Related Documents.............................................................................................................................................................33
Accessing the Command Line............................................................................................................................................34
The do Command................................................................................................................................................................38
Entering and Editing Commands....................................................................................................................................... 39
Filtering show Command Outputs.................................................................................................................................... 40
Multiple Users in Configuration Mode............................................................................................................................... 41
Serial Console.................................................................................................................................................................42
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................... 43
Configuring a Host Name................................................................................................................................................... 44
Accessing the System Remotely.......................................................................................................................................44
Configure the Management Port IP Address.............................................................................................................44
Configure a Management Route................................................................................................................................. 45
Configuring a Username and Password..................................................................................................................... 45
Configuring the Enable Password..................................................................................................................................... 46
Copy Files to and from the System.............................................................................................................................46
Mounting an NFS File System......................................................................................................................................47
Save the Running-Configuration................................................................................................................................. 48
Configure the Overload Bit for a Startup Scenario...................................................................................................49
Managing the File System..................................................................................................................................................52
Enabling Software Features on Devices Using a Command Option.............................................................................52
Verify Software Images Before Installation......................................................................................................................54
Using HTTP for File Transfers...........................................................................................................................................55
Removing a Command from EXEC Mode..................................................................................................................58
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................... 58
Allowing Access to CONFIGURATION Mode Commands....................................................................................... 58
Allowing Access to Different Modes...........................................................................................................................58
Applying a Privilege Level to a Username...................................................................................................................60
Applying a Privilege Level to a Terminal Line............................................................................................................. 60
Audit and Security Logs................................................................................................................................................60
Configuring Logging Format ................................................................................................................................ 62
Display the Logging Buffer and the Logging Configuration.....................................................................................62
Setting Up a Secure Connection to a Syslog Server.......................................................................................63
Sending System Messages to a Syslog Server..........................................................................................................64
Restrictions for Tracking Login Activity......................................................................................................................64
Enabling the System to Clear Existing Sessions........................................................................................................67
Log Messages in the Internal Buffer.................................................................................................................................68
Disabling System Logging...................................................................................................................................................68
Sending System Messages to a Syslog Server............................................................................................................... 68
Configuring a UNIX System as a Syslog Server........................................................................................................ 68
Changing System Logging Settings..................................................................................................................................69
Display the Logging Buffer and the Logging Configuration...........................................................................................69
Configuring a UNIX Logging Facility Level....................................................................................................................... 70
Enabling Timestamp on Syslog Messages.........................................................................................................................71
File Transfer Services..........................................................................................................................................................74
Enabling the FTP Server...............................................................................................................................................74
Configuring FTP Server Parameters...........................................................................................................................74
Denying and Permitting Access to a Terminal Line...................................................................................................75
Configuring Login Authentication for Terminal Lines................................................................................................76
Setting Timeout for EXEC Privilege Mode.......................................................................................................................77
Using Telnet to get to Another Network Device.............................................................................................................78
LPC Bus Quality Degradation.............................................................................................................................................79
Restoring the Factory Default Settings............................................................................................................................79
Viewing the Reason for Last System Reboot...................................................................................................................81
EAP over RADIUS..........................................................................................................................................................84
Important Points to Remember.........................................................................................................................................85
Configuring a Quiet Period after a Failed Authentication.........................................................................................87
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................88
Re-Authenticating a Port................................................................................................................................................... 88
Configuring Dynamic VLAN Assignment with Port Authentication..............................................................................90
Guest and Authentication-Fail VLANs...............................................................................................................................91
Configuring a Guest VLAN............................................................................................................................................91
Configuring an Authentication-Fail VLAN................................................................................................................... 91
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)..........................93
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................................................93
Guidelines for Configuring ACL VLAN Groups................................................................................................................ 93
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters................................................... 94
7 Access Control Lists (ACLs)........................................................................................................98
IP Access Control Lists (ACLs)......................................................................................................................................... 99
Implementing ACLs on Dell EMC Networking OS................................................................................................... 100
Important Points to Remember........................................................................................................................................ 101
Configuration Task List for Route Maps....................................................................................................................101
Configuring Match Routes..........................................................................................................................................103
Configuring Set Conditions.........................................................................................................................................104
Configure a Route Map for Route Redistribution....................................................................................................105
Configure a Route Map for Route Tagging.............................................................................................................. 106
IP Fragment Handling........................................................................................................................................................106
IP Fragments ACL Examples...................................................................................................................................... 106
Configure a Standard IP ACL........................................................................................................................................... 108
Configuring a Standard IP ACL Filter........................................................................................................................ 108
Configure an Extended IP ACL........................................................................................................................................ 109
Configuring Filters with a Sequence Number...........................................................................................................109
Configuring Filters Without a Sequence Number.....................................................................................................110
Configure Layer 2 and Layer 3 ACLs................................................................................................................................ 111
Assign an IP ACL to an Interface.......................................................................................................................................111
Applying an IP ACL............................................................................................................................................................. 112
IP Prefix Lists.......................................................................................................................................................................114
Contents
5
Configuration Task List for Prefix Lists......................................................................................................................115
Configuring a Remark...................................................................................................................................................118
Deleting a Remark.........................................................................................................................................................118
Resequencing an ACL or Prefix List...........................................................................................................................119
Logging of ACL Processes................................................................................................................................................ 121
