................................................. |
460 |
Sample Configurations..................................................................................................................................................... |
460 |
27 Link Aggregation Control Protocol (LACP)................................................................................ |
463 |
Introduction to Dynamic LAGs and LACP...................................................................................................................... |
463 |
Important Points to Remember................................................................................................................................. |
463 |
LACP Modes................................................................................................................................................................ |
463 |
Configuring LACP Commands................................................................................................................................... |
464 |
LACP Configuration Tasks............................................................................................................................................... |
464 |
Creating a LAG............................................................................................................................................................ |
464 |
Configuring the LAG Interfaces as Dynamic............................................................................................................ |
465 |
Setting the LACP Long Timeout............................................................................................................................... |
465 |
Monitoring and Debugging LACP.............................................................................................................................. |
466 |
Shared LAG State Tracking............................................................................................................................................. |
466 |
Configuring Shared LAG State Tracking.................................................................................................................. |
467 |
Important Points about Shared LAG State Tracking.............................................................................................. |
468 |
LACP Basic Configuration Example................................................................................................................................ |
468 |
Configure a LAG on ALPHA....................................................................................................................................... |
468 |
Contents 15
28 Layer 2................................................................................................................................... |
476 |
Manage the MAC Address Table.................................................................................................................................... |
476 |
Clearing the MAC Address Table.............................................................................................................................. |
476 |
Setting the Aging Time for Dynamic Entries............................................................................................................ |
476 |
Configuring a Static MAC Address........................................................................................................................... |
476 |
Displaying the MAC Address Table............................................................................................................................ |
477 |
MAC Learning Limit........................................................................................................................................................... |
477 |
Setting the MAC Learning Limit................................................................................................................................ |
477 |
mac learning-limit Dynamic......................................................................................................................................... |
478 |
mac learning-limit mac-address-sticky..................................................................................................................... |
478 |
mac learning-limit station-move................................................................................................................................ |
478 |
mac learning-limit no-station-move.......................................................................................................................... |
478 |
Learning Limit Violation Actions................................................................................................................................. |
479 |
Setting Station Move Violation Actions.................................................................................................................... |
479 |
Recovering from Learning Limit and Station Move Violations............................................................................... |
479 |
Enabling port security................................................................................................................................................. |
480 |
NIC Teaming...................................................................................................................................................................... |
480 |
Configure Redundant Pairs............................................................................................................................................... |
481 |
Far-End Failure Detection................................................................................................................................................ |
484 |
FEFD State Changes.................................................................................................................................................. |
484 |
Configuring FEFD........................................................................................................................................................ |
485 |
Enabling FEFD on an Interface.................................................................................................................................. |
486 |
Debugging FEFD.......................................................................................................................................................... |
486 |
29 Link Layer Discovery Protocol (LLDP)....................................................................................... |
488 |
802.1AB (LLDP) Overview............................................................................................................................................... |
488 |
Protocol Data Units..................................................................................................................................................... |
488 |
Optional TLVs.................................................................................................................................................................... |
489 |
Management TLVs...................................................................................................................................................... |
489 |
TIA-1057 (LLDP-MED) Overview................................................................................................................................... |
490 |
TIA Organizationally Specific TLVs............................................................................................................................ |
491 |
Configure LLDP................................................................................................................................................................. |
494 |
CONFIGURATION versus INTERFACE Configurations............................................................................................... |
494 |
Enabling LLDP................................................................................................................................................................... |
495 |
Disabling and Undoing LLDP...................................................................................................................................... |
495 |
Enabling LLDP on Management Ports........................................................................................................................... |
495 |
Disabling and Undoing LLDP on Management Ports.............................................................................................. |
496 |
Advertising TLVs............................................................................................................................................................... |
496 |
Storing and Viewing Unrecognized LLDP TLVs............................................................................................................ |
497 |
Viewing the LLDP Configuration..................................................................................................................................... |
498 |
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................... |
498 |
Examples of Viewing Information Advertised by Neighbors.................................................................................. |
498 |
Configuring LLDPDU Intervals......................................................................................................................................... |
501 |
Configuring LLDP Notification Interval........................................................................................................................... |
501 |
Configuring LLDP Notification Interval.......................................................................................................................... |
502 |
Configuring Transmit and Receive Mode....................................................................................................................... |
502 |
Configuring the Time to Live Value................................................................................................................................ |
503 |
Debugging LLDP............................................................................................................................................................... |
503 |
16 Contents
Relevant Management Objects....................................................................................................................................... |
504 |
30 Microsoft Network Load Balancing........................................................................................... |
509 |
Configuring a Switch for NLB ......................................................................................................................................... |
510 |
Enabling a Switch for Multicast NLB......................................................................................................................... |
510 |
31 Multicast Source Discovery Protocol (MSDP)............................................................................ |
512 |
Anycast RP......................................................................................................................................................................... |
513 |
Implementation Information.............................................................................................................................................. |
514 |
Configure Multicast Source Discovery Protocol............................................................................................................ |
514 |
Related Configuration Tasks....................................................................................................................................... |
514 |
Enable MSDP...................................................................................................................................................................... |
518 |
Manage the Source-Active Cache.................................................................................................................................. |
519 |
Viewing the Source-Active Cache............................................................................................................................. |
519 |
Limiting the Source-Active Cache............................................................................................................................. |
519 |
Clearing the Source-Active Cache............................................................................................................................ |
519 |
Enabling the Rejected Source-Active Cache.......................................................................................................... |
520 |
Accept Source-Active Messages that Fail the RFP Check......................................................................................... |
520 |
Specifying Source-Active Messages.............................................................................................................................. |
522 |
Limiting the Source-Active Messages from a Peer...................................................................................................... |
523 |
Preventing MSDP from Caching a Local Source.......................................................................................................... |
523 |
Preventing MSDP from Caching a Remote Source..................................................................................................... |
523 |
Preventing MSDP from Advertising a Local Source..................................................................................................... |
524 |
Logging Changes in Peership States.............................................................................................................................. |
525 |
Terminating a Peership..................................................................................................................................................... |
525 |
Clearing Peer Statistics.................................................................................................................................................... |
525 |
Debugging MSDP.............................................................................................................................................................. |
526 |
MSDP with Anycast RP................................................................................................................................................... |
