Dell PowerSwitch S4048T-ON User Manual

Dell EMC Configuration Guide for the S4048T–ON System
9.14.2.4
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Other trademarks may be trademarks of their respective owners.
2019 - 11
Rev. A00
Contents
1 About this Guide......................................................................................................................... 33
Audience............................................................................................................................................................................... 33
Conventions......................................................................................................................................................................... 33
Related Documents.............................................................................................................................................................33
2 Configuration Fundamentals....................................................................................................... 34
Accessing the Command Line............................................................................................................................................34
CLI Modes............................................................................................................................................................................ 34
Navigating CLI Modes...................................................................................................................................................36
The do Command................................................................................................................................................................38
Undoing Commands............................................................................................................................................................39
Obtaining Help..................................................................................................................................................................... 39
Entering and Editing Commands....................................................................................................................................... 39
Command History................................................................................................................................................................40
Filtering show Command Outputs.................................................................................................................................... 40
Multiple Users in Configuration Mode............................................................................................................................... 41
3 Getting Started..........................................................................................................................42
Console Access....................................................................................................................................................................42
Serial Console.................................................................................................................................................................42
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................... 43
Default Configuration..........................................................................................................................................................44
Configuring a Host Name................................................................................................................................................... 44
Accessing the System Remotely.......................................................................................................................................44
Configure the Management Port IP Address.............................................................................................................44
Configure a Management Route................................................................................................................................. 45
Configuring a Username and Password..................................................................................................................... 45
Configuring the Enable Password..................................................................................................................................... 46
Configuration File Management........................................................................................................................................ 46
Copy Files to and from the System.............................................................................................................................46
Mounting an NFS File System......................................................................................................................................47
Save the Running-Configuration................................................................................................................................. 48
Configure the Overload Bit for a Startup Scenario...................................................................................................49
Viewing Files...................................................................................................................................................................49
Compressing Configuration Files.................................................................................................................................50
Managing the File System..................................................................................................................................................52
Enabling Software Features on Devices Using a Command Option.............................................................................52
View Command History......................................................................................................................................................53
Upgrading Dell EMC Networking OS................................................................................................................................54
Verify Software Images Before Installation......................................................................................................................54
Using HTTP for File Transfers...........................................................................................................................................55
4 Management..............................................................................................................................57
Configuring Privilege Levels............................................................................................................................................... 57
Contents 3
Removing a Command from EXEC Mode..................................................................................................................58
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................... 58
Allowing Access to CONFIGURATION Mode Commands....................................................................................... 58
Allowing Access to Different Modes...........................................................................................................................58
Applying a Privilege Level to a Username...................................................................................................................60
Applying a Privilege Level to a Terminal Line............................................................................................................. 60
Configuring Logging............................................................................................................................................................60
Audit and Security Logs................................................................................................................................................60
Configuring Logging Format ................................................................................................................................ 62
Display the Logging Buffer and the Logging Configuration.....................................................................................62
Setting Up a Secure Connection to a Syslog Server.......................................................................................63
Sending System Messages to a Syslog Server..........................................................................................................64
Track Login Activity............................................................................................................................................................ 64
Restrictions for Tracking Login Activity......................................................................................................................64
Configuring Login Activity Tracking............................................................................................................................ 64
Display Login Statistics................................................................................................................................................. 65
Limit Concurrent Login Sessions.......................................................................................................................................66
Restrictions for Limiting the Number of Concurrent Sessions................................................................................66
Configuring Concurrent Session Limit........................................................................................................................ 66
Enabling the System to Clear Existing Sessions........................................................................................................67
Enabling Secured CLI Mode...............................................................................................................................................67
Log Messages in the Internal Buffer.................................................................................................................................68
Disabling System Logging...................................................................................................................................................68
Sending System Messages to a Syslog Server............................................................................................................... 68
Configuring a UNIX System as a Syslog Server........................................................................................................ 68
Changing System Logging Settings..................................................................................................................................69
Display the Logging Buffer and the Logging Configuration...........................................................................................69
Configuring a UNIX Logging Facility Level....................................................................................................................... 70
Synchronizing Log Messages............................................................................................................................................. 71
Enabling Timestamp on Syslog Messages.........................................................................................................................71
File Transfer Services..........................................................................................................................................................74
Enabling the FTP Server...............................................................................................................................................74
Configuring FTP Server Parameters...........................................................................................................................74
Configuring FTP Client Parameters............................................................................................................................ 75
Terminal Lines...................................................................................................................................................................... 75
Denying and Permitting Access to a Terminal Line...................................................................................................75
Configuring Login Authentication for Terminal Lines................................................................................................76
Setting Timeout for EXEC Privilege Mode.......................................................................................................................77
Using Telnet to get to Another Network Device.............................................................................................................78
Lock CONFIGURATION Mode...........................................................................................................................................78
LPC Bus Quality Degradation.............................................................................................................................................79
Restoring the Factory Default Settings............................................................................................................................79
Restoring Factory Default Environment Variables.................................................................................................... 80
Viewing the Reason for Last System Reboot...................................................................................................................81
5 802.1X.......................................................................................................................................82
Port-Authentication Process............................................................................................................................................. 83
EAP over RADIUS..........................................................................................................................................................84
Configuring 802.1X..............................................................................................................................................................84
Important Points to Remember.........................................................................................................................................85
4
Contents
Enabling 802.1X................................................................................................................................................................... 85
Configuring Request Identity Re-Transmissions............................................................................................................. 86
Configuring a Quiet Period after a Failed Authentication.........................................................................................87
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................88
Re-Authenticating a Port................................................................................................................................................... 88
Configuring Timeouts..........................................................................................................................................................89
Configuring Dynamic VLAN Assignment with Port Authentication..............................................................................90
Guest and Authentication-Fail VLANs...............................................................................................................................91
Configuring a Guest VLAN............................................................................................................................................91
Configuring an Authentication-Fail VLAN................................................................................................................... 91
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)..........................93
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................................................93
Guidelines for Configuring ACL VLAN Groups................................................................................................................ 93
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters................................................... 94
Configuring ACL VLAN Groups................................................................................................................................... 94
Configuring FP Blocks for VLAN Parameters............................................................................................................95
Viewing CAM Usage........................................................................................................................................................... 95
Allocating FP Blocks for VLAN Processes....................................................................................................................... 97
Unified Forwarding Table (UFT) Modes...........................................................................................................................97
Configuring UFT Modes................................................................................................................................................97
7 Access Control Lists (ACLs)........................................................................................................98
IP Access Control Lists (ACLs)......................................................................................................................................... 99
CAM Usage.................................................................................................................................................................... 99
Implementing ACLs on Dell EMC Networking OS................................................................................................... 100
Important Points to Remember........................................................................................................................................ 101
Configuration Task List for Route Maps....................................................................................................................101
Configuring Match Routes..........................................................................................................................................103
Configuring Set Conditions.........................................................................................................................................104
Configure a Route Map for Route Redistribution....................................................................................................105
Configure a Route Map for Route Tagging.............................................................................................................. 106
Continue Clause........................................................................................................................................................... 106
IP Fragment Handling........................................................................................................................................................106
IP Fragments ACL Examples...................................................................................................................................... 106
Layer 4 ACL Rules Examples...................................................................................................................................... 107
Configure a Standard IP ACL........................................................................................................................................... 108
Configuring a Standard IP ACL Filter........................................................................................................................ 108
Configure an Extended IP ACL........................................................................................................................................ 109
Configuring Filters with a Sequence Number...........................................................................................................109
Configuring Filters Without a Sequence Number.....................................................................................................110
Configure Layer 2 and Layer 3 ACLs................................................................................................................................ 111
Assign an IP ACL to an Interface.......................................................................................................................................111
Applying an IP ACL............................................................................................................................................................. 112
Counting ACL Hits........................................................................................................................................................ 112
Configure Ingress ACLs..................................................................................................................................................... 112
Configure Egress ACLs...................................................................................................................................................... 113
Applying Egress Layer 3 ACLs (Control-Plane)........................................................................................................ 114