Guidelines for Configuring ACL Logging.................................................................................................................... 121
Configuring IP Mirror Access Group................................................................................................................................127
How BFD Works.................................................................................................................................................................129
Session State Changes................................................................................................................................................133
Important Points to Remember........................................................................................................................................133
Configure BFD for Physical Ports.............................................................................................................................. 134
Configure BFD for Static Routes...............................................................................................................................135
Configure BFD for IPv6 Static Routes...................................................................................................................... 138
Configure BFD for OSPF............................................................................................................................................ 140
Configure BFD for OSPFv3........................................................................................................................................ 145
Configure BFD for IS-IS...............................................................................................................................................147
Configure BFD for BGP...............................................................................................................................................149
Configure BFD for VRRP............................................................................................................................................ 156
BGP IP version 4 (BGPv4) Overview............................................................................................................................. 159
AS4 Number Representation.......................................................................................................................................161
Four-Byte AS Numbers...............................................................................................................................................163
Sessions and Peers...................................................................................................................................................... 163
Establish a Session.......................................................................................................................................................163
BGP Attributes for selecting Best Path.................................................................................................................... 164
BGP global and address family configuration........................................................................................................... 170
Implement BGP with Dell EMC Networking OS....................................................................................................... 171
Prerequisite for configuring a BGP network.............................................................................................................174
Enabling four-byte autonomous system numbers................................................................................................... 176
Changing a BGP router ID...........................................................................................................................................177
Configuring AS4 Number Representations............................................................................................................... 177
Configuring a BGP peer...............................................................................................................................................178
Example-Configuring BGP routing between peers..................................................................................................179
Route-refresh and Soft-reconfiguration................................................................................................................... 187
Configuring BGP Fast Fall-Over.................................................................................................................................196
Configuring IP Community Lists................................................................................................................................202
Configuring an IP Extended Community List...........................................................................................................203
Changing BGP keepalive and hold timers.................................................................................................................. 211
Setting the extended timer.........................................................................................................................................212
Enabling or disabling BGP neighbors......................................................................................................................... 212
MBGP support for IPv6...............................................................................................................................................217
Configuring IPv6 MBGP between peers................................................................................................................... 217
Example-Configuring IPv4 and IPv6 neighbors........................................................................................................218
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor............................................ 220
Test CAM Usage...............................................................................................................................................................225
QoS CAM Region Limitation...................................................................................................................................... 229
Contents
7
11 Control Plane Policing (CoPP).................................................................................................. 230
Configure Control Plane Policing..................................................................................................................................... 231
Configuring CoPP for Protocols................................................................................................................................232
Configuring CoPP for CPU Queues..........................................................................................................................233
CoPP for OSPFv3 Packets........................................................................................................................................ 234
Configuring CoPP for OSPFv3..................................................................................................................................236
12 Data Center Bridging (DCB)..................................................................................................... 239
Ethernet Enhancements in Data Center Bridging.........................................................................................................239
Data Center Bridging Exchange Protocol (DCBx)..................................................................................................242
Data Center Bridging in a Traffic Flow..................................................................................................................... 242
Enabling Data Center Bridging.........................................................................................................................................242
DCB Maps and its Attributes..................................................................................................................................... 243
Data Center Bridging: Default Configuration.................................................................................................................243
Configuring PFC in a DCB Map.......................................................................................................................................246
Applying a DCB Map on a Port........................................................................................................................................247
Configuring PFC without a DCB Map.............................................................................................................................247
Priority-Based Flow Control Using Dynamic Buffer Method.......................................................................................249
Behavior of Tagged Packets............................................................................................................................................249
Configuration Example for DSCP and PFC Priorities...................................................................................................250
Using PFC to Manage Converged Ethernet Traffic......................................................................................................251
ETS Prerequisites and Restrictions........................................................................................................................... 251
Creating an ETS Priority Group..................................................................................................................................251
ETS Operation with DCBx..........................................................................................................................................252
Configuring Bandwidth Allocation for DCBx CIN.................................................................................................... 253
Configuring ETS in a DCB Map................................................................................................................................. 253
Hierarchical Scheduling in ETS Output Policies............................................................................................................ 254
Using ETS to Manage Converged Ethernet Traffic..................................................................................................... 255
Applying DCB Policies in a Switch Stack....................................................................................................................... 255
Configure a DCBx Operation...........................................................................................................................................255
DCBx Port Roles..........................................................................................................................................................255
Propagation of DCB Information............................................................................................................................... 257
Auto-Detection and Manual Configuration of the DCBx Version......................................................................... 258
DCBx Prerequisites and Restrictions........................................................................................................................259
Verifying the DCB Configuration.....................................................................................................................................262
QoS dot1p Traffic Classification and Queue Assignment.............................................................................................270
Configuring the Dynamic Buffer Method........................................................................................................................271
DHCP Packet Format and Options.................................................................................................................................275
Assign an IP Address using DHCP...................................................................................................................................276
Configure the System to be a DHCP Server.................................................................................................................278
Configuring the Server for Automatic Address Allocation..................................................................................... 278
Specifying a Default Gateway....................................................................................................................................279
Configure a Method of Hostname Resolution......................................................................................................... 279
Using DNS for Address Resolution............................................................................................................................279
Using NetBIOS WINS for Address Resolution.........................................................................................................280
Debugging the DHCP Server.....................................................................................................................................280
Using DHCP Clear Commands.................................................................................................................................. 280
Configure the System to be a Relay Agent.................................................................................................................... 281
Configure the System to be a DHCP Client.................................................................................................................. 282
Configuring the DHCP Client System.......................................................................................................................282