526 |
Configuring Anycast RP................................................................................................................................................... |
527 |
Reducing Source-Active Message Flooding............................................................................................................ |
528 |
Specifying the RP Address Used in SA Messages.................................................................................................. |
528 |
MSDP Sample Configurations......................................................................................................................................... |
530 |
32 Multicast Listener Discovery Protocol...................................................................................... |
533 |
MLD timers........................................................................................................................................................................ |
536 |
Reducing Host Response Burstiness........................................................................................................................ |
536 |
Configuring MLD Version................................................................................................................................................. |
536 |
Clearing MLD groups........................................................................................................................................................ |
537 |
Debugging MLD................................................................................................................................................................. |
537 |
Explicit Tracking................................................................................................................................................................. |
537 |
Reducing Leave Latency.................................................................................................................................................. |
537 |
Displaying MLD groups table........................................................................................................................................... |
537 |
Displaying MLD Interfaces............................................................................................................................................... |
538 |
33 Multiple Spanning Tree Protocol (MSTP)................................................................................. |
539 |
Spanning Tree Variations................................................................................................................................................. |
540 |
Implementation Information....................................................................................................................................... |
540 |
Configure Multiple Spanning Tree Protocol................................................................................................................... |
540 |
Related Configuration Tasks...................................................................................................................................... |
540 |
Contents 17
Enable Multiple Spanning Tree Globally.......................................................................................................................... |
541 |
Adding and Removing Interfaces..................................................................................................................................... |
541 |
Creating Multiple Spanning Tree Instances.................................................................................................................... |
541 |
Influencing MSTP Root Selection................................................................................................................................... |
542 |
Interoperate with Non-Dell Bridges................................................................................................................................ |
543 |
Changing the Region Name or Revision......................................................................................................................... |
543 |
Modifying Global Parameters.......................................................................................................................................... |
543 |
Modifying the Interface Parameters............................................................................................................................... |
544 |
Setting STP path cost as constant................................................................................................................................ |
545 |
Configuring an EdgePort.................................................................................................................................................. |
545 |
Flush MAC Addresses after a Topology Change.......................................................................................................... |
546 |
MSTP Sample Configurations......................................................................................................................................... |
546 |
Debugging and Verifying MSTP Configurations........................................................................................................... |
550 |
34 Multicast Features.................................................................................................................. |
552 |
Enabling IP Multicast........................................................................................................................................................ |
552 |
Implementation Information............................................................................................................................................. |
552 |
Multicast Policies............................................................................................................................................................... |
553 |
IPv4 Multicast Policies................................................................................................................................................ |
553 |
Understanding Multicast Traceroute (mtrace)............................................................................................................. |
559 |
Printing Multicast Traceroute (mtrace) Paths.............................................................................................................. |
559 |
Supported Error Codes..................................................................................................................................................... |
561 |
mtrace Scenarios............................................................................................................................................................... |
561 |
35 Multicast Listener Discovery Protocol...................................................................................... |
567 |
MLD timers........................................................................................................................................................................ |
570 |
Reducing Host Response Burstiness........................................................................................................................ |
570 |
Clearing MLD groups........................................................................................................................................................ |
570 |
Debugging MLD.................................................................................................................................................................. |
571 |
Explicit Tracking................................................................................................................................................................. |
571 |
Reducing Leave Latency................................................................................................................................................... |
571 |
Displaying MLD groups table............................................................................................................................................ |
571 |
Displaying MLD Interfaces................................................................................................................................................ |
571 |
MLD Snooping................................................................................................................................................................... |
572 |
Enable MLD Snooping................................................................................................................................................. |
572 |
Disable MLD Snooping................................................................................................................................................ |
572 |
Configure the switch as a querier............................................................................................................................. |
572 |
Specify port as connected to multicast router........................................................................................................ |
573 |
Enable Snooping Explicit Tracking............................................................................................................................. |
573 |
Display the MLD Snooping Table............................................................................................................................... |
573 |
36 Object Tracking...................................................................................................................... |
574 |
Object Tracking Overview................................................................................................................................................ |
574 |
Track Layer 2 Interfaces............................................................................................................................................. |
575 |
Track Layer 3 Interfaces............................................................................................................................................. |
575 |
Track IPv4 and IPv6 Routes...................................................................................................................................... |
575 |
Set Tracking Delays..................................................................................................................................................... |
576 |
VRRP Object Tracking................................................................................................................................................ |
577 |
Object Tracking Configuration......................................................................................................................................... |
577 |
18 Contents
Tracking a Layer 2 Interface....................................................................................................................................... |
577 |
Tracking a Layer 3 Interface...................................................................................................................................... |
578 |
Track an IPv4/IPv6 Route......................................................................................................................................... |
579 |
Displaying Tracked Objects.............................................................................................................................................. |
582 |
37 Open Shortest Path First (OSPFv2 and OSPFv3)...................................................................... |
584 |
Protocol Overview............................................................................................................................................................ |
584 |
Autonomous System (AS) Areas.............................................................................................................................. |
584 |
Area Types................................................................................................................................................................... |
585 |
Networks and Neighbors............................................................................................................................................ |
586 |
Router Types............................................................................................................................................................... |
586 |
Designated and Backup Designated Routers........................................................................................................... |
587 |
Link-State Advertisements (LSAs)........................................................................................................................... |
587 |
Router Priority and Cost............................................................................................................................................. |
588 |
OSPF with Dell EMC Networking OS............................................................................................................................. |
589 |
Graceful Restart.......................................................................................................................................................... |
589 |
Fast Convergence (OSPFv2, IPv4 Only)................................................................................................................. |
590 |
Multi-Process OSPFv2 with VRF............................................................................................................................. |
590 |
OSPF ACK Packing...................................................................................................................................................... |
591 |
Setting OSPF Adjacency with Cisco Routers.......................................................................................................... |
591 |
Configuration Information................................................................................................................................................. |
591 |
Configuration Task List for OSPFv2 (OSPF for IPv4)........................................................................................... |
592 |
OSPFv3 NSSA............................................................................................................................................................. |