IP Prefix Lists.......................................................................................................................................................................114
Contents
5
Configuration Task List for Prefix Lists......................................................................................................................115
ACL Remarks.......................................................................................................................................................................118
Configuring a Remark...................................................................................................................................................118
Deleting a Remark.........................................................................................................................................................118
ACL Resequencing............................................................................................................................................................. 119
Resequencing an ACL or Prefix List...........................................................................................................................119
Route Maps........................................................................................................................................................................ 120
Logging of ACL Processes................................................................................................................................................ 121
Guidelines for Configuring ACL Logging.................................................................................................................... 121
Configuring ACL Logging............................................................................................................................................ 122
Flow-Based Monitoring..................................................................................................................................................... 122
Enabling Flow-Based Monitoring................................................................................................................................124
Configuring UDF ACL........................................................................................................................................................ 124
Configuring IP Mirror Access Group................................................................................................................................127
Sample Configuration...................................................................................................................................................127
Example of viewing IP mirror–access–group applied to an Interface...................................................................127
8 Bidirectional Forwarding Detection (BFD)................................................................................... 129
How BFD Works.................................................................................................................................................................129
BFD Packet Format..................................................................................................................................................... 130
BFD Sessions.................................................................................................................................................................131
BFD Three-Way Handshake....................................................................................................................................... 132
Session State Changes................................................................................................................................................133
Important Points to Remember........................................................................................................................................133
Configure BFD....................................................................................................................................................................133
Configure BFD for Physical Ports.............................................................................................................................. 134
Configure BFD for Static Routes...............................................................................................................................135
Configure BFD for IPv6 Static Routes...................................................................................................................... 138
Configure BFD for OSPF............................................................................................................................................ 140
Configure BFD for OSPFv3........................................................................................................................................ 145
Configure BFD for IS-IS...............................................................................................................................................147
Configure BFD for BGP...............................................................................................................................................149
Configure BFD for VRRP............................................................................................................................................ 156
Configuring Protocol Liveness....................................................................................................................................158
9 Border Gateway Protocol (BGP)................................................................................................ 159
BGP IP version 4 (BGPv4) Overview............................................................................................................................. 159
BGP Autonomous Systems........................................................................................................................................ 159
AS4 Number Representation.......................................................................................................................................161
Four-Byte AS Numbers...............................................................................................................................................163
BGP router ID............................................................................................................................................................... 163
Sessions and Peers...................................................................................................................................................... 163
Establish a Session.......................................................................................................................................................163
BGP Attributes for selecting Best Path.................................................................................................................... 164
Multiprotocol BGP....................................................................................................................................................... 169
BGP global and address family configuration........................................................................................................... 170
Implement BGP with Dell EMC Networking OS....................................................................................................... 171
Configuration Information........................................................................................................................................... 174
Basic BGP configuration tasks......................................................................................................................................... 174
6
Contents
Prerequisite for configuring a BGP network.............................................................................................................174
Restrictions................................................................................................................................................................... 174
Enabling BGP................................................................................................................................................................ 174
Enabling four-byte autonomous system numbers................................................................................................... 176
Changing a BGP router ID...........................................................................................................................................177
Configuring AS4 Number Representations............................................................................................................... 177
Configuring a BGP peer...............................................................................................................................................178
Example-Configuring BGP routing between peers..................................................................................................179
BGP peer group............................................................................................................................................................180
Advanced BGP configuration tasks................................................................................................................................. 187
Route-refresh and Soft-reconfiguration................................................................................................................... 187
Aggregating Routes..................................................................................................................................................... 189
Filtering BGP..................................................................................................................................................................191
Configuring BGP Fast Fall-Over.................................................................................................................................196
Configuring Passive Peering....................................................................................................................................... 197
Enabling Graceful Restart........................................................................................................................................... 198
Redistributing Routes.................................................................................................................................................. 199
Redistributing iBGP Routes into IGP......................................................................................................................... 199
Enabling Additional Paths........................................................................................................................................... 202
Configuring IP Community Lists................................................................................................................................202
Configuring an IP Extended Community List...........................................................................................................203
Configure BGP attributes...........................................................................................................................................204
Enabling Multipath.......................................................................................................................................................207
Route Reflectors......................................................................................................................................................... 208
Enabling Route Flap Dampening................................................................................................................................209
Changing BGP keepalive and hold timers.................................................................................................................. 211
Setting the extended timer.........................................................................................................................................212
Enabling or disabling BGP neighbors......................................................................................................................... 212
Route Map Continue....................................................................................................................................................213
Configuring BGP Confederations...............................................................................................................................214
Configuring a BGP VRF address family.....................................................................................................................214
Maintaining Existing AS Numbers During an AS Migration.....................................................................................215
Allowing an AS Number to Appear in its Own AS Path...........................................................................................216
Enabling MBGP Configurations.................................................................................................................................. 217
MBGP support for IPv6...............................................................................................................................................217
Configuring IPv6 MBGP between peers................................................................................................................... 217
Example-Configuring IPv4 and IPv6 neighbors........................................................................................................218
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor............................................ 220
BGP Regular Expression Optimization......................................................................................................................222
Debugging BGP........................................................................................................................................................... 222
10 Content Addressable Memory (CAM)........................................................................................224
CAM Allocation.................................................................................................................................................................. 224
Test CAM Usage...............................................................................................................................................................225
View CAM-ACL Settings..................................................................................................................................................226
View CAM Usage...............................................................................................................................................................227
Configuring CAM Threshold and Silence Period........................................................................................................... 228
CAM Optimization.............................................................................................................................................................229
Troubleshoot CAM Profiling.............................................................................................................................................229
QoS CAM Region Limitation...................................................................................................................................... 229
Contents
7
11 Control Plane Policing (CoPP).................................................................................................. 230
Configure Control Plane Policing..................................................................................................................................... 231
Configuring CoPP for Protocols................................................................................................................................232
Configuring CoPP for CPU Queues..........................................................................................................................233
CoPP for OSPFv3 Packets........................................................................................................................................ 234
Configuring CoPP for OSPFv3..................................................................................................................................236
Displaying CoPP Configuration .................................................................................................................................237
12 Data Center Bridging (DCB)..................................................................................................... 239
Ethernet Enhancements in Data Center Bridging.........................................................................................................239
Priority-Based Flow Control.......................................................................................................................................240
Enhanced Transmission Selection..............................................................................................................................241
Data Center Bridging Exchange Protocol (DCBx)..................................................................................................242
Data Center Bridging in a Traffic Flow..................................................................................................................... 242
Enabling Data Center Bridging.........................................................................................................................................242
DCB Maps and its Attributes..................................................................................................................................... 243
Data Center Bridging: Default Configuration.................................................................................................................243
Configuring Priority-Based Flow Control....................................................................................................................... 244
Configuring Lossless Queues..................................................................................................................................... 244
Configuring PFC in a DCB Map.......................................................................................................................................246
Applying a DCB Map on a Port........................................................................................................................................247
Configuring PFC without a DCB Map.............................................................................................................................247
Priority-Based Flow Control Using Dynamic Buffer Method.......................................................................................249
Behavior of Tagged Packets............................................................................................................................................249
Configuration Example for DSCP and PFC Priorities...................................................................................................250
Using PFC to Manage Converged Ethernet Traffic......................................................................................................251
Configure Enhanced Transmission Selection................................................................................................................. 251
ETS Prerequisites and Restrictions........................................................................................................................... 251
Creating an ETS Priority Group..................................................................................................................................251
ETS Operation with DCBx..........................................................................................................................................252
Configuring Bandwidth Allocation for DCBx CIN.................................................................................................... 253
Configuring ETS in a DCB Map................................................................................................................................. 253
Hierarchical Scheduling in ETS Output Policies............................................................................................................ 254
Using ETS to Manage Converged Ethernet Traffic..................................................................................................... 255
Applying DCB Policies in a Switch Stack....................................................................................................................... 255
Configure a DCBx Operation...........................................................................................................................................255
DCBx Operation...........................................................................................................................................................255
DCBx Port Roles..........................................................................................................................................................255
DCB Configuration Exchange.................................................................................................................................... 257