DHCP Client on a Management Interface................................................................................................................283
DHCP Client Operation with Other Features.......................................................................................................... 284
DHCP Relay When DHCP Server and Client are in Different VRFs...........................................................................285
Configuring Route Leaking between VRFs on DHCP Relay Agent...................................................................... 285
Non-default VRF configuration for DHCPv6 helper address...................................................................................... 286
ECMP for Flow-Based Affinity........................................................................................................................................298
Configuring the Hash Algorithm................................................................................................................................ 298
Enabling Deterministic ECMP Next Hop..................................................................................................................298
Configuring the Hash Algorithm Seed...................................................................................................................... 298
Link Bundle Monitoring.....................................................................................................................................................299
Managing ECMP Group Paths.................................................................................................................................. 299
Creating an ECMP Group Bundle............................................................................................................................. 300
Contents
9
Modifying the ECMP Group Threshold....................................................................................................................300
Flow-based Hashing for ECMP.......................................................................................................................................302
Fibre Channel over Ethernet........................................................................................................................................... 305
Ensure Robustness in a Converged Ethernet Network............................................................................................... 305
FIP Snooping on Ethernet Bridges..................................................................................................................................306
FIP Snooping in a Switch Stack...................................................................................................................................... 308
Using FIP Snooping...........................................................................................................................................................308
Important Points to Remember.................................................................................................................................308
Enabling the FCoE Transit Feature...........................................................................................................................309
Enable FIP Snooping on VLANs................................................................................................................................ 309
Configure the FC-MAP Value.....................................................................................................................................310
Configure a Port for a Bridge-to-Bridge Link...........................................................................................................310
Configure a Port for a Bridge-to-FCF Link...............................................................................................................310
Impact on Other Software Features......................................................................................................................... 310
Preparing the System........................................................................................................................................................318
Enabling FIPS Mode...........................................................................................................................................................318
Monitoring FIPS Mode Status..........................................................................................................................................319
Disabling FIPS Mode..........................................................................................................................................................319
17 Force10 Resilient Ring Protocol (FRRP).....................................................................................321
Ring Status...................................................................................................................................................................322
Important FRRP Points...............................................................................................................................................323
Important FRRP Concepts.........................................................................................................................................324
Creating the FRRP Group.......................................................................................................................................... 325
Configuring the Control VLAN...................................................................................................................................325
Configuring and Adding the Member VLANs.......................................................................................................... 326
Setting the FRRP Timers............................................................................................................................................327
Clearing the FRRP Counters......................................................................................................................................327
Viewing the FRRP Configuration...............................................................................................................................327
Viewing the FRRP Information.................................................................................................................................. 327
Sample Configuration and Topology...............................................................................................................................328
FRRP Support on VLT......................................................................................................................................................329
Enabling GVRP on a Layer 2 Interface........................................................................................................................... 334
Configure a GARP Timer..................................................................................................................................................335
Automatic and Manual Stack Unit Failover..............................................................................................................336
Synchronization between Management and Standby Units..................................................................................337
Forcing a Stack Unit Failover..................................................................................................................................... 337
Specifying an Auto-Failover Limit..............................................................................................................................337
Pre-Configuring a Stack Unit Slot...................................................................................................................................338
Removing a Provisioned Logical Stack Unit.................................................................................................................. 338
Software Component Health Monitoring.................................................................................................................339
System Health Monitoring......................................................................................................................................... 339
Failure and Event Logging..........................................................................................................................................339
IGMP Version 2............................................................................................................................................................ 341
IGMP Version 3............................................................................................................................................................342
Selecting an IGMP Version.............................................................................................................................................. 346
Adjusting Query and Response Timers..................................................................................................................... 347
Preventing a Host from Joining a Group........................................................................................................................348
Removing a Group-Port Association......................................................................................................................... 351
Specifying a Port as Connected to a Multicast Router..........................................................................................352
Configuring the Switch as Querier............................................................................................................................352
Fast Convergence after MSTP Topology Changes......................................................................................................353
Egress Interface Selection (EIS) for HTTP and IGMP Applications...........................................................................353
Designating a Multicast Router Interface...................................................................................................................... 359
Resetting an Interface to its Factory Default State..................................................................................................... 363
Enabling a Physical Interface........................................................................................................................................... 363
Configuration Task List for Physical Interfaces.......................................................................................................364
Overview of Layer Modes..........................................................................................................................................364
Automatic recovery of an Err-disabled interface..........................................................................................................366
Configuring an automatic recovery for an Err-disabled interface.........................................................................366
Configuring Port Delay...................................................................................................................................................... 371
Port Channel Interfaces.................................................................................................................................................... 371
Port Channel Definition and Standards..................................................................................................................... 371
Port Channel Benefits.................................................................................................................................................372
Port Channel Implementation.................................................................................................................................... 372
Interfaces in Port Channels........................................................................................................................................372
Configuration Tasks for Port Channel Interfaces....................................................................................................372
Creating a Port Channel............................................................................................................................................. 373
Adding a Physical Interface to a Port Channel........................................................................................................ 373
Reassigning an Interface to a New Port Channel................................................................................................... 375
Configuring the Minimum Oper Up Links in a Port Channel.................................................................................. 375
Adding or Removing a Port Channel from a VLAN.................................................................................................375
Assigning an IP Address to a Port Channel..............................................................................................................376
Deleting or Disabling a Port Channel......................................................................................................................... 377
Load Balancing Through Port Channels....................................................................................................................377
Changing the Hash Algorithm.................................................................................................................................... 377
Defining Interface Range Macros....................................................................................................................................379
Define the Interface Range........................................................................................................................................380