603 |
Configuration Task List for OSPFv3 (OSPF for IPv6)........................................................................................... |
604 |
MIB Support for OSPFv3................................................................................................................................................. |
615 |
Viewing the OSPFv3 MIB........................................................................................................................................... |
615 |
Configuration Task List for OSPFv3 (OSPF for IPv6).................................................................................................. |
616 |
Enabling IPv6 Unicast Routing................................................................................................................................... |
616 |
Applying cost for OSPFv3.......................................................................................................................................... |
616 |
Assigning IPv6 Addresses on an Interface................................................................................................................ |
617 |
Assigning Area ID on an Interface.............................................................................................................................. |
617 |
Assigning OSPFv3 Process ID and Router ID Globally............................................................................................ |
617 |
Assigning OSPFv3 Process ID and Router ID to a VRF.......................................................................................... |
618 |
Configuring Stub Areas............................................................................................................................................... |
618 |
Configuring Passive-Interface.................................................................................................................................... |
618 |
Redistributing Routes.................................................................................................................................................. |
619 |
Configuring a Default Route....................................................................................................................................... |
619 |
Enabling OSPFv3 Graceful Restart........................................................................................................................... |
619 |
OSPFv3 Authentication Using IPsec......................................................................................................................... |
621 |
Troubleshooting OSPFv3........................................................................................................................................... |
627 |
38 Policy-based Routing (PBR).................................................................................................... |
628 |
Overview............................................................................................................................................................................ |
628 |
Implementing PBR............................................................................................................................................................. |
629 |
Configuration Task List for Policy-based Routing........................................................................................................ |
629 |
Create a Redirect List................................................................................................................................................. |
630 |
Create a Rule for a Redirect-list................................................................................................................................ |
630 |
Apply a Redirect-list to an Interface using a Redirect-group................................................................................. |
631 |
Sample Configuration....................................................................................................................................................... |
634 |
Contents 19
39 PIM Sparse-Mode (PIM-SM)................................................................................................... |
638 |
Implementation Information............................................................................................................................................. |
638 |
Protocol Overview............................................................................................................................................................ |
638 |
Requesting Multicast Traffic...................................................................................................................................... |
638 |
Refuse Multicast Traffic............................................................................................................................................. |
638 |
Send Multicast Traffic................................................................................................................................................ |
639 |
Configuring PIM-SM......................................................................................................................................................... |
639 |
Related Configuration Tasks...................................................................................................................................... |
639 |
Enable PIM-SM................................................................................................................................................................. |
639 |
Configuring S,G Expiry Timers......................................................................................................................................... |
641 |
Configuring a Static Rendezvous Point......................................................................................................................... |
642 |
Overriding Bootstrap Router Updates...................................................................................................................... |
642 |
Configuring a Designated Router.................................................................................................................................... |
643 |
Creating Multicast Boundaries and Domains................................................................................................................. |
644 |
Electing an RP using the BSR Mechanism.................................................................................................................... |
644 |
40 PIM Source-Specific Mode (PIM-SSM).................................................................................... |
646 |
Implementation Information............................................................................................................................................. |
646 |
Configure PIM-SSM......................................................................................................................................................... |
646 |
Enabling PIM-SSM............................................................................................................................................................ |
647 |
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................... |
647 |
Electing an RP using the BSR Mechanism.................................................................................................................... |
649 |
Enabling RP to Server Specific Multicast Groups.................................................................................................. |
650 |
41 Port Monitoring....................................................................................................................... |
651 |
Important Points to Remember....................................................................................................................................... |
651 |
Port Monitoring.................................................................................................................................................................. |
651 |
Configuring Port Monitoring............................................................................................................................................ |
654 |
Configuring Monitor Multicast Queue............................................................................................................................ |
655 |
Enabling Flow-Based Monitoring.................................................................................................................................... |
655 |
Remote Port Mirroring..................................................................................................................................................... |
656 |
Remote Port Mirroring Example................................................................................................................................ |
657 |
Configuring Remote Port Mirroring.......................................................................................................................... |
657 |
Displaying Remote-Port Mirroring Configurations.................................................................................................. |
659 |
Configuration procedure for Remote Port Mirroring.............................................................................................. |
659 |
Encapsulated Remote Port Monitoring.......................................................................................................................... |
663 |
ERPM Behavior on a typical Dell EMC Networking OS .............................................................................................. |
665 |
Port Monitoring on VLT................................................................................................................................................... |
666 |
42 Private VLANs (PVLAN).......................................................................................................... |
669 |
Private VLAN Concepts................................................................................................................................................... |
669 |
Using the Private VLAN Commands............................................................................................................................... |
670 |
Configuration Task List...................................................................................................................................................... |
671 |
Creating PVLAN ports................................................................................................................................................. |
671 |
Creating a Primary VLAN............................................................................................................................................ |
671 |
Creating a Community VLAN..................................................................................................................................... |
672 |
Creating an Isolated VLAN......................................................................................................................................... |
673 |
Private VLAN Configuration Example............................................................................................................................. |
674 |
20 Contents
Inspecting the Private VLAN Configuration................................................................................................................... |
675 |
43 Per-VLAN Spanning Tree Plus (PVST+).................................................................................... |
677 |
Protocol Overview............................................................................................................................................................. |
677 |
Implementation Information............................................................................................................................................. |
678 |
Configure Per-VLAN Spanning Tree Plus...................................................................................................................... |
678 |
Enabling PVST+................................................................................................................................................................. |
678 |
Disabling PVST+................................................................................................................................................................ |
678 |
Influencing PVST+ Root Selection.................................................................................................................................. |
679 |
Modifying Global PVST+ Parameters............................................................................................................................. |
680 |
Modifying Interface PVST+ Parameters......................................................................................................................... |
681 |
Configuring an EdgePort................................................................................................................................................... |
681 |
PVST+ in Multi-Vendor Networks.................................................................................................................................. |
682 |
Enabling PVST+ Extend System ID................................................................................................................................ |
682 |
PVST+ Sample Configurations........................................................................................................................................ |
683 |
44 Quality of Service (QoS)......................................................................................................... |
685 |
Implementation Information............................................................................................................................................. |
687 |
Port-Based QoS Configurations...................................................................................................................................... |
687 |
Setting dot1p Priorities for Incoming Traffic............................................................................................................ |
687 |
Honoring dot1p Priorities on Ingress Traffic............................................................................................................. |