Configuration Source Election................................................................................................................................... 257
Propagation of DCB Information............................................................................................................................... 257
Auto-Detection and Manual Configuration of the DCBx Version......................................................................... 258
DCBx Example............................................................................................................................................................. 258
DCBx Prerequisites and Restrictions........................................................................................................................259
Configuring DCBx........................................................................................................................................................259
Verifying the DCB Configuration.....................................................................................................................................262
QoS dot1p Traffic Classification and Queue Assignment.............................................................................................270
Configuring the Dynamic Buffer Method........................................................................................................................271
8
Contents
Sample DCB Configuration.............................................................................................................................................. 272
13 Dynamic Host Configuration Protocol (DHCP)........................................................................... 275
DHCP Packet Format and Options.................................................................................................................................275
Assign an IP Address using DHCP...................................................................................................................................276
Implementation Information............................................................................................................................................. 277
Configure the System to be a DHCP Server.................................................................................................................278
Configuring the Server for Automatic Address Allocation..................................................................................... 278
Specifying a Default Gateway....................................................................................................................................279
Configure a Method of Hostname Resolution......................................................................................................... 279
Using DNS for Address Resolution............................................................................................................................279
Using NetBIOS WINS for Address Resolution.........................................................................................................280
Creating Manual Binding Entries............................................................................................................................... 280
Debugging the DHCP Server.....................................................................................................................................280
Using DHCP Clear Commands.................................................................................................................................. 280
Configure the System to be a Relay Agent.................................................................................................................... 281
Configure the System to be a DHCP Client.................................................................................................................. 282
Configuring the DHCP Client System.......................................................................................................................282
DHCP Client on a Management Interface................................................................................................................283
DHCP Client Operation with Other Features.......................................................................................................... 284
DHCP Relay When DHCP Server and Client are in Different VRFs...........................................................................285
Configuring Route Leaking between VRFs on DHCP Relay Agent...................................................................... 285
Non-default VRF configuration for DHCPv6 helper address...................................................................................... 286
Configuring DHCP relay source interface......................................................................................................................286
Global DHCP relay source IPv4 or IPv6 configuration .......................................................................................... 286
Interface level DHCP relay source IPv4 or IPv6 configuration .............................................................................287
Configure the System for User Port Stacking (Option 230)...................................................................................... 288
Configure Secure DHCP.................................................................................................................................................. 288
Option 82 (DHCPv4 relay options)...........................................................................................................................288
DHCPv6 relay agent options..................................................................................................................................... 289
DHCP Snooping...........................................................................................................................................................289
Drop DHCP Packets on Snooped VLANs Only....................................................................................................... 293
Dynamic ARP Inspection............................................................................................................................................ 294
Configuring Dynamic ARP Inspection.......................................................................................................................294
Source Address Validation............................................................................................................................................... 295
Enabling IP Source Address Validation..................................................................................................................... 295
DHCP MAC Source Address Validation................................................................................................................... 296
Enabling IP+MAC Source Address Validation..........................................................................................................296
Viewing the Number of SAV Dropped Packets.......................................................................................................297
Clearing the Number of SAV Dropped Packets...................................................................................................... 297
14 Equal Cost Multi-Path (ECMP).................................................................................................298
ECMP for Flow-Based Affinity........................................................................................................................................298
Configuring the Hash Algorithm................................................................................................................................ 298
Enabling Deterministic ECMP Next Hop..................................................................................................................298
Configuring the Hash Algorithm Seed...................................................................................................................... 298
Link Bundle Monitoring.....................................................................................................................................................299
Managing ECMP Group Paths.................................................................................................................................. 299
Creating an ECMP Group Bundle............................................................................................................................. 300
Contents
9
Modifying the ECMP Group Threshold....................................................................................................................300
RTAG7................................................................................................................................................................................. 301
Flow-based Hashing for ECMP.......................................................................................................................................302
15 FIP Snooping.......................................................................................................................... 305
Fibre Channel over Ethernet........................................................................................................................................... 305
Ensure Robustness in a Converged Ethernet Network............................................................................................... 305
FIP Snooping on Ethernet Bridges..................................................................................................................................306
FIP Snooping in a Switch Stack...................................................................................................................................... 308
Using FIP Snooping...........................................................................................................................................................308
FIP Snooping Prerequisites........................................................................................................................................ 308
Important Points to Remember.................................................................................................................................308
Enabling the FCoE Transit Feature...........................................................................................................................309
Enable FIP Snooping on VLANs................................................................................................................................ 309
Configure the FC-MAP Value.....................................................................................................................................310
Configure a Port for a Bridge-to-Bridge Link...........................................................................................................310
Configure a Port for a Bridge-to-FCF Link...............................................................................................................310
Impact on Other Software Features......................................................................................................................... 310
FIP Snooping Restrictions...........................................................................................................................................310
Configuring FIP Snooping............................................................................................................................................ 311
Displaying FIP Snooping Information................................................................................................................................311
FCoE Transit Configuration Example.............................................................................................................................. 316
16 FIPS Cryptography.................................................................................................................. 318
Configuration Tasks...........................................................................................................................................................318
Preparing the System........................................................................................................................................................318
Enabling FIPS Mode...........................................................................................................................................................318
Generating Host-Keys.......................................................................................................................................................319
Monitoring FIPS Mode Status..........................................................................................................................................319
Disabling FIPS Mode..........................................................................................................................................................319
17 Force10 Resilient Ring Protocol (FRRP).....................................................................................321
Protocol Overview............................................................................................................................................................. 321
Ring Status...................................................................................................................................................................322
Multiple FRRP Rings................................................................................................................................................... 322
Important FRRP Points...............................................................................................................................................323
Important FRRP Concepts.........................................................................................................................................324
Implementing FRRP.......................................................................................................................................................... 324
FRRP Configuration..........................................................................................................................................................325
Creating the FRRP Group.......................................................................................................................................... 325
Configuring the Control VLAN...................................................................................................................................325
Configuring and Adding the Member VLANs.......................................................................................................... 326
Setting the FRRP Timers............................................................................................................................................327
Clearing the FRRP Counters......................................................................................................................................327
Viewing the FRRP Configuration...............................................................................................................................327
Viewing the FRRP Information.................................................................................................................................. 327
Troubleshooting FRRP......................................................................................................................................................328
Sample Configuration and Topology...............................................................................................................................328
FRRP Support on VLT......................................................................................................................................................329
10
Contents
18 GARP VLAN Registration Protocol (GVRP)................................................................................332
Configure GVRP................................................................................................................................................................333
Enabling GVRP Globally....................................................................................................................................................333
Enabling GVRP on a Layer 2 Interface........................................................................................................................... 334
Configure GVRP Registration..........................................................................................................................................334
Configure a GARP Timer..................................................................................................................................................335
RPM Redundancy............................................................................................................................................................. 335
19 High Availability (HA).............................................................................................................. 336
Component Redundancy..................................................................................................................................................336
Automatic and Manual Stack Unit Failover..............................................................................................................336
Synchronization between Management and Standby Units..................................................................................337
Forcing a Stack Unit Failover..................................................................................................................................... 337
Specifying an Auto-Failover Limit..............................................................................................................................337
Disabling Auto-Reboot................................................................................................................................................ 337
Pre-Configuring a Stack Unit Slot...................................................................................................................................338
Removing a Provisioned Logical Stack Unit.................................................................................................................. 338
Hitless Behavior.................................................................................................................................................................338
Graceful Restart................................................................................................................................................................ 338
Software Resiliency...........................................................................................................................................................339
Software Component Health Monitoring.................................................................................................................339
System Health Monitoring......................................................................................................................................... 339
Failure and Event Logging..........................................................................................................................................339
Hot-Lock Behavior............................................................................................................................................................340
20 Internet Group Management Protocol (IGMP)........................................................................... 341
IGMP Protocol Overview..................................................................................................................................................341
IGMP Version 2............................................................................................................................................................ 341
IGMP Version 3............................................................................................................................................................342
Configure IGMP.................................................................................................................................................................345
Viewing IGMP Enabled Interfaces...................................................................................................................................345
Selecting an IGMP Version.............................................................................................................................................. 346
Viewing IGMP Groups.......................................................................................................................................................347
Adjusting Timers................................................................................................................................................................ 347
Adjusting Query and Response Timers..................................................................................................................... 347
Preventing a Host from Joining a Group........................................................................................................................348