Choosing an Interface-Range Macro........................................................................................................................380
Monitoring and Maintaining Interfaces...........................................................................................................................380
Maintenance Using TDR..............................................................................................................................................381
Non Dell-Qualified Transceivers.......................................................................................................................................381
Splitting 40G Ports without Reload................................................................................................................................ 382
Splitting QSFP Ports to SFP+ Ports.............................................................................................................................. 383
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..................................................................................... 384
Link Dampening................................................................................................................................................................. 386
12
Contents
Enabling Link Dampening............................................................................................................................................388
Link Bundle Monitoring.....................................................................................................................................................389
Using Ethernet Pause Frames for Flow Control........................................................................................................... 389
Configure the MTU Size on an Interface.......................................................................................................................390
Auto-Negotiation on Ethernet Interfaces.......................................................................................................................391
Setting the Speed of Ethernet Interfaces................................................................................................................392
Set Auto-Negotiation Options................................................................................................................................... 393
Configuring the Interface Sampling Size..................................................................................................................394
Configuring the Traffic Sampling Size Globally............................................................................................................. 395
IP Addresses...................................................................................................................................................................... 402
Configuration Tasks for IP Addresses............................................................................................................................ 402
Assigning IP Addresses to an Interface..........................................................................................................................402
Adding description for IPv4 and IPv6 static routes................................................................................................ 404
Configure Static Routes for the Management Interface.............................................................................................404
IPv4 Path MTU Discovery Overview..............................................................................................................................405
Using the Configured Source IP Address in ICMP Messages.....................................................................................405
Configuring the Duration to Establish a TCP Connection........................................................................................... 406
Resolution of Host Names............................................................................................................................................... 406
Enabling Dynamic Resolution of Host Names................................................................................................................407
Specifying the Local System Domain and a List of Domains.......................................................................................407
Configuring DNS with Traceroute...................................................................................................................................407
Configuration Tasks for ARP........................................................................................................................................... 408
ARP Learning via Gratuitous ARP...................................................................................................................................409
Enabling ARP Learning via Gratuitous ARP....................................................................................................................410
ARP Learning via ARP Request....................................................................................................................................... 410
Configuration Tasks for ICMP...........................................................................................................................................411
Configuring a Broadcast Address.................................................................................................................................... 413
Configurations Using UDP Helper....................................................................................................................................414
UDP Helper with Broadcast-All Addresses.....................................................................................................................414
UDP Helper with Subnet Broadcast Addresses.............................................................................................................415
UDP Helper with Configured Broadcast Addresses......................................................................................................415
UDP Helper with No Configured Broadcast Addresses................................................................................................416
Path MTU discovery......................................................................................................................................................... 423
IPv6 Neighbor Discovery of MTU Packets.............................................................................................................. 425
Configuration Task List for IPv6 RDNSS....................................................................................................................... 425
Configuring the IPv6 Recursive DNS Server...........................................................................................................425
Debugging IPv6 RDNSS Information Sent to the Host .........................................................................................426
Secure Shell (SSH) Over an IPv6 Transport................................................................................................................. 427
Configuration Tasks for IPv6........................................................................................................................................... 427
Adjusting Your CAM-Profile....................................................................................................................................... 427
Assigning an IPv6 Address to an Interface.............................................................................................................. 428
Assigning a Static IPv6 Route....................................................................................................................................428
Configuring Telnet with IPv6..................................................................................................................................... 429
SNMP over IPv6..........................................................................................................................................................429
Displaying an IPv6 Interface Information..................................................................................................................430
Configuring IPv6 RA Guard..............................................................................................................................................432
Configuring IPv6 RA Guard on an Interface............................................................................................................ 434
Monitoring IPv6 RA Guard......................................................................................................................................... 434
Application of Quality of Service to iSCSI Traffic Flows........................................................................................ 436
Information Monitored in iSCSI Traffic Flows..........................................................................................................437
Detection and Auto-Configuration for Dell EqualLogic Arrays.............................................................................. 437
Contents
Configuring Detection and Ports for Dell Compellent Arrays................................................................................ 438
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................. 438
Enable and Disable iSCSI Optimization.....................................................................................................................439
Configuration Tasks for IS-IS.....................................................................................................................................446
Configuring the Distance of a Route........................................................................................................................ 453
Changing the IS-Type.................................................................................................................................................453
Setting the Overload Bit.............................................................................................................................................456
Maximum Values in the Routing Table..................................................................................................................... 458
Change the IS-IS Metric Style in One Level Only................................................................................................... 458
Leaks from One Level to Another.............................................................................................................................460
27 Link Aggregation Control Protocol (LACP)................................................................................463
Introduction to Dynamic LAGs and LACP......................................................................................................................463
Important Points to Remember.................................................................................................................................463
Creating a LAG............................................................................................................................................................ 464
Configuring the LAG Interfaces as Dynamic............................................................................................................465
Setting the LACP Long Timeout............................................................................................................................... 465
Monitoring and Debugging LACP..............................................................................................................................466
Shared LAG State Tracking............................................................................................................................................. 466
Configuring Shared LAG State Tracking.................................................................................................................. 467
Important Points about Shared LAG State Tracking..............................................................................................468
Configure a LAG on ALPHA.......................................................................................................................................468
Manage the MAC Address Table.................................................................................................................................... 476
Clearing the MAC Address Table.............................................................................................................................. 476
Setting the Aging Time for Dynamic Entries............................................................................................................476
Configuring a Static MAC Address........................................................................................................................... 476
Displaying the MAC Address Table............................................................................................................................477
MAC Learning Limit...........................................................................................................................................................477
Setting the MAC Learning Limit................................................................................................................................ 477
mac learning-limit Dynamic.........................................................................................................................................478
mac learning-limit mac-address-sticky..................................................................................................................... 478
mac learning-limit station-move................................................................................................................................ 478