688 |
Configuring Port-Based Rate Policing...................................................................................................................... |
688 |
Configuring Port-Based Rate Shaping..................................................................................................................... |
688 |
Policy-Based QoS Configurations................................................................................................................................... |
689 |
Classify Traffic............................................................................................................................................................. |
689 |
Create a QoS Policy.................................................................................................................................................... |
692 |
Create Policy Maps..................................................................................................................................................... |
694 |
DSCP Color Maps............................................................................................................................................................. |
697 |
Creating a DSCP Color Map...................................................................................................................................... |
697 |
Displaying DSCP Color Maps..................................................................................................................................... |
698 |
Displaying a DSCP Color Policy Configuration ....................................................................................................... |
698 |
Enabling QoS Rate Adjustment....................................................................................................................................... |
699 |
Enabling Strict-Priority Queueing.................................................................................................................................... |
699 |
Weighted Random Early Detection................................................................................................................................. |
699 |
Creating WRED Profiles............................................................................................................................................. |
700 |
Applying a WRED Profile to Traffic........................................................................................................................... |
700 |
Displaying Default and Configured WRED Profiles.................................................................................................. |
701 |
Displaying WRED Drop Statistics............................................................................................................................... |
701 |
Displaying egress–queue Statistics............................................................................................................................ |
701 |
Pre-Calculating Available QoS CAM Space.................................................................................................................... |
701 |
Configuring Weights and ECN for WRED ..................................................................................................................... |
702 |
Configuring WRED and ECN Attributes......................................................................................................................... |
704 |
Guidelines for Configuring ECN for Classifying and Color-Marking Packets............................................................ |
704 |
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class.................................... |
705 |
Classifying Incoming Packets Using ECN and Color-Marking............................................................................... |
705 |
Sample configuration to mark non-ecn packets as “yellow” with single traffic class......................................... |
707 |
Applying Layer 2 Match Criteria on a Layer 3 Interface............................................................................................... |
708 |
Applying DSCP and VLAN Match Criteria on a Service Queue.................................................................................. |
708 |
Classifying Incoming Packets Using ECN and Color-Marking..................................................................................... |
709 |
Contents 21
Guidelines for Configuring ECN for Classifying and Color-Marking Packets............................................................. |
710 |
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class............................................ |
711 |
Sample configuration to mark non-ecn packets as “yellow” with single traffic class................................................ |
711 |
Enabling Buffer Statistics Tracking ................................................................................................................................. |
712 |
45 Routing Information Protocol (RIP).......................................................................................... |
715 |
Protocol Overview............................................................................................................................................................. |
715 |
RIPv1.............................................................................................................................................................................. |
715 |
RIPv2............................................................................................................................................................................. |
715 |
Implementation Information.............................................................................................................................................. |
715 |
Configuration Information................................................................................................................................................. |
716 |
Configuration Task List................................................................................................................................................ |
716 |
RIP Configuration Example......................................................................................................................................... |
721 |
46 Remote Monitoring (RMON).................................................................................................... |
726 |
Implementation Information............................................................................................................................................. |
726 |
Fault Recovery................................................................................................................................................................... |
726 |
Setting the RMON Alarm........................................................................................................................................... |
726 |
Configuring an RMON Event..................................................................................................................................... |
727 |
Configuring RMON Collection Statistics.................................................................................................................. |
728 |
Configuring the RMON Collection History............................................................................................................... |
728 |
47 Rapid Spanning Tree Protocol (RSTP)...................................................................................... |
729 |
Protocol Overview............................................................................................................................................................ |
729 |
Configuring Rapid Spanning Tree.................................................................................................................................... |
729 |
Important Points to Remember....................................................................................................................................... |
729 |
RSTP and VLT............................................................................................................................................................. |
730 |
Configuring Interfaces for Layer 2 Mode....................................................................................................................... |
730 |
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................... |
730 |
Adding and Removing Interfaces.................................................................................................................................... |
732 |
Modifying Global Parameters........................................................................................................................................... |
732 |
Enabling SNMP Traps for Root Elections and Topology Changes........................................................................ |
733 |
Modifying Interface Parameters...................................................................................................................................... |
734 |
Enabling SNMP Traps for Root Elections and Topology Changes............................................................................. |
734 |
Influencing RSTP Root Selection.................................................................................................................................... |
734 |
Configuring an EdgePort.................................................................................................................................................. |
734 |
Configuring Fast Hellos for Link State Detection.......................................................................................................... |
735 |
48 Software-Defined Networking (SDN)....................................................................................... |
737 |
49 Security................................................................................................................................. |
738 |
AAA Accounting................................................................................................................................................................. |
738 |
Configuration Task List for AAA Accounting........................................................................................................... |
738 |
RADIUS Accounting.................................................................................................................................................... |
740 |
AAA Authentication........................................................................................................................................................... |
745 |
Configuration Task List for AAA Authentication..................................................................................................... |
745 |
Obscuring Passwords and Keys....................................................................................................................................... |
747 |
AAA Authorization............................................................................................................................................................. |
748 |
Privilege Levels Overview........................................................................................................................................... |
748 |
22 Contents
Configuration Task List for Privilege Levels............................................................................................................. |
748 |
RADIUS............................................................................................................................................................................... |
752 |
RADIUS Authentication.............................................................................................................................................. |
752 |
Configuration Task List for RADIUS.......................................................................................................................... |
753 |
Support for Change of Authorization and Disconnect Messages packets.......................................................... |
756 |
TACACS+........................................................................................................................................................................... |
765 |
Configuration Task List for TACACS+...................................................................................................................... |
765 |
TACACS+ Remote Authentication............................................................................................................................ |
766 |
Command Authorization............................................................................................................................................. |
767 |
Protection from TCP Tiny and Overlapping Fragment Attacks.................................................................................. |
768 |
Enabling SCP and SSH..................................................................................................................................................... |
768 |
Using SCP with SSH to Copy a Software Image.................................................................................................... |
768 |
Removing the RSA Host Keys and Zeroizing Storage ........................................................................................... |
769 |
Configuring When to Re-generate an SSH Key ..................................................................................................... |
769 |
Configuring the SSH Server Key Exchange Algorithm........................................................................................... |
770 |
Configuring the HMAC Algorithm for the SSH Server........................................................................................... |
770 |
Configuring the SSH Server Cipher List.................................................................................................................... |
771 |
Configuring DNS in the SSH Server.......................................................................................................................... |
771 |
Secure Shell Authentication....................................................................................................................................... |