Enabling IGMP Immediate-Leave....................................................................................................................................350
IGMP Snooping.................................................................................................................................................................. 351
Configuring IGMP Snooping....................................................................................................................................... 351
Removing a Group-Port Association......................................................................................................................... 351
Disabling Multicast Flooding.......................................................................................................................................352
Specifying a Port as Connected to a Multicast Router..........................................................................................352
Configuring the Switch as Querier............................................................................................................................352
Fast Convergence after MSTP Topology Changes......................................................................................................353
Egress Interface Selection (EIS) for HTTP and IGMP Applications...........................................................................353
Designating a Multicast Router Interface...................................................................................................................... 359
21 Interfaces...............................................................................................................................360
Contents
11
Interface Types.................................................................................................................................................................. 361
View Basic Interface Information.....................................................................................................................................361
Resetting an Interface to its Factory Default State..................................................................................................... 363
Enabling a Physical Interface........................................................................................................................................... 363
Physical Interfaces............................................................................................................................................................ 363
Configuration Task List for Physical Interfaces.......................................................................................................364
Overview of Layer Modes..........................................................................................................................................364
Configuring Layer 2 (Data Link) Mode..................................................................................................................... 364
Configuring Layer 2 (Interface) Mode......................................................................................................................365
Configuring Layer 3 (Network) Mode...................................................................................................................... 365
Configuring Layer 3 (Interface) Mode......................................................................................................................365
Automatic recovery of an Err-disabled interface..........................................................................................................366
Configuring an automatic recovery for an Err-disabled interface.........................................................................366
Egress Interface Selection (EIS)..................................................................................................................................... 367
Configuring EIS............................................................................................................................................................ 367
Management Interfaces................................................................................................................................................... 368
Configuring Management Interfaces........................................................................................................................368
Configuring a Management Interface on an Ethernet Port...................................................................................369
VLAN Interfaces................................................................................................................................................................ 370
Loopback Interfaces......................................................................................................................................................... 370
Null Interfaces.....................................................................................................................................................................371
Configuring Port Delay...................................................................................................................................................... 371
Port Channel Interfaces.................................................................................................................................................... 371
Port Channel Definition and Standards..................................................................................................................... 371
Port Channel Benefits.................................................................................................................................................372
Port Channel Implementation.................................................................................................................................... 372
Interfaces in Port Channels........................................................................................................................................372
Configuration Tasks for Port Channel Interfaces....................................................................................................372
Creating a Port Channel............................................................................................................................................. 373
Adding a Physical Interface to a Port Channel........................................................................................................ 373
Reassigning an Interface to a New Port Channel................................................................................................... 375
Configuring the Minimum Oper Up Links in a Port Channel.................................................................................. 375
Adding or Removing a Port Channel from a VLAN.................................................................................................375
Assigning an IP Address to a Port Channel..............................................................................................................376
Deleting or Disabling a Port Channel......................................................................................................................... 377
Load Balancing Through Port Channels....................................................................................................................377
Changing the Hash Algorithm.................................................................................................................................... 377
Bulk Configuration.............................................................................................................................................................378
Interface Range........................................................................................................................................................... 378
Bulk Configuration Examples......................................................................................................................................378
Defining Interface Range Macros....................................................................................................................................379
Define the Interface Range........................................................................................................................................380
Choosing an Interface-Range Macro........................................................................................................................380
Monitoring and Maintaining Interfaces...........................................................................................................................380
Maintenance Using TDR..............................................................................................................................................381
Non Dell-Qualified Transceivers.......................................................................................................................................381
Splitting 40G Ports without Reload................................................................................................................................ 382
Splitting QSFP Ports to SFP+ Ports.............................................................................................................................. 383
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..................................................................................... 384
Link Dampening................................................................................................................................................................. 386
12
Contents
Enabling Link Dampening............................................................................................................................................388
Link Bundle Monitoring.....................................................................................................................................................389
Using Ethernet Pause Frames for Flow Control........................................................................................................... 389
Enabling Pause Frames...............................................................................................................................................390
Configure the MTU Size on an Interface.......................................................................................................................390
Port-Pipes...........................................................................................................................................................................391
Auto-Negotiation on Ethernet Interfaces.......................................................................................................................391
Setting the Speed of Ethernet Interfaces................................................................................................................392
Set Auto-Negotiation Options................................................................................................................................... 393
View Advanced Interface Information............................................................................................................................393
Configuring the Interface Sampling Size..................................................................................................................394
Configuring the Traffic Sampling Size Globally............................................................................................................. 395
Dynamic Counters.............................................................................................................................................................396
Clearing Interface Counters....................................................................................................................................... 397
Discard Counters...............................................................................................................................................................397
Display discard counters.............................................................................................................................................397
22 Internet Protocol Security (IPSec)...........................................................................................399
Configuring IPSec ............................................................................................................................................................ 399
23 IPv4 Routing...........................................................................................................................401
IP Addresses...................................................................................................................................................................... 402
Configuration Tasks for IP Addresses............................................................................................................................ 402
Assigning IP Addresses to an Interface..........................................................................................................................402
Configuring Static Routes................................................................................................................................................403
Adding description for IPv4 and IPv6 static routes................................................................................................ 404
Configure Static Routes for the Management Interface.............................................................................................404
IPv4 Path MTU Discovery Overview..............................................................................................................................405
Using the Configured Source IP Address in ICMP Messages.....................................................................................405
Configuring the Duration to Establish a TCP Connection........................................................................................... 406
Enabling Directed Broadcast........................................................................................................................................... 406
Resolution of Host Names............................................................................................................................................... 406
Enabling Dynamic Resolution of Host Names................................................................................................................407
Specifying the Local System Domain and a List of Domains.......................................................................................407
Configuring DNS with Traceroute...................................................................................................................................407
ARP..................................................................................................................................................................................... 408
Configuration Tasks for ARP........................................................................................................................................... 408
Configuring Static ARP Entries....................................................................................................................................... 408
Enabling Proxy ARP.......................................................................................................................................................... 409
Clearing ARP Cache..........................................................................................................................................................409
ARP Learning via Gratuitous ARP...................................................................................................................................409
Enabling ARP Learning via Gratuitous ARP....................................................................................................................410
ARP Learning via ARP Request....................................................................................................................................... 410
Configuring ARP Retries....................................................................................................................................................411
ICMP.....................................................................................................................................................................................411
Configuration Tasks for ICMP...........................................................................................................................................411
Enabling ICMP Unreachable Messages........................................................................................................................... 411
ICMP Redirects.................................................................................................................................................................. 412
UDP Helper......................................................................................................................................................................... 412
Contents
13
Enabling UDP Helper......................................................................................................................................................... 413
Configuring a Broadcast Address.................................................................................................................................... 413
Configurations Using UDP Helper....................................................................................................................................414
UDP Helper with Broadcast-All Addresses.....................................................................................................................414
UDP Helper with Subnet Broadcast Addresses.............................................................................................................415
UDP Helper with Configured Broadcast Addresses......................................................................................................415
UDP Helper with No Configured Broadcast Addresses................................................................................................416
Troubleshooting UDP Helper............................................................................................................................................416
24 IPv6 Routing........................................................................................................................... 417
Protocol Overview............................................................................................................................................................. 417
Extended Address Space............................................................................................................................................ 417
Stateless Autoconfiguration........................................................................................................................................417
IPv6 Headers................................................................................................................................................................ 418
IPv6 Header Fields....................................................................................................................................................... 418
Extension Header Fields............................................................................................................................................. 420
Addressing.....................................................................................................................................................................421
Implementing IPv6 with Dell EMC Networking OS....................................................................................................... 421
ICMPv6...............................................................................................................................................................................423
Path MTU discovery......................................................................................................................................................... 423
IPv6 Neighbor Discovery..................................................................................................................................................424
IPv6 Neighbor Discovery of MTU Packets.............................................................................................................. 425
Configuration Task List for IPv6 RDNSS....................................................................................................................... 425
Configuring the IPv6 Recursive DNS Server...........................................................................................................425
Debugging IPv6 RDNSS Information Sent to the Host .........................................................................................426
Displaying IPv6 RDNSS Information......................................................................................................................... 426
Secure Shell (SSH) Over an IPv6 Transport................................................................................................................. 427