mac learning-limit no-station-move.......................................................................................................................... 478
Setting Station Move Violation Actions....................................................................................................................479
Recovering from Learning Limit and Station Move Violations...............................................................................479
Enabling port security................................................................................................................................................. 480
NIC Teaming...................................................................................................................................................................... 480
FEFD State Changes.................................................................................................................................................. 484
Enabling FEFD on an Interface.................................................................................................................................. 486
Protocol Data Units.....................................................................................................................................................488
TIA Organizationally Specific TLVs............................................................................................................................ 491
Disabling and Undoing LLDP......................................................................................................................................495
Enabling LLDP on Management Ports........................................................................................................................... 495
Disabling and Undoing LLDP on Management Ports..............................................................................................496
Storing and Viewing Unrecognized LLDP TLVs............................................................................................................ 497
Viewing the LLDP Configuration.....................................................................................................................................498
Viewing Information Advertised by Adjacent LLDP Neighbors...................................................................................498
Examples of Viewing Information Advertised by Neighbors..................................................................................498
Configuring Transmit and Receive Mode.......................................................................................................................502
Configuring the Time to Live Value................................................................................................................................ 503
30 Microsoft Network Load Balancing...........................................................................................509
Configuring a Switch for NLB .........................................................................................................................................510
Enabling a Switch for Multicast NLB.........................................................................................................................510
Related Configuration Tasks.......................................................................................................................................514
Manage the Source-Active Cache.................................................................................................................................. 519
Viewing the Source-Active Cache.............................................................................................................................519
Limiting the Source-Active Cache.............................................................................................................................519
Clearing the Source-Active Cache............................................................................................................................ 519
Enabling the Rejected Source-Active Cache.......................................................................................................... 520
Accept Source-Active Messages that Fail the RFP Check.........................................................................................520
Limiting the Source-Active Messages from a Peer......................................................................................................523
Preventing MSDP from Caching a Local Source..........................................................................................................523
Preventing MSDP from Caching a Remote Source..................................................................................................... 523
Preventing MSDP from Advertising a Local Source.....................................................................................................524
Logging Changes in Peership States..............................................................................................................................525
Terminating a Peership.....................................................................................................................................................525
MSDP with Anycast RP................................................................................................................................................... 526
Displaying MLD groups table........................................................................................................................................... 537
33 Multiple Spanning Tree Protocol (MSTP)................................................................................. 539
Spanning Tree Variations................................................................................................................................................. 540
Configure Multiple Spanning Tree Protocol...................................................................................................................540
Related Configuration Tasks......................................................................................................................................540
Contents
17
Enable Multiple Spanning Tree Globally.......................................................................................................................... 541
Adding and Removing Interfaces.....................................................................................................................................541
Creating Multiple Spanning Tree Instances....................................................................................................................541
Interoperate with Non-Dell Bridges................................................................................................................................ 543
Changing the Region Name or Revision.........................................................................................................................543
Modifying Global Parameters.......................................................................................................................................... 543
Modifying the Interface Parameters...............................................................................................................................544
Setting STP path cost as constant................................................................................................................................ 545
Configuring an EdgePort..................................................................................................................................................545
Flush MAC Addresses after a Topology Change.......................................................................................................... 546
Enabling IP Multicast........................................................................................................................................................ 552
Displaying MLD groups table............................................................................................................................................ 571
Configure the switch as a querier............................................................................................................................. 572
Specify port as connected to multicast router........................................................................................................573
Display the MLD Snooping Table...............................................................................................................................573
Track IPv4 and IPv6 Routes...................................................................................................................................... 575
Set Tracking Delays.....................................................................................................................................................576
Tracking a Layer 2 Interface.......................................................................................................................................577
Tracking a Layer 3 Interface...................................................................................................................................... 578
Track an IPv4/IPv6 Route......................................................................................................................................... 579
Autonomous System (AS) Areas.............................................................................................................................. 584
Area Types................................................................................................................................................................... 585
Networks and Neighbors............................................................................................................................................586
Router Priority and Cost.............................................................................................................................................588
OSPF with Dell EMC Networking OS.............................................................................................................................589
Fast Convergence (OSPFv2, IPv4 Only).................................................................................................................590
Multi-Process OSPFv2 with VRF............................................................................................................................. 590
Configuration Task List for OSPFv3 (OSPF for IPv6)...........................................................................................604
MIB Support for OSPFv3................................................................................................................................................. 615
Viewing the OSPFv3 MIB........................................................................................................................................... 615
Configuration Task List for OSPFv3 (OSPF for IPv6)..................................................................................................616
Applying cost for OSPFv3.......................................................................................................................................... 616
Assigning IPv6 Addresses on an Interface................................................................................................................617
Assigning Area ID on an Interface.............................................................................................................................. 617
Assigning OSPFv3 Process ID and Router ID Globally............................................................................................ 617
Assigning OSPFv3 Process ID and Router ID to a VRF.......................................................................................... 618
Configuring a Default Route....................................................................................................................................... 619
OSPFv3 Authentication Using IPsec......................................................................................................................... 621
Configuration Task List for Policy-based Routing........................................................................................................ 629
Create a Redirect List.................................................................................................................................................630
Create a Rule for a Redirect-list................................................................................................................................630
Apply a Redirect-list to an Interface using a Redirect-group................................................................................. 631
Related Configuration Tasks......................................................................................................................................639
Configuring a Designated Router....................................................................................................................................643
Creating Multicast Boundaries and Domains.................................................................................................................644
Electing an RP using the BSR Mechanism.................................................................................................................... 644
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................... 647
Electing an RP using the BSR Mechanism.................................................................................................................... 649
Enabling RP to Server Specific Multicast Groups.................................................................................................. 650