772 |
Troubleshooting SSH.................................................................................................................................................. |
774 |
Telnet.................................................................................................................................................................................. |
774 |
VTY Line and Access-Class Configuration..................................................................................................................... |
774 |
VTY Line Local Authentication and Authorization................................................................................................... |
775 |
VTY Line Remote Authentication and Authorization.............................................................................................. |
775 |
VTY MAC-SA Filter Support...................................................................................................................................... |
775 |
Role-Based Access Control.............................................................................................................................................. |
776 |
Overview of RBAC...................................................................................................................................................... |
776 |
User Roles..................................................................................................................................................................... |
778 |
AAA Authentication and Authorization for Roles..................................................................................................... |
781 |
Role Accounting........................................................................................................................................................... |
783 |
Display Information About User Roles....................................................................................................................... |
784 |
Two Factor Authentication (2FA)................................................................................................................................... |
785 |
Handling Access-Challenge Message....................................................................................................................... |
785 |
Configuring Challenge Response Authentication for SSHv2................................................................................. |
785 |
SMS-OTP Mechanism................................................................................................................................................ |
786 |
Configuring the System to Drop Certain ICMP Reply Messages............................................................................... |
786 |
Dell EMC Networking OS Security Hardening............................................................................................................... |
788 |
Dell EMC Networking OS Image Verification........................................................................................................... |
788 |
Startup Configuration Verification............................................................................................................................ |
789 |
Configuring the root User Password........................................................................................................................ |
790 |
Locking Access to GRUB Interface.......................................................................................................................... |
790 |
Enabling User Lockout for Failed Login Attempts................................................................................................... |
791 |
50 Service Provider Bridging........................................................................................................ |
792 |
VLAN Stacking................................................................................................................................................................... |
792 |
Configure VLAN Stacking........................................................................................................................................... |
793 |
Creating Access and Trunk Ports.............................................................................................................................. |
794 |
Enable VLAN-Stacking for a VLAN........................................................................................................................... |
794 |
Configuring the Protocol Type Value for the Outer VLAN Tag............................................................................ |
795 |
Configuring Dell EMC Networking OS Options for Trunk Ports........................................................................... |
795 |
Contents 23
Debugging VLAN Stacking......................................................................................................................................... |
796 |
VLAN Stacking in Multi-Vendor Networks.............................................................................................................. |
796 |
VLAN Stacking Packet Drop Precedence..................................................................................................................... |
800 |
Enabling Drop Eligibility............................................................................................................................................... |
800 |
Honoring the Incoming DEI Value............................................................................................................................. |
800 |
Marking Egress Packets with a DEI Value................................................................................................................ |
801 |
Dynamic Mode CoS for VLAN Stacking......................................................................................................................... |
801 |
Mapping C-Tag to S-Tag dot1p Values.................................................................................................................... |
803 |
Layer 2 Protocol Tunneling.............................................................................................................................................. |
803 |
Enabling Layer 2 Protocol Tunneling........................................................................................................................ |
805 |
Specifying a Destination MAC Address for BPDUs................................................................................................ |
806 |
Setting Rate-Limit BPDUs......................................................................................................................................... |
806 |
Debugging Layer 2 Protocol Tunneling.................................................................................................................... |
806 |
Provider Backbone Bridging............................................................................................................................................ |
806 |
51 sFlow..................................................................................................................................... |
808 |
Overview............................................................................................................................................................................ |
808 |
Implementation Information............................................................................................................................................. |
808 |
Enabling Extended sFlow................................................................................................................................................. |
809 |
Enabling and Disabling sFlow on an Interface................................................................................................................ |
810 |
Enabling sFlow Max-Header Size Extended................................................................................................................... |
810 |
sFlow Show Commands.................................................................................................................................................... |
811 |
Displaying Show sFlow Global..................................................................................................................................... |
811 |
Displaying Show sFlow on an Interface...................................................................................................................... |
811 |
Displaying Show sFlow on a Stack-unit..................................................................................................................... |
812 |
Configuring Specify Collectors......................................................................................................................................... |
812 |
Changing the Polling Intervals.......................................................................................................................................... |
812 |
Back-Off Mechanism........................................................................................................................................................ |
813 |
sFlow on LAG ports........................................................................................................................................................... |
813 |
Enabling Extended sFlow.................................................................................................................................................. |
813 |
Important Points to Remember.................................................................................................................................. |
814 |
52 Simple Network Management Protocol (SNMP)........................................................................ |
815 |
Protocol Overview............................................................................................................................................................. |
816 |
Implementation Information.............................................................................................................................................. |
816 |
SNMPv3 Compliance With FIPS...................................................................................................................................... |
816 |
Configuration Task List for SNMP................................................................................................................................... |
817 |
Important Points to Remember........................................................................................................................................ |
817 |
Set up SNMP...................................................................................................................................................................... |
817 |
Creating a Community................................................................................................................................................. |
818 |
Setting Up User-Based Security (SNMPv3)............................................................................................................ |
818 |
Enable SNMPv3 traps................................................................................................................................................. |
819 |
Reading Managed Object Values..................................................................................................................................... |
819 |
Writing Managed Object Values...................................................................................................................................... |
820 |
Configuring Contact and Location Information using SNMP...................................................................................... |
820 |
Subscribing to Managed Object Value Updates using SNMP..................................................................................... |
821 |
Enabling a Subset of SNMP Traps.................................................................................................................................. |
821 |
Enabling an SNMP Agent to Notify Syslog Server Failure........................................................................................... |
823 |
Copy Configuration Files Using SNMP........................................................................................................................... |
824 |
24 Contents
Copying a Configuration File...................................................................................................................................... |
825 |
Copying Configuration Files via SNMP..................................................................................................................... |
826 |
Copying the Startup-Config Files to the Running-Config...................................................................................... |
826 |
Copying the Startup-Config Files to the Server via FTP....................................................................................... |
827 |
Copying the Startup-Config Files to the Server via TFTP..................................................................................... |
827 |
Copy a Binary File to the Startup-Configuration..................................................................................................... |
827 |
Additional MIB Objects to View Copy Statistics..................................................................................................... |
828 |
Obtaining a Value for MIB Objects............................................................................................................................ |
828 |
MIB Support to Display Reason for Last System Reboot............................................................................................ |
829 |
Viewing the Reason for Last System Reboot Using SNMP.................................................................................. |
829 |
MIB Support for Power Monitoring................................................................................................................................ |
829 |
MIB Support to Display the Available Memory Size on Flash...................................................................................... |
830 |
Viewing the Available Flash Memory Size................................................................................................................ |