Configuration Tasks for IPv6........................................................................................................................................... 427
Adjusting Your CAM-Profile....................................................................................................................................... 427
Assigning an IPv6 Address to an Interface.............................................................................................................. 428
Assigning a Static IPv6 Route....................................................................................................................................428
Configuring Telnet with IPv6..................................................................................................................................... 429
SNMP over IPv6..........................................................................................................................................................429
Displaying IPv6 Information........................................................................................................................................429
Displaying an IPv6 Interface Information..................................................................................................................430
Showing IPv6 Routes..................................................................................................................................................430
Showing the Running-Configuration for an Interface............................................................................................. 431
Clearing IPv6 Routes...................................................................................................................................................432
Disabling ND Entry Timeout....................................................................................................................................... 432
Configuring IPv6 RA Guard..............................................................................................................................................432
Configuring IPv6 RA Guard on an Interface............................................................................................................ 434
Monitoring IPv6 RA Guard......................................................................................................................................... 434
14
25 iSCSI Optimization................................................................................................................. 435
iSCSI Optimization Overview...........................................................................................................................................435
Monitoring iSCSI Traffic Flows..................................................................................................................................436
Application of Quality of Service to iSCSI Traffic Flows........................................................................................ 436
Information Monitored in iSCSI Traffic Flows..........................................................................................................437
Detection and Auto-Configuration for Dell EqualLogic Arrays.............................................................................. 437
Contents
Configuring Detection and Ports for Dell Compellent Arrays................................................................................ 438
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................. 438
Enable and Disable iSCSI Optimization.....................................................................................................................439
Default iSCSI Optimization Values.................................................................................................................................. 439
iSCSI Optimization Prerequisites.....................................................................................................................................439
Configuring iSCSI Optimization.......................................................................................................................................440
Displaying iSCSI Optimization Information......................................................................................................................441
26 Intermediate System to Intermediate System........................................................................... 443
IS-IS Protocol Overview...................................................................................................................................................443
IS-IS Addressing................................................................................................................................................................ 443
Multi-Topology IS-IS......................................................................................................................................................... 444
Transition Mode...........................................................................................................................................................444
Interface Support........................................................................................................................................................ 444
Adjacencies...................................................................................................................................................................444
Graceful Restart................................................................................................................................................................445
Timers........................................................................................................................................................................... 445
Implementation Information.............................................................................................................................................445
Configuration Information................................................................................................................................................ 446
Configuration Tasks for IS-IS.....................................................................................................................................446
Configuring the Distance of a Route........................................................................................................................ 453
Changing the IS-Type.................................................................................................................................................453
Redistributing IPv4 Routes........................................................................................................................................ 455
Redistributing IPv6 Routes........................................................................................................................................ 455
Configuring Authentication Passwords.................................................................................................................... 456
Setting the Overload Bit.............................................................................................................................................456
Debugging IS-IS........................................................................................................................................................... 457
IS-IS Metric Styles............................................................................................................................................................ 458
Configure Metric Values...................................................................................................................................................458
Maximum Values in the Routing Table..................................................................................................................... 458
Change the IS-IS Metric Style in One Level Only................................................................................................... 458
Leaks from One Level to Another.............................................................................................................................460
Sample Configurations..................................................................................................................................................... 460
27 Link Aggregation Control Protocol (LACP)................................................................................463
Introduction to Dynamic LAGs and LACP......................................................................................................................463
Important Points to Remember.................................................................................................................................463
LACP Modes................................................................................................................................................................463
Configuring LACP Commands...................................................................................................................................464
LACP Configuration Tasks...............................................................................................................................................464
Creating a LAG............................................................................................................................................................ 464
Configuring the LAG Interfaces as Dynamic............................................................................................................465
Setting the LACP Long Timeout............................................................................................................................... 465
Monitoring and Debugging LACP..............................................................................................................................466
Shared LAG State Tracking............................................................................................................................................. 466
Configuring Shared LAG State Tracking.................................................................................................................. 467
Important Points about Shared LAG State Tracking..............................................................................................468
LACP Basic Configuration Example................................................................................................................................468
Configure a LAG on ALPHA.......................................................................................................................................468
Contents
15
28 Layer 2...................................................................................................................................476
Manage the MAC Address Table.................................................................................................................................... 476
Clearing the MAC Address Table.............................................................................................................................. 476
Setting the Aging Time for Dynamic Entries............................................................................................................476
Configuring a Static MAC Address........................................................................................................................... 476
Displaying the MAC Address Table............................................................................................................................477
MAC Learning Limit...........................................................................................................................................................477
Setting the MAC Learning Limit................................................................................................................................ 477
mac learning-limit Dynamic.........................................................................................................................................478
mac learning-limit mac-address-sticky..................................................................................................................... 478
mac learning-limit station-move................................................................................................................................ 478
mac learning-limit no-station-move.......................................................................................................................... 478
Learning Limit Violation Actions.................................................................................................................................479
Setting Station Move Violation Actions....................................................................................................................479
Recovering from Learning Limit and Station Move Violations...............................................................................479
Enabling port security................................................................................................................................................. 480
NIC Teaming...................................................................................................................................................................... 480
Configure Redundant Pairs...............................................................................................................................................481
Far-End Failure Detection................................................................................................................................................ 484
FEFD State Changes.................................................................................................................................................. 484
Configuring FEFD........................................................................................................................................................485
Enabling FEFD on an Interface.................................................................................................................................. 486
Debugging FEFD..........................................................................................................................................................486
29 Link Layer Discovery Protocol (LLDP).......................................................................................488
802.1AB (LLDP) Overview...............................................................................................................................................488
Protocol Data Units.....................................................................................................................................................488
Optional TLVs.................................................................................................................................................................... 489
Management TLVs......................................................................................................................................................489
TIA-1057 (LLDP-MED) Overview...................................................................................................................................490
TIA Organizationally Specific TLVs............................................................................................................................ 491
Configure LLDP................................................................................................................................................................. 494
CONFIGURATION versus INTERFACE Configurations............................................................................................... 494
Enabling LLDP................................................................................................................................................................... 495
Disabling and Undoing LLDP......................................................................................................................................495
Enabling LLDP on Management Ports........................................................................................................................... 495
Disabling and Undoing LLDP on Management Ports..............................................................................................496
Advertising TLVs............................................................................................................................................................... 496
Storing and Viewing Unrecognized LLDP TLVs............................................................................................................ 497
Viewing the LLDP Configuration.....................................................................................................................................498
Viewing Information Advertised by Adjacent LLDP Neighbors...................................................................................498
Examples of Viewing Information Advertised by Neighbors..................................................................................498
Configuring LLDPDU Intervals......................................................................................................................................... 501
Configuring LLDP Notification Interval........................................................................................................................... 501
Configuring LLDP Notification Interval.......................................................................................................................... 502
Configuring Transmit and Receive Mode.......................................................................................................................502
Configuring the Time to Live Value................................................................................................................................ 503
Debugging LLDP............................................................................................................................................................... 503
16
Contents
Relevant Management Objects.......................................................................................................................................504
30 Microsoft Network Load Balancing...........................................................................................509
Configuring a Switch for NLB .........................................................................................................................................510
Enabling a Switch for Multicast NLB.........................................................................................................................510
31 Multicast Source Discovery Protocol (MSDP)............................................................................ 512
Anycast RP......................................................................................................................................................................... 513
Implementation Information..............................................................................................................................................514
Configure Multicast Source Discovery Protocol............................................................................................................514
Related Configuration Tasks.......................................................................................................................................514
Enable MSDP......................................................................................................................................................................518
Manage the Source-Active Cache.................................................................................................................................. 519
Viewing the Source-Active Cache.............................................................................................................................519
Limiting the Source-Active Cache.............................................................................................................................519
Clearing the Source-Active Cache............................................................................................................................ 519
Enabling the Rejected Source-Active Cache.......................................................................................................... 520
Accept Source-Active Messages that Fail the RFP Check.........................................................................................520
Specifying Source-Active Messages.............................................................................................................................. 522
Limiting the Source-Active Messages from a Peer......................................................................................................523
Preventing MSDP from Caching a Local Source..........................................................................................................523
Preventing MSDP from Caching a Remote Source..................................................................................................... 523
Preventing MSDP from Advertising a Local Source.....................................................................................................524