41 Port Monitoring.......................................................................................................................651
Important Points to Remember....................................................................................................................................... 651
Port Monitoring..................................................................................................................................................................651
Configuring Port Monitoring............................................................................................................................................654
Remote Port Mirroring..................................................................................................................................................... 656
Remote Port Mirroring Example................................................................................................................................657
Configuring Remote Port Mirroring.......................................................................................................................... 657
Configuration procedure for Remote Port Mirroring..............................................................................................659
Encapsulated Remote Port Monitoring..........................................................................................................................663
ERPM Behavior on a typical Dell EMC Networking OS ..............................................................................................665
Port Monitoring on VLT................................................................................................................................................... 666
Using the Private VLAN Commands...............................................................................................................................670
Creating a Primary VLAN............................................................................................................................................ 671
Creating a Community VLAN.....................................................................................................................................672
Creating an Isolated VLAN......................................................................................................................................... 673
Inspecting the Private VLAN Configuration...................................................................................................................675
43 Per-VLAN Spanning Tree Plus (PVST+).................................................................................... 677
Modifying Global PVST+ Parameters.............................................................................................................................680
Configuring an EdgePort...................................................................................................................................................681
PVST+ in Multi-Vendor Networks.................................................................................................................................. 682
Enabling PVST+ Extend System ID................................................................................................................................ 682
Create a QoS Policy....................................................................................................................................................692
DSCP Color Maps............................................................................................................................................................. 697
Creating a DSCP Color Map...................................................................................................................................... 697
Displaying DSCP Color Maps.....................................................................................................................................698
Displaying a DSCP Color Policy Configuration ....................................................................................................... 698
Weighted Random Early Detection.................................................................................................................................699
Applying a WRED Profile to Traffic...........................................................................................................................700
Displaying Default and Configured WRED Profiles.................................................................................................. 701
Displaying WRED Drop Statistics............................................................................................................................... 701
Pre-Calculating Available QoS CAM Space....................................................................................................................701
Configuring Weights and ECN for WRED .....................................................................................................................702
Configuring WRED and ECN Attributes.........................................................................................................................704
Guidelines for Configuring ECN for Classifying and Color-Marking Packets............................................................ 704
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class.................................... 705
Classifying Incoming Packets Using ECN and Color-Marking...............................................................................705
Sample configuration to mark non-ecn packets as “yellow” with single traffic class.........................................707
Applying Layer 2 Match Criteria on a Layer 3 Interface...............................................................................................708
Applying DSCP and VLAN Match Criteria on a Service Queue.................................................................................. 708
Classifying Incoming Packets Using ECN and Color-Marking.....................................................................................709
Contents
21
Guidelines for Configuring ECN for Classifying and Color-Marking Packets............................................................. 710
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class............................................711
Sample configuration to mark non-ecn packets as “yellow” with single traffic class................................................711
Setting the RMON Alarm........................................................................................................................................... 726
Configuring an RMON Event..................................................................................................................................... 727
Configuring the RMON Collection History...............................................................................................................728
47 Rapid Spanning Tree Protocol (RSTP)...................................................................................... 729
Important Points to Remember.......................................................................................................................................729
RSTP and VLT............................................................................................................................................................. 730
Configuring Interfaces for Layer 2 Mode.......................................................................................................................730
Enabling Rapid Spanning Tree Protocol Globally...........................................................................................................730
Adding and Removing Interfaces.................................................................................................................................... 732
Modifying Global Parameters...........................................................................................................................................732
Enabling SNMP Traps for Root Elections and Topology Changes........................................................................733
Configuring an EdgePort.................................................................................................................................................. 734
Configuring Fast Hellos for Link State Detection..........................................................................................................735
Configuration Task List for AAA Accounting........................................................................................................... 738
Configuration Task List for AAA Authentication..................................................................................................... 745
Obscuring Passwords and Keys.......................................................................................................................................747
Configuration Task List for Privilege Levels.............................................................................................................748
Configuration Task List for RADIUS..........................................................................................................................753
Support for Change of Authorization and Disconnect Messages packets..........................................................756
Configuration Task List for TACACS+......................................................................................................................765
Protection from TCP Tiny and Overlapping Fragment Attacks..................................................................................768
Enabling SCP and SSH..................................................................................................................................................... 768
Using SCP with SSH to Copy a Software Image.................................................................................................... 768
Removing the RSA Host Keys and Zeroizing Storage ...........................................................................................769
Configuring When to Re-generate an SSH Key .....................................................................................................769
Configuring the SSH Server Key Exchange Algorithm...........................................................................................770
Configuring the HMAC Algorithm for the SSH Server...........................................................................................770
Configuring the SSH Server Cipher List....................................................................................................................771
Configuring DNS in the SSH Server.......................................................................................................................... 771
VTY Line and Access-Class Configuration..................................................................................................................... 774
VTY Line Local Authentication and Authorization...................................................................................................775
VTY Line Remote Authentication and Authorization.............................................................................................. 775
Overview of RBAC...................................................................................................................................................... 776
User Roles.....................................................................................................................................................................778
AAA Authentication and Authorization for Roles..................................................................................................... 781
Role Accounting...........................................................................................................................................................783
Display Information About User Roles.......................................................................................................................784
Two Factor Authentication (2FA)...................................................................................................................................785
Configuring the root User Password........................................................................................................................ 790
Locking Access to GRUB Interface.......................................................................................................................... 790
Enabling User Lockout for Failed Login Attempts................................................................................................... 791
50 Service Provider Bridging........................................................................................................792
Creating Access and Trunk Ports..............................................................................................................................794
Enable VLAN-Stacking for a VLAN...........................................................................................................................794
Configuring the Protocol Type Value for the Outer VLAN Tag............................................................................ 795
Configuring Dell EMC Networking OS Options for Trunk Ports........................................................................... 795
VLAN Stacking in Multi-Vendor Networks.............................................................................................................. 796
VLAN Stacking Packet Drop Precedence..................................................................................................................... 800
Enabling Drop Eligibility...............................................................................................................................................800