830 |
MIB Support to Display the Software Core Files Generated by the System............................................................ |
830 |
Viewing the Software Core Files Generated by the System.................................................................................. |
831 |
MIB Support to Display the Available Partitions on Flash............................................................................................. |
831 |
Viewing the Available Partitions on Flash................................................................................................................. |
832 |
MIB Support to Display Egress Queue Statistics.......................................................................................................... |
833 |
MIB Support to ECMP Group Count.............................................................................................................................. |
833 |
Viewing the ECMP Group Count Information......................................................................................................... |
833 |
MIB Support for entAliasMappingTable ........................................................................................................................ |
836 |
Viewing the entAliasMappingTable MIB................................................................................................................... |
836 |
MIB Support for LAG........................................................................................................................................................ |
836 |
Viewing the LAG MIB.................................................................................................................................................. |
837 |
MIB Support to Display Unrecognized LLDP TLVs...................................................................................................... |
838 |
MIB Support to Display Reserved Unrecognized LLDP TLVs............................................................................... |
838 |
MIB Support to Display Organizational Specific Unrecognized LLDP TLVs........................................................ |
839 |
MIB Support for LLDP Notification Interval.................................................................................................................. |
839 |
MIB support for Port Security......................................................................................................................................... |
840 |
Global MIB objects for port security......................................................................................................................... |
840 |
MIB support for interface level port security........................................................................................................... |
840 |
MIB objects for configuring MAC addresses............................................................................................................ |
841 |
MIB objects for configuring MAC addresses........................................................................................................... |
842 |
Manage VLANs using SNMP........................................................................................................................................... |
843 |
Creating a VLAN.......................................................................................................................................................... |
843 |
Assigning a VLAN Alias............................................................................................................................................... |
843 |
Displaying the Ports in a VLAN.................................................................................................................................. |
843 |
Add Tagged and Untagged Ports to a VLAN.......................................................................................................... |
844 |
Managing Overload on Startup....................................................................................................................................... |
845 |
Enabling and Disabling a Port using SNMP.................................................................................................................... |
845 |
Fetch Dynamic MAC Entries using SNMP..................................................................................................................... |
846 |
Example of Deriving the Interface Index Number......................................................................................................... |
847 |
MIB Objects for Viewing the System Image on Flash Partitions........................................................................... |
847 |
Monitoring BGP sessions via SNMP............................................................................................................................... |
847 |
Monitor Port-Channels..................................................................................................................................................... |
849 |
Enabling an SNMP Agent to Notify Syslog Server Failure.......................................................................................... |
850 |
Troubleshooting SNMP Operation.................................................................................................................................. |
851 |
Transceiver Monitoring..................................................................................................................................................... |
851 |
Configuring SNMP context name................................................................................................................................... |
852 |
Contents 25
53 Stacking................................................................................................................................ |
854 |
Stacking Overview............................................................................................................................................................ |
854 |
Stack Management Roles.......................................................................................................................................... |
854 |
Stack Master Election................................................................................................................................................ |
855 |
Virtual IP....................................................................................................................................................................... |
856 |
Failover Roles............................................................................................................................................................... |
857 |
MAC Addressing on Stacks........................................................................................................................................ |
857 |
Stacking LAG............................................................................................................................................................... |
858 |
Supported Stacking Topologies................................................................................................................................. |
858 |
High Availability on Stacks......................................................................................................................................... |
858 |
Management Access on Stacks................................................................................................................................ |
859 |
Mixed-mode Stacking................................................................................................................................................. |
860 |
Important Points to Remember....................................................................................................................................... |
861 |
Stacking Installation Tasks................................................................................................................................................ |
861 |
Create a Stack.............................................................................................................................................................. |
861 |
Add Units to an Existing Stack.................................................................................................................................. |
865 |
Split a Stack................................................................................................................................................................. |
867 |
Stacking Configuration Tasks.......................................................................................................................................... |
867 |
Assigning Unit Numbers to Units in an Stack.......................................................................................................... |
867 |
Creating a Virtual Stack Unit on a Stack.................................................................................................................. |
868 |
Displaying Information about a Stack....................................................................................................................... |
868 |
Influencing Management Unit Selection on a Stack............................................................................................... |
870 |
Managing Redundancy on a Stack............................................................................................................................. |
871 |
Resetting a Unit on a Stack........................................................................................................................................ |
871 |
Enabling Mixed-mode Stacking.................................................................................................................................. |
871 |
Verify a Stack Configuration............................................................................................................................................ |
872 |
Displaying the Status of Stacking Ports................................................................................................................... |
872 |
Remove Units or Front End Ports from a Stack........................................................................................................... |
873 |
Removing a Unit from a Stack................................................................................................................................... |
873 |
Removing Front End Port Stacking.......................................................................................................................... |
874 |
Troubleshoot a Stack........................................................................................................................................................ |
874 |
Recover from Stack Link Flaps.................................................................................................................................. |
875 |
Recover from a Card Problem State on a Stack..................................................................................................... |
875 |
54 Storm Control......................................................................................................................... |
877 |
Configure Storm Control.................................................................................................................................................. |
877 |
Configuring Storm Control from INTERFACE Mode.............................................................................................. |
877 |
Configuring Storm Control from CONFIGURATION Mode................................................................................... |
878 |
55 Spanning Tree Protocol (STP)................................................................................................. |
879 |
Protocol Overview............................................................................................................................................................ |
879 |
Configure Spanning Tree.................................................................................................................................................. |
879 |
Important Points to Remember....................................................................................................................................... |
880 |
Configuring Interfaces for Layer 2 Mode....................................................................................................................... |
880 |
Enabling Spanning Tree Protocol Globally...................................................................................................................... |
881 |
Adding an Interface to the Spanning Tree Group......................................................................................................... |
883 |
Modifying Global Parameters.......................................................................................................................................... |
883 |
Modifying Interface STP Parameters............................................................................................................................. |
884 |
26 Contents
Enabling PortFast.............................................................................................................................................................. |
884 |
Prevent Network Disruptions with BPDU Guard.................................................................................................... |
885 |
Selecting STP Root........................................................................................................................................................... |
887 |
STP Root Guard................................................................................................................................................................ |
887 |
Root Guard Scenario................................................................................................................................................... |
887 |
Configuring Root Guard.............................................................................................................................................. |
888 |
Enabling SNMP Traps for Root Elections and Topology Changes............................................................................. |
889 |