Logging Changes in Peership States..............................................................................................................................525
Terminating a Peership.....................................................................................................................................................525
Clearing Peer Statistics.................................................................................................................................................... 525
Debugging MSDP..............................................................................................................................................................526
MSDP with Anycast RP................................................................................................................................................... 526
Configuring Anycast RP................................................................................................................................................... 527
Reducing Source-Active Message Flooding............................................................................................................ 528
Specifying the RP Address Used in SA Messages..................................................................................................528
MSDP Sample Configurations.........................................................................................................................................530
32 Multicast Listener Discovery Protocol...................................................................................... 533
MLD timers........................................................................................................................................................................ 536
Reducing Host Response Burstiness........................................................................................................................536
Configuring MLD Version.................................................................................................................................................536
Clearing MLD groups........................................................................................................................................................ 537
Debugging MLD.................................................................................................................................................................537
Explicit Tracking.................................................................................................................................................................537
Reducing Leave Latency.................................................................................................................................................. 537
Displaying MLD groups table........................................................................................................................................... 537
Displaying MLD Interfaces............................................................................................................................................... 538
33 Multiple Spanning Tree Protocol (MSTP)................................................................................. 539
Spanning Tree Variations................................................................................................................................................. 540
Implementation Information.......................................................................................................................................540
Configure Multiple Spanning Tree Protocol...................................................................................................................540
Related Configuration Tasks......................................................................................................................................540
Contents
17
Enable Multiple Spanning Tree Globally.......................................................................................................................... 541
Adding and Removing Interfaces.....................................................................................................................................541
Creating Multiple Spanning Tree Instances....................................................................................................................541
Influencing MSTP Root Selection................................................................................................................................... 542
Interoperate with Non-Dell Bridges................................................................................................................................ 543
Changing the Region Name or Revision.........................................................................................................................543
Modifying Global Parameters.......................................................................................................................................... 543
Modifying the Interface Parameters...............................................................................................................................544
Setting STP path cost as constant................................................................................................................................ 545
Configuring an EdgePort..................................................................................................................................................545
Flush MAC Addresses after a Topology Change.......................................................................................................... 546
MSTP Sample Configurations......................................................................................................................................... 546
Debugging and Verifying MSTP Configurations........................................................................................................... 550
34 Multicast Features..................................................................................................................552
Enabling IP Multicast........................................................................................................................................................ 552
Implementation Information.............................................................................................................................................552
Multicast Policies...............................................................................................................................................................553
IPv4 Multicast Policies................................................................................................................................................553
Understanding Multicast Traceroute (mtrace).............................................................................................................559
Printing Multicast Traceroute (mtrace) Paths..............................................................................................................559
Supported Error Codes..................................................................................................................................................... 561
mtrace Scenarios............................................................................................................................................................... 561
35 Multicast Listener Discovery Protocol...................................................................................... 567
MLD timers........................................................................................................................................................................ 570
Reducing Host Response Burstiness........................................................................................................................570
Clearing MLD groups........................................................................................................................................................ 570
Debugging MLD..................................................................................................................................................................571
Explicit Tracking................................................................................................................................................................. 571
Reducing Leave Latency...................................................................................................................................................571
Displaying MLD groups table............................................................................................................................................ 571
Displaying MLD Interfaces................................................................................................................................................ 571
MLD Snooping................................................................................................................................................................... 572
Enable MLD Snooping.................................................................................................................................................572
Disable MLD Snooping................................................................................................................................................572
Configure the switch as a querier............................................................................................................................. 572
Specify port as connected to multicast router........................................................................................................573
Enable Snooping Explicit Tracking.............................................................................................................................573
Display the MLD Snooping Table...............................................................................................................................573
36 Object Tracking...................................................................................................................... 574
Object Tracking Overview................................................................................................................................................574
Track Layer 2 Interfaces.............................................................................................................................................575
Track Layer 3 Interfaces.............................................................................................................................................575
Track IPv4 and IPv6 Routes...................................................................................................................................... 575
Set Tracking Delays.....................................................................................................................................................576
VRRP Object Tracking................................................................................................................................................ 577
Object Tracking Configuration.........................................................................................................................................577
18
Contents
Tracking a Layer 2 Interface.......................................................................................................................................577
Tracking a Layer 3 Interface...................................................................................................................................... 578
Track an IPv4/IPv6 Route......................................................................................................................................... 579
Displaying Tracked Objects..............................................................................................................................................582
37 Open Shortest Path First (OSPFv2 and OSPFv3)...................................................................... 584
Protocol Overview............................................................................................................................................................ 584
Autonomous System (AS) Areas.............................................................................................................................. 584
Area Types................................................................................................................................................................... 585
Networks and Neighbors............................................................................................................................................586
Router Types............................................................................................................................................................... 586
Designated and Backup Designated Routers...........................................................................................................587
Link-State Advertisements (LSAs)........................................................................................................................... 587
Router Priority and Cost.............................................................................................................................................588
OSPF with Dell EMC Networking OS.............................................................................................................................589
Graceful Restart..........................................................................................................................................................589
Fast Convergence (OSPFv2, IPv4 Only).................................................................................................................590
Multi-Process OSPFv2 with VRF............................................................................................................................. 590
OSPF ACK Packing......................................................................................................................................................591
Setting OSPF Adjacency with Cisco Routers.......................................................................................................... 591
Configuration Information.................................................................................................................................................591
Configuration Task List for OSPFv2 (OSPF for IPv4)........................................................................................... 592
OSPFv3 NSSA.............................................................................................................................................................603
Configuration Task List for OSPFv3 (OSPF for IPv6)...........................................................................................604
MIB Support for OSPFv3................................................................................................................................................. 615
Viewing the OSPFv3 MIB........................................................................................................................................... 615
Configuration Task List for OSPFv3 (OSPF for IPv6)..................................................................................................616
Enabling IPv6 Unicast Routing................................................................................................................................... 616
Applying cost for OSPFv3.......................................................................................................................................... 616
Assigning IPv6 Addresses on an Interface................................................................................................................617
Assigning Area ID on an Interface.............................................................................................................................. 617
Assigning OSPFv3 Process ID and Router ID Globally............................................................................................ 617
Assigning OSPFv3 Process ID and Router ID to a VRF.......................................................................................... 618
Configuring Stub Areas............................................................................................................................................... 618
Configuring Passive-Interface....................................................................................................................................618
Redistributing Routes.................................................................................................................................................. 619
Configuring a Default Route....................................................................................................................................... 619
Enabling OSPFv3 Graceful Restart........................................................................................................................... 619
OSPFv3 Authentication Using IPsec......................................................................................................................... 621
Troubleshooting OSPFv3........................................................................................................................................... 627
38 Policy-based Routing (PBR).................................................................................................... 628
Overview............................................................................................................................................................................ 628
Implementing PBR.............................................................................................................................................................629
Configuration Task List for Policy-based Routing........................................................................................................ 629
Create a Redirect List.................................................................................................................................................630
Create a Rule for a Redirect-list................................................................................................................................630
Apply a Redirect-list to an Interface using a Redirect-group................................................................................. 631
Sample Configuration....................................................................................................................................................... 634
Contents
19
39 PIM Sparse-Mode (PIM-SM)................................................................................................... 638
Implementation Information.............................................................................................................................................638
Protocol Overview............................................................................................................................................................ 638
Requesting Multicast Traffic......................................................................................................................................638
Refuse Multicast Traffic.............................................................................................................................................638
Send Multicast Traffic................................................................................................................................................ 639
Configuring PIM-SM.........................................................................................................................................................639
Related Configuration Tasks......................................................................................................................................639
Enable PIM-SM................................................................................................................................................................. 639
Configuring S,G Expiry Timers......................................................................................................................................... 641
Configuring a Static Rendezvous Point......................................................................................................................... 642
Overriding Bootstrap Router Updates......................................................................................................................642
Configuring a Designated Router....................................................................................................................................643
Creating Multicast Boundaries and Domains.................................................................................................................644
Electing an RP using the BSR Mechanism.................................................................................................................... 644
40 PIM Source-Specific Mode (PIM-SSM).................................................................................... 646