Honoring the Incoming DEI Value............................................................................................................................. 800
Marking Egress Packets with a DEI Value................................................................................................................ 801
Dynamic Mode CoS for VLAN Stacking......................................................................................................................... 801
Mapping C-Tag to S-Tag dot1p Values.................................................................................................................... 803
Enabling and Disabling sFlow on an Interface................................................................................................................ 810
sFlow Show Commands.................................................................................................................................................... 811
Displaying Show sFlow Global..................................................................................................................................... 811
Displaying Show sFlow on an Interface......................................................................................................................811
Displaying Show sFlow on a Stack-unit.....................................................................................................................812
Changing the Polling Intervals..........................................................................................................................................812
sFlow on LAG ports........................................................................................................................................................... 813
Important Points to Remember..................................................................................................................................814
SNMPv3 Compliance With FIPS......................................................................................................................................816
Configuration Task List for SNMP...................................................................................................................................817
Important Points to Remember........................................................................................................................................817
Set up SNMP......................................................................................................................................................................817
Creating a Community.................................................................................................................................................818
Setting Up User-Based Security (SNMPv3)............................................................................................................818
Configuring Contact and Location Information using SNMP......................................................................................820
Subscribing to Managed Object Value Updates using SNMP..................................................................................... 821
Enabling a Subset of SNMP Traps.................................................................................................................................. 821
Enabling an SNMP Agent to Notify Syslog Server Failure...........................................................................................823
Copy Configuration Files Using SNMP...........................................................................................................................824
Contents
Copying a Configuration File......................................................................................................................................825
Copying Configuration Files via SNMP.....................................................................................................................826
Copying the Startup-Config Files to the Running-Config......................................................................................826
Copying the Startup-Config Files to the Server via FTP....................................................................................... 827
Copying the Startup-Config Files to the Server via TFTP.....................................................................................827
Copy a Binary File to the Startup-Configuration.....................................................................................................827
Additional MIB Objects to View Copy Statistics..................................................................................................... 828
Obtaining a Value for MIB Objects............................................................................................................................828
MIB Support to Display Reason for Last System Reboot............................................................................................829
Viewing the Reason for Last System Reboot Using SNMP.................................................................................. 829
MIB Support for Power Monitoring................................................................................................................................829
MIB Support to Display the Available Memory Size on Flash......................................................................................830
Viewing the Available Flash Memory Size................................................................................................................830
MIB Support to Display the Software Core Files Generated by the System............................................................ 830
Viewing the Software Core Files Generated by the System..................................................................................831
MIB Support to Display the Available Partitions on Flash.............................................................................................831
Viewing the Available Partitions on Flash.................................................................................................................832
MIB Support to Display Egress Queue Statistics..........................................................................................................833
MIB Support to ECMP Group Count..............................................................................................................................833
Viewing the ECMP Group Count Information......................................................................................................... 833
MIB Support for entAliasMappingTable ........................................................................................................................ 836
Viewing the entAliasMappingTable MIB...................................................................................................................836
MIB Support for LAG........................................................................................................................................................836
Viewing the LAG MIB..................................................................................................................................................837
MIB Support to Display Unrecognized LLDP TLVs...................................................................................................... 838
MIB Support to Display Reserved Unrecognized LLDP TLVs............................................................................... 838
MIB Support to Display Organizational Specific Unrecognized LLDP TLVs........................................................839
MIB Support for LLDP Notification Interval.................................................................................................................. 839
MIB support for Port Security.........................................................................................................................................840
Global MIB objects for port security.........................................................................................................................840
MIB support for interface level port security...........................................................................................................840
MIB objects for configuring MAC addresses............................................................................................................841
MIB objects for configuring MAC addresses...........................................................................................................842
Manage VLANs using SNMP...........................................................................................................................................843
Creating a VLAN..........................................................................................................................................................843
Assigning a VLAN Alias............................................................................................................................................... 843
Displaying the Ports in a VLAN..................................................................................................................................843
Add Tagged and Untagged Ports to a VLAN.......................................................................................................... 844
Managing Overload on Startup....................................................................................................................................... 845
Enabling and Disabling a Port using SNMP....................................................................................................................845
Fetch Dynamic MAC Entries using SNMP.....................................................................................................................846
Example of Deriving the Interface Index Number......................................................................................................... 847
MIB Objects for Viewing the System Image on Flash Partitions...........................................................................847
Monitoring BGP sessions via SNMP...............................................................................................................................847
MAC Addressing on Stacks........................................................................................................................................857
High Availability on Stacks......................................................................................................................................... 858
Management Access on Stacks................................................................................................................................859
Important Points to Remember....................................................................................................................................... 861
Create a Stack..............................................................................................................................................................861
Add Units to an Existing Stack.................................................................................................................................. 865
Split a Stack................................................................................................................................................................. 867
Assigning Unit Numbers to Units in an Stack.......................................................................................................... 867
Creating a Virtual Stack Unit on a Stack..................................................................................................................868
Displaying Information about a Stack....................................................................................................................... 868
Influencing Management Unit Selection on a Stack............................................................................................... 870
Managing Redundancy on a Stack.............................................................................................................................871
Resetting a Unit on a Stack........................................................................................................................................ 871
Verify a Stack Configuration............................................................................................................................................872
Displaying the Status of Stacking Ports................................................................................................................... 872
Remove Units or Front End Ports from a Stack........................................................................................................... 873
Removing a Unit from a Stack...................................................................................................................................873
Removing Front End Port Stacking.......................................................................................................................... 874
Troubleshoot a Stack........................................................................................................................................................874
Recover from Stack Link Flaps..................................................................................................................................875
Recover from a Card Problem State on a Stack.....................................................................................................875
Important Points to Remember.......................................................................................................................................880
Configuring Interfaces for Layer 2 Mode.......................................................................................................................880