Configuring Spanning Trees as Hitless........................................................................................................................... |
889 |
STP Loop Guard................................................................................................................................................................ |
889 |
Configuring Loop Guard............................................................................................................................................. |
890 |
Displaying STP Guard Configuration............................................................................................................................... |
891 |
56 SupportAssist........................................................................................................................ |
892 |
Configuring SupportAssist Using a Configuration Wizard........................................................................................... |
892 |
Configuring SupportAssist Manually............................................................................................................................... |
893 |
Configuring SupportAssist Activity................................................................................................................................. |
894 |
Configuring SupportAssist Company............................................................................................................................. |
896 |
Configuring SupportAssist Person.................................................................................................................................. |
896 |
Configuring SupportAssist Server................................................................................................................................... |
897 |
Viewing SupportAssist Configuration............................................................................................................................. |
898 |
57 System Time and Date............................................................................................................ |
900 |
Network Time Protocol.................................................................................................................................................... |
900 |
Protocol Overview....................................................................................................................................................... |
901 |
Configure the Network Time Protocol...................................................................................................................... |
901 |
Enabling NTP................................................................................................................................................................ |
901 |
Configuring NTP Broadcasts..................................................................................................................................... |
902 |
Disabling NTP on an Interface................................................................................................................................... |
902 |
Configuring a Source IP Address for NTP Packets................................................................................................ |
902 |
Configuring NTP Authentication............................................................................................................................... |
903 |
Configuring NTP control key password................................................................................................................... |
905 |
Configuring the NTP Step-Threshold...................................................................................................................... |
905 |
Dell EMC Networking OS Time and Date...................................................................................................................... |
905 |
Configuration Task List ............................................................................................................................................. |
905 |
Setting the Time and Date for the Switch Software Clock................................................................................... |
905 |
Setting the Timezone................................................................................................................................................. |
906 |
Set Daylight Saving Time........................................................................................................................................... |
906 |
Setting Daylight Saving Time Once.......................................................................................................................... |
906 |
Setting Recurring Daylight Saving Time................................................................................................................... |
907 |
58 Tunneling............................................................................................................................... |
909 |
Configuring a Tunnel......................................................................................................................................................... |
909 |
Configuring Tunnel Keepalive Settings........................................................................................................................... |
910 |
Configuring a Tunnel Interface......................................................................................................................................... |
910 |
Configuring Tunnel Allow-Remote Decapsulation.......................................................................................................... |
911 |
Configuring the Tunnel Source Anylocal.......................................................................................................................... |
911 |
59 Uplink Failure Detection (UFD)................................................................................................. |
912 |
Feature Description........................................................................................................................................................... |
912 |
Contents 27
How Uplink Failure Detection Works............................................................................................................................... |
913 |
UFD and NIC Teaming....................................................................................................................................................... |
914 |
Important Points to Remember....................................................................................................................................... |
914 |
Configuring Uplink Failure Detection............................................................................................................................... |
915 |
Clearing a UFD-Disabled Interface.................................................................................................................................. |
916 |
Displaying Uplink Failure Detection.................................................................................................................................. |
917 |
Sample Configuration: Uplink Failure Detection............................................................................................................. |
918 |
60 Upgrade Procedures............................................................................................................... |
920 |
61 Virtual LANs (VLANs)............................................................................................................... |
921 |
Default VLAN...................................................................................................................................................................... |
921 |
Port-Based VLANs............................................................................................................................................................ |
922 |
VLANs and Port Tagging.................................................................................................................................................. |
922 |
Configuration Task List..................................................................................................................................................... |
923 |
Creating a Port-Based VLAN..................................................................................................................................... |
923 |
Assigning Interfaces to a VLAN................................................................................................................................. |
923 |
Moving Untagged Interfaces..................................................................................................................................... |
924 |
Assigning an IP Address to a VLAN.......................................................................................................................... |
925 |
Configuring Native VLANs............................................................................................................................................... |
926 |
Enabling Null VLAN as the Default VLAN...................................................................................................................... |
926 |
62 Virtual Link Trunking (VLT)...................................................................................................... |
927 |
Overview............................................................................................................................................................................ |
927 |
VLT Terminology......................................................................................................................................................... |
929 |
Layer-2 Traffic in VLT Domains................................................................................................................................. |
929 |
Interspersed VLANs.................................................................................................................................................... |
930 |
VLT on Core Switches................................................................................................................................................. |
931 |
Enhanced VLT.............................................................................................................................................................. |
931 |
Configure Virtual Link Trunking....................................................................................................................................... |
932 |
Important Points to Remember................................................................................................................................. |
932 |
Configuration Notes.................................................................................................................................................... |
933 |
Primary and Secondary VLT Peers........................................................................................................................... |
936 |
RSTP and VLT............................................................................................................................................................. |
936 |
VLT Bandwidth Monitoring........................................................................................................................................ |
937 |
VLT and Stacking........................................................................................................................................................ |
937 |
VLT and IGMP Snooping............................................................................................................................................ |
937 |
VLT IPv6....................................................................................................................................................................... |
937 |
VLT Port Delayed Restoration................................................................................................................................... |
937 |
PIM-Sparse Mode Support on VLT.......................................................................................................................... |
938 |
VLT Routing ................................................................................................................................................................ |
939 |
Non-VLT ARP Sync.................................................................................................................................................... |
942 |
RSTP Configuration.......................................................................................................................................................... |
942 |
Preventing Forwarding Loops in a VLT Domain...................................................................................................... |
942 |
Sample RSTP configuration....................................................................................................................................... |
943 |
Configuring VLT........................................................................................................................................................... |
943 |
PVST+ Configuration........................................................................................................................................................ |
952 |
Peer Routing Configuration Example............................................................................................................................. |
953 |
Dell-1 Switch Configuration........................................................................................................................................ |
953 |
28 Contents
Dell-2 Switch Configuration....................................................................................................................................... |
957 |
R1 Configuration.......................................................................................................................................................... |
960 |
Access Switch A1 Configurations and Verification.................................................................................................. |
961 |
eVLT Configuration Example........................................................................................................................................... |
962 |
PIM-Sparse Mode Configuration Example.................................................................................................................... |
964 |
Verifying a VLT Configuration......................................................................................................................................... |
964 |
Additional VLT Sample Configurations........................................................................................................................... |
967 |
Troubleshooting VLT........................................................................................................................................................ |
969 |
Reconfiguring Stacked Switches as VLT....................................................................................................................... |
970 |
Specifying VLT Nodes in a PVLAN................................................................................................................................. |
970 |
Configuring a VLT VLAN or LAG in a PVLAN................................................................................................................ |
973 |
Creating a VLT LAG or a VLT VLAN......................................................................................................................... |
973 |
Associating the VLT LAG or VLT VLAN in a PVLAN.............................................................................................. |
974 |
Proxy ARP Capability on VLT Peer Nodes..................................................................................................................... |
975 |
VLT Nodes as Rendezvous Points for Multicast Resiliency........................................................................................ |
976 |
Configuring VLAN-Stack over VLT................................................................................................................................. |
976 |
IPv6 Peer Routing in VLT Domains Overview............................................................................................................... |
979 |
Configure BFD in VLT Domain......................................................................................................................................... |
983 |
Sample BFD configuration in VLT domain................................................................................................................ |
983 |
VXLAN on VLT.................................................................................................................................................................. |
987 |
63 VLT Proxy Gateway................................................................................................................. |
989 |
Proxy Gateway in VLT Domains...................................................................................................................................... |
989 |
LLDP VLT Proxy Gateway in a Square VLT Topology........................................................................................... |
992 |
Configuring a Static VLT Proxy Gateway...................................................................................................................... |
993 |
Configuring an LLDP VLT Proxy Gateway..................................................................................................................... |
993 |
VLT Proxy Gateway Sample Topology........................................................................................................................... |
993 |
VLT Domain Configuration......................................................................................................................................... |
994 |
Dell-1 VLT Configuration............................................................................................................................................. |
994 |
Dell-2 VLT Configuration............................................................................................................................................ |
995 |
Dell-3 VLT Configuration............................................................................................................................................ |
996 |
Dell-4 VLT Configuration............................................................................................................................................ |
997 |
64 Virtual Extensible LAN (VXLAN)............................................................................................... |
998 |
advertise-local-mac.......................................................................................................................................................... |
999 |
Components of VXLAN network.................................................................................................................................... |
999 |
Functional Overview of VXLAN Gateway.................................................................................................................... |
1000 |
VXLAN Frame Format.................................................................................................................................................... |
1000 |
Limitations on VXLAN ..................................................................................................................................................... |
1001 |
Configuring and Controlling VXLAN from the NSX Controller GUI.......................................................................... |
1002 |
Configuring and Controling VXLAN from Nuage Controller GUI.............................................................................. |
1006 |
Configuring VxLAN Gateway......................................................................................................................................... |
1007 |
Connecting to an NVP Controller............................................................................................................................ |
1007 |
Advertising VXLAN Access Ports to Controller..................................................................................................... |
1008 |
Displaying VXLAN Configurations................................................................................................................................. |
1008 |
VXLAN Service nodes for BFD...................................................................................................................................... |
1009 |
Static Virtual Extensible LAN (VXLAN)......................................................................................................................... |
1010 |
Configuring Static VXLAN......................................................................................................................................... |
1010 |
Displaying Static VXLAN Configurations.................................................................................................................. |
1011 |
Contents 29
Disabling MAC Address Learning on Static VXLAN Tunnels................................................................................. |
1011 |
Preserving 802.1 p value across VXLAN tunnels.......................................................................................................... |
1012 |
VXLAN Scenario............................................................................................................................................................... |
1012 |
Routing in and out of VXLAN tunnels............................................................................................................................ |
1013 |
Configuring VXLAN RIOT.......................................................................................................................................... |
1014 |
VLT Scenario............................................................................................................................................................... |
1015 |
NSX Controller-based VXLAN for VLT......................................................................................................................... |
1016 |
Important Points to Remember................................................................................................................................ |
1016 |
Configure NSX Controller-based VxLAN in VLT Setup......................................................................................... |
1017 |
Configuring BFD and UFD for VXLAN..................................................................................................................... |
1017 |
Configuring NSX-based VxLAN on VLT Peer Devices.......................................................................................... |
1017 |
Configuring VLT for NSX-based VxLAN................................................................................................................. |
1018 |
Configuring and Controlling VXLAN from the NSX Controller GUI..................................................................... |
1022 |
65 Virtual Routing and Forwarding (VRF)..................................................................................... |
1027 |
VRF Overview.................................................................................................................................................................. |
1027 |
VRF Configuration Notes............................................................................................................................................... |
1028 |
DHCP........................................................................................................................................................................... |
1029 |
VRF Configuration........................................................................................................................................................... |
1029 |
Loading VRF CAM..................................................................................................................................................... |
1029 |
Creating a Non-Default VRF Instance.................................................................................................................... |
1029 |
Assigning an Interface to a VRF.............................................................................................................................. |
1030 |
Assigning a Front-end Port to a Management VRF.............................................................................................. |
1030 |
View VRF Instance Information............................................................................................................................... |
1030 |
Assigning an OSPF Process to a VRF Instance..................................................................................................... |
1030 |
Configuring VRRP on a VRF Instance...................................................................................................................... |
1031 |
Configuring Management VRF................................................................................................................................. |
1031 |
Configuring a Static Route....................................................................................................................................... |
1032 |
Sample VRF Configuration............................................................................................................................................. |
1032 |
Route Leaking VRFs........................................................................................................................................................ |
1038 |
Dynamic Route Leaking.................................................................................................................................................. |
1038 |
Configuring Route Leaking without Filtering Criteria............................................................................................ |
1039 |
Configuring Route Leaking with Filtering................................................................................................................ |
1041 |
66 Virtual Router Redundancy Protocol (VRRP)........................................................................... |
1044 |
VRRP Overview............................................................................................................................................................... |
1044 |
VRRP Benefits................................................................................................................................................................. |
1045 |
VRRP Implementation..................................................................................................................................................... |
1045 |
VRRP Configuration........................................................................................................................................................ |
1046 |
Configuration Task List............................................................................................................................................. |
1046 |
Setting VRRP Initialization Delay............................................................................................................................. |
1054 |
Sample Configurations.................................................................................................................................................... |
1054 |
VRRP in a VRF Configuration.................................................................................................................................. |
1058 |
VRRP for IPv6 Configuration................................................................................................................................... |
1063 |
Proxy Gateway with VRRP............................................................................................................................................ |
1066 |
67 Debugging and Diagnostics..................................................................................................... |
1071 |
Offline Diagnostics............................................................................................................................................................ |
1071 |
Important Points to Remember................................................................................................................................ |
1071 |
30 Contents