Implementation Information.............................................................................................................................................646
Configure PIM-SSM......................................................................................................................................................... 646
Enabling PIM-SSM............................................................................................................................................................ 647
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................... 647
Electing an RP using the BSR Mechanism.................................................................................................................... 649
Enabling RP to Server Specific Multicast Groups.................................................................................................. 650
41 Port Monitoring.......................................................................................................................651
Important Points to Remember....................................................................................................................................... 651
Port Monitoring..................................................................................................................................................................651
Configuring Port Monitoring............................................................................................................................................654
Configuring Monitor Multicast Queue............................................................................................................................655
Enabling Flow-Based Monitoring.................................................................................................................................... 655
Remote Port Mirroring..................................................................................................................................................... 656
Remote Port Mirroring Example................................................................................................................................657
Configuring Remote Port Mirroring.......................................................................................................................... 657
Displaying Remote-Port Mirroring Configurations..................................................................................................659
Configuration procedure for Remote Port Mirroring..............................................................................................659
Encapsulated Remote Port Monitoring..........................................................................................................................663
ERPM Behavior on a typical Dell EMC Networking OS ..............................................................................................665
Port Monitoring on VLT................................................................................................................................................... 666
42 Private VLANs (PVLAN).......................................................................................................... 669
Private VLAN Concepts...................................................................................................................................................669
Using the Private VLAN Commands...............................................................................................................................670
Configuration Task List......................................................................................................................................................671
Creating PVLAN ports.................................................................................................................................................671
Creating a Primary VLAN............................................................................................................................................ 671
Creating a Community VLAN.....................................................................................................................................672
Creating an Isolated VLAN......................................................................................................................................... 673
Private VLAN Configuration Example.............................................................................................................................674
20
Contents
Inspecting the Private VLAN Configuration...................................................................................................................675
43 Per-VLAN Spanning Tree Plus (PVST+).................................................................................... 677
Protocol Overview.............................................................................................................................................................677
Implementation Information............................................................................................................................................. 678
Configure Per-VLAN Spanning Tree Plus...................................................................................................................... 678
Enabling PVST+.................................................................................................................................................................678
Disabling PVST+................................................................................................................................................................ 678
Influencing PVST+ Root Selection..................................................................................................................................679
Modifying Global PVST+ Parameters.............................................................................................................................680
Modifying Interface PVST+ Parameters.........................................................................................................................681
Configuring an EdgePort...................................................................................................................................................681
PVST+ in Multi-Vendor Networks.................................................................................................................................. 682
Enabling PVST+ Extend System ID................................................................................................................................ 682
PVST+ Sample Configurations........................................................................................................................................683
44 Quality of Service (QoS)......................................................................................................... 685
Implementation Information............................................................................................................................................. 687
Port-Based QoS Configurations......................................................................................................................................687
Setting dot1p Priorities for Incoming Traffic............................................................................................................687
Honoring dot1p Priorities on Ingress Traffic.............................................................................................................688
Configuring Port-Based Rate Policing......................................................................................................................688
Configuring Port-Based Rate Shaping..................................................................................................................... 688
Policy-Based QoS Configurations...................................................................................................................................689
Classify Traffic.............................................................................................................................................................689
Create a QoS Policy....................................................................................................................................................692
Create Policy Maps.....................................................................................................................................................694
DSCP Color Maps............................................................................................................................................................. 697
Creating a DSCP Color Map...................................................................................................................................... 697
Displaying DSCP Color Maps.....................................................................................................................................698
Displaying a DSCP Color Policy Configuration ....................................................................................................... 698
Enabling QoS Rate Adjustment.......................................................................................................................................699
Enabling Strict-Priority Queueing....................................................................................................................................699
Weighted Random Early Detection.................................................................................................................................699
Creating WRED Profiles............................................................................................................................................. 700
Applying a WRED Profile to Traffic...........................................................................................................................700
Displaying Default and Configured WRED Profiles.................................................................................................. 701
Displaying WRED Drop Statistics............................................................................................................................... 701
Displaying egress–queue Statistics............................................................................................................................701
Pre-Calculating Available QoS CAM Space....................................................................................................................701
Configuring Weights and ECN for WRED .....................................................................................................................702
Configuring WRED and ECN Attributes.........................................................................................................................704
Guidelines for Configuring ECN for Classifying and Color-Marking Packets............................................................ 704
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class.................................... 705
Classifying Incoming Packets Using ECN and Color-Marking...............................................................................705
Sample configuration to mark non-ecn packets as “yellow” with single traffic class.........................................707
Applying Layer 2 Match Criteria on a Layer 3 Interface...............................................................................................708
Applying DSCP and VLAN Match Criteria on a Service Queue.................................................................................. 708
Classifying Incoming Packets Using ECN and Color-Marking.....................................................................................709
Contents
21
Guidelines for Configuring ECN for Classifying and Color-Marking Packets............................................................. 710
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class............................................711
Sample configuration to mark non-ecn packets as “yellow” with single traffic class................................................711
Enabling Buffer Statistics Tracking .................................................................................................................................712
45 Routing Information Protocol (RIP).......................................................................................... 715
Protocol Overview............................................................................................................................................................. 715
RIPv1.............................................................................................................................................................................. 715
RIPv2............................................................................................................................................................................. 715
Implementation Information..............................................................................................................................................715
Configuration Information................................................................................................................................................. 716
Configuration Task List................................................................................................................................................716
RIP Configuration Example......................................................................................................................................... 721
46 Remote Monitoring (RMON)....................................................................................................726
Implementation Information............................................................................................................................................. 726
Fault Recovery...................................................................................................................................................................726
Setting the RMON Alarm........................................................................................................................................... 726
Configuring an RMON Event..................................................................................................................................... 727
Configuring RMON Collection Statistics.................................................................................................................. 728
Configuring the RMON Collection History...............................................................................................................728
47 Rapid Spanning Tree Protocol (RSTP)...................................................................................... 729
Protocol Overview............................................................................................................................................................ 729
Configuring Rapid Spanning Tree....................................................................................................................................729
Important Points to Remember.......................................................................................................................................729
RSTP and VLT............................................................................................................................................................. 730
Configuring Interfaces for Layer 2 Mode.......................................................................................................................730
Enabling Rapid Spanning Tree Protocol Globally...........................................................................................................730
Adding and Removing Interfaces.................................................................................................................................... 732
Modifying Global Parameters...........................................................................................................................................732
Enabling SNMP Traps for Root Elections and Topology Changes........................................................................733
Modifying Interface Parameters......................................................................................................................................734
Enabling SNMP Traps for Root Elections and Topology Changes............................................................................. 734
Influencing RSTP Root Selection.................................................................................................................................... 734
Configuring an EdgePort.................................................................................................................................................. 734
Configuring Fast Hellos for Link State Detection..........................................................................................................735
48 Software-Defined Networking (SDN)....................................................................................... 737
49 Security................................................................................................................................. 738
AAA Accounting.................................................................................................................................................................738
Configuration Task List for AAA Accounting........................................................................................................... 738
RADIUS Accounting.................................................................................................................................................... 740
AAA Authentication...........................................................................................................................................................745
Configuration Task List for AAA Authentication..................................................................................................... 745
Obscuring Passwords and Keys.......................................................................................................................................747
AAA Authorization............................................................................................................................................................. 748
Privilege Levels Overview...........................................................................................................................................748
22
Contents
Configuration Task List for Privilege Levels.............................................................................................................748
RADIUS...............................................................................................................................................................................752
RADIUS Authentication.............................................................................................................................................. 752
Configuration Task List for RADIUS..........................................................................................................................753
Support for Change of Authorization and Disconnect Messages packets..........................................................756
TACACS+...........................................................................................................................................................................765
Configuration Task List for TACACS+......................................................................................................................765
TACACS+ Remote Authentication............................................................................................................................766
Command Authorization............................................................................................................................................. 767
Protection from TCP Tiny and Overlapping Fragment Attacks..................................................................................768
Enabling SCP and SSH..................................................................................................................................................... 768
Using SCP with SSH to Copy a Software Image.................................................................................................... 768
Removing the RSA Host Keys and Zeroizing Storage ...........................................................................................769
Configuring When to Re-generate an SSH Key .....................................................................................................769
Configuring the SSH Server Key Exchange Algorithm...........................................................................................770
Configuring the HMAC Algorithm for the SSH Server...........................................................................................770
Configuring the SSH Server Cipher List....................................................................................................................771
Configuring DNS in the SSH Server.......................................................................................................................... 771
Secure Shell Authentication....................................................................................................................................... 772
Troubleshooting SSH.................................................................................................................................................. 774
Telnet.................................................................................................................................................................................. 774
VTY Line and Access-Class Configuration..................................................................................................................... 774
VTY Line Local Authentication and Authorization...................................................................................................775
VTY Line Remote Authentication and Authorization.............................................................................................. 775
VTY MAC-SA Filter Support...................................................................................................................................... 775
Role-Based Access Control..............................................................................................................................................776
Overview of RBAC...................................................................................................................................................... 776
User Roles.....................................................................................................................................................................778
AAA Authentication and Authorization for Roles..................................................................................................... 781
Role Accounting...........................................................................................................................................................783
Display Information About User Roles.......................................................................................................................784
Two Factor Authentication (2FA)...................................................................................................................................785
Handling Access-Challenge Message....................................................................................................................... 785
Configuring Challenge Response Authentication for SSHv2.................................................................................785
SMS-OTP Mechanism................................................................................................................................................786
Configuring the System to Drop Certain ICMP Reply Messages............................................................................... 786
Dell EMC Networking OS Security Hardening...............................................................................................................788
Dell EMC Networking OS Image Verification...........................................................................................................788
Startup Configuration Verification............................................................................................................................ 789
Configuring the root User Password........................................................................................................................ 790
Locking Access to GRUB Interface.......................................................................................................................... 790
Enabling User Lockout for Failed Login Attempts................................................................................................... 791
50 Service Provider Bridging........................................................................................................792
VLAN Stacking...................................................................................................................................................................792
Configure VLAN Stacking...........................................................................................................................................793
Creating Access and Trunk Ports..............................................................................................................................794
Enable VLAN-Stacking for a VLAN...........................................................................................................................794
Configuring the Protocol Type Value for the Outer VLAN Tag............................................................................ 795
Configuring Dell EMC Networking OS Options for Trunk Ports........................................................................... 795
Contents
23
Debugging VLAN Stacking.........................................................................................................................................796
VLAN Stacking in Multi-Vendor Networks.............................................................................................................. 796
VLAN Stacking Packet Drop Precedence..................................................................................................................... 800
Enabling Drop Eligibility...............................................................................................................................................800
Honoring the Incoming DEI Value............................................................................................................................. 800
Marking Egress Packets with a DEI Value................................................................................................................ 801
Dynamic Mode CoS for VLAN Stacking......................................................................................................................... 801
Mapping C-Tag to S-Tag dot1p Values.................................................................................................................... 803
Layer 2 Protocol Tunneling.............................................................................................................................................. 803
Enabling Layer 2 Protocol Tunneling........................................................................................................................ 805
Specifying a Destination MAC Address for BPDUs................................................................................................806
Setting Rate-Limit BPDUs......................................................................................................................................... 806
Debugging Layer 2 Protocol Tunneling.................................................................................................................... 806
Provider Backbone Bridging............................................................................................................................................ 806
51 sFlow..................................................................................................................................... 808
Overview............................................................................................................................................................................ 808
Implementation Information.............................................................................................................................................808
Enabling Extended sFlow................................................................................................................................................. 809
Enabling and Disabling sFlow on an Interface................................................................................................................ 810
Enabling sFlow Max-Header Size Extended...................................................................................................................810
sFlow Show Commands.................................................................................................................................................... 811
Displaying Show sFlow Global..................................................................................................................................... 811
Displaying Show sFlow on an Interface......................................................................................................................811
Displaying Show sFlow on a Stack-unit.....................................................................................................................812
Configuring Specify Collectors.........................................................................................................................................812
Changing the Polling Intervals..........................................................................................................................................812
Back-Off Mechanism........................................................................................................................................................ 813
sFlow on LAG ports........................................................................................................................................................... 813
Enabling Extended sFlow.................................................................................................................................................. 813
Important Points to Remember..................................................................................................................................814
24
52 Simple Network Management Protocol (SNMP)........................................................................ 815
Protocol Overview.............................................................................................................................................................816
Implementation Information..............................................................................................................................................816
SNMPv3 Compliance With FIPS......................................................................................................................................816
Configuration Task List for SNMP...................................................................................................................................817
Important Points to Remember........................................................................................................................................817
Set up SNMP......................................................................................................................................................................817
Creating a Community.................................................................................................................................................818
Setting Up User-Based Security (SNMPv3)............................................................................................................818
Enable SNMPv3 traps................................................................................................................................................. 819
Reading Managed Object Values.....................................................................................................................................819
Writing Managed Object Values......................................................................................................................................820
Configuring Contact and Location Information using SNMP......................................................................................820
Subscribing to Managed Object Value Updates using SNMP..................................................................................... 821
Enabling a Subset of SNMP Traps.................................................................................................................................. 821
Enabling an SNMP Agent to Notify Syslog Server Failure...........................................................................................823
Copy Configuration Files Using SNMP...........................................................................................................................824
Contents
Copying a Configuration File......................................................................................................................................825
Copying Configuration Files via SNMP.....................................................................................................................826
Copying the Startup-Config Files to the Running-Config......................................................................................826
Copying the Startup-Config Files to the Server via FTP....................................................................................... 827
Copying the Startup-Config Files to the Server via TFTP.....................................................................................827
Copy a Binary File to the Startup-Configuration.....................................................................................................827
Additional MIB Objects to View Copy Statistics..................................................................................................... 828
Obtaining a Value for MIB Objects............................................................................................................................828
MIB Support to Display Reason for Last System Reboot............................................................................................829
Viewing the Reason for Last System Reboot Using SNMP.................................................................................. 829
MIB Support for Power Monitoring................................................................................................................................829
MIB Support to Display the Available Memory Size on Flash......................................................................................830
Viewing the Available Flash Memory Size................................................................................................................830
MIB Support to Display the Software Core Files Generated by the System............................................................ 830
Viewing the Software Core Files Generated by the System..................................................................................831
MIB Support to Display the Available Partitions on Flash.............................................................................................831
Viewing the Available Partitions on Flash.................................................................................................................832
MIB Support to Display Egress Queue Statistics..........................................................................................................833
MIB Support to ECMP Group Count..............................................................................................................................833
Viewing the ECMP Group Count Information......................................................................................................... 833
MIB Support for entAliasMappingTable ........................................................................................................................ 836
Viewing the entAliasMappingTable MIB...................................................................................................................836
MIB Support for LAG........................................................................................................................................................836
Viewing the LAG MIB..................................................................................................................................................837
MIB Support to Display Unrecognized LLDP TLVs...................................................................................................... 838
MIB Support to Display Reserved Unrecognized LLDP TLVs............................................................................... 838
MIB Support to Display Organizational Specific Unrecognized LLDP TLVs........................................................839
MIB Support for LLDP Notification Interval.................................................................................................................. 839
MIB support for Port Security.........................................................................................................................................840
Global MIB objects for port security.........................................................................................................................840
MIB support for interface level port security...........................................................................................................840
MIB objects for configuring MAC addresses............................................................................................................841
MIB objects for configuring MAC addresses...........................................................................................................842
Manage VLANs using SNMP...........................................................................................................................................843
Creating a VLAN..........................................................................................................................................................843
Assigning a VLAN Alias............................................................................................................................................... 843
Displaying the Ports in a VLAN..................................................................................................................................843
Add Tagged and Untagged Ports to a VLAN.......................................................................................................... 844
Managing Overload on Startup....................................................................................................................................... 845
Enabling and Disabling a Port using SNMP....................................................................................................................845
Fetch Dynamic MAC Entries using SNMP.....................................................................................................................846
Example of Deriving the Interface Index Number......................................................................................................... 847
MIB Objects for Viewing the System Image on Flash Partitions...........................................................................847
Monitoring BGP sessions via SNMP...............................................................................................................................847
Monitor Port-Channels.....................................................................................................................................................849
Enabling an SNMP Agent to Notify Syslog Server Failure.......................................................................................... 850
Troubleshooting SNMP Operation.................................................................................................................................. 851
Transceiver Monitoring..................................................................................................................................................... 851
Configuring SNMP context name...................................................................................................................................852
Contents
25
53 Stacking................................................................................................................................ 854
Stacking Overview............................................................................................................................................................854
Stack Management Roles.......................................................................................................................................... 854
Stack Master Election................................................................................................................................................ 855
Virtual IP....................................................................................................................................................................... 856
Failover Roles...............................................................................................................................................................857
MAC Addressing on Stacks........................................................................................................................................857
Stacking LAG............................................................................................................................................................... 858
Supported Stacking Topologies.................................................................................................................................858
High Availability on Stacks......................................................................................................................................... 858
Management Access on Stacks................................................................................................................................859
Mixed-