Enabling Spanning Tree Protocol Globally...................................................................................................................... 881
Adding an Interface to the Spanning Tree Group.........................................................................................................883
Modifying Global Parameters.......................................................................................................................................... 883
Enabling SNMP Traps for Root Elections and Topology Changes.............................................................................889
Configuring Spanning Trees as Hitless...........................................................................................................................889
57 System Time and Date............................................................................................................ 900
Network Time Protocol....................................................................................................................................................900
Configure the Network Time Protocol......................................................................................................................901
Disabling NTP on an Interface................................................................................................................................... 902
Configuring a Source IP Address for NTP Packets................................................................................................ 902
Configuring NTP control key password................................................................................................................... 905
Configuring the NTP Step-Threshold...................................................................................................................... 905
Dell EMC Networking OS Time and Date...................................................................................................................... 905
Configuration Task List ............................................................................................................................................. 905
Setting the Time and Date for the Switch Software Clock...................................................................................905
Setting the Timezone................................................................................................................................................. 906
Set Daylight Saving Time........................................................................................................................................... 906
Setting Daylight Saving Time Once.......................................................................................................................... 906
Configuring a Tunnel.........................................................................................................................................................909
Configuring a Tunnel Interface.........................................................................................................................................910
Configuring the Tunnel Source Anylocal..........................................................................................................................911
How Uplink Failure Detection Works...............................................................................................................................913
UFD and NIC Teaming.......................................................................................................................................................914
Important Points to Remember....................................................................................................................................... 914
Clearing a UFD-Disabled Interface.................................................................................................................................. 916
VLANs and Port Tagging..................................................................................................................................................922
Creating a Port-Based VLAN.....................................................................................................................................923
Assigning Interfaces to a VLAN.................................................................................................................................923
Assigning an IP Address to a VLAN.......................................................................................................................... 925
Enabling Null VLAN as the Default VLAN...................................................................................................................... 926
62 Virtual Link Trunking (VLT)......................................................................................................927
Layer-2 Traffic in VLT Domains.................................................................................................................................929
VLT on Core Switches.................................................................................................................................................931
Configure Virtual Link Trunking....................................................................................................................................... 932
Important Points to Remember.................................................................................................................................932
Primary and Secondary VLT Peers........................................................................................................................... 936
RSTP and VLT............................................................................................................................................................. 936
VLT and Stacking........................................................................................................................................................ 937
VLT and IGMP Snooping............................................................................................................................................ 937
VLT Port Delayed Restoration................................................................................................................................... 937
PIM-Sparse Mode Support on VLT.......................................................................................................................... 938
Verifying a VLT Configuration......................................................................................................................................... 964
Reconfiguring Stacked Switches as VLT.......................................................................................................................970
Specifying VLT Nodes in a PVLAN................................................................................................................................. 970
Configuring a VLT VLAN or LAG in a PVLAN................................................................................................................973
Creating a VLT LAG or a VLT VLAN.........................................................................................................................973
Associating the VLT LAG or VLT VLAN in a PVLAN.............................................................................................. 974
Proxy ARP Capability on VLT Peer Nodes.....................................................................................................................975
VLT Nodes as Rendezvous Points for Multicast Resiliency........................................................................................ 976
Configuring VLAN-Stack over VLT.................................................................................................................................976
IPv6 Peer Routing in VLT Domains Overview............................................................................................................... 979
Configure BFD in VLT Domain.........................................................................................................................................983
Sample BFD configuration in VLT domain................................................................................................................983
VXLAN on VLT.................................................................................................................................................................. 987
Proxy Gateway in VLT Domains......................................................................................................................................989
LLDP VLT Proxy Gateway in a Square VLT Topology........................................................................................... 992
Configuring a Static VLT Proxy Gateway...................................................................................................................... 993
Configuring an LLDP VLT Proxy Gateway.....................................................................................................................993
Components of VXLAN network.................................................................................................................................... 999
Functional Overview of VXLAN Gateway....................................................................................................................1000
Limitations on VXLAN .....................................................................................................................................................1001
Configuring and Controlling VXLAN from the NSX Controller GUI.......................................................................... 1002
Configuring and Controling VXLAN from Nuage Controller GUI.............................................................................. 1006
Connecting to an NVP Controller............................................................................................................................1007
Advertising VXLAN Access Ports to Controller.....................................................................................................1008
VXLAN Service nodes for BFD......................................................................................................................................1009
Static Virtual Extensible LAN (VXLAN).........................................................................................................................1010
Disabling MAC Address Learning on Static VXLAN Tunnels.................................................................................1011
Preserving 802.1 p value across VXLAN tunnels..........................................................................................................1012
Routing in and out of VXLAN tunnels............................................................................................................................1013
NSX Controller-based VXLAN for VLT......................................................................................................................... 1016
Important Points to Remember................................................................................................................................ 1016
Configure NSX Controller-based VxLAN in VLT Setup.........................................................................................1017
Configuring BFD and UFD for VXLAN..................................................................................................................... 1017
Configuring NSX-based VxLAN on VLT Peer Devices.......................................................................................... 1017
Configuring VLT for NSX-based VxLAN................................................................................................................. 1018
Configuring and Controlling VXLAN from the NSX Controller GUI.....................................................................1022
65 Virtual Routing and Forwarding (VRF).....................................................................................1027
Creating a Non-Default VRF Instance.................................................................................................................... 1029
Assigning an Interface to a VRF.............................................................................................................................. 1030
Assigning a Front-end Port to a Management VRF..............................................................................................1030
Assigning an OSPF Process to a VRF Instance.....................................................................................................1030
Configuring VRRP on a VRF Instance......................................................................................................................1031
Configuring a Static Route....................................................................................................................................... 1032
VRRP in a VRF Configuration.................................................................................................................................. 1058
VRRP for IPv6 Configuration................................................................................................................................... 1063
Proxy Gateway with VRRP............................................................................................................................................ 1066
67 Debugging and Diagnostics..................................................................................................... 1071
Important Points to Remember................................................................................................................................ 1071
Contents
Loading...
+ 1078 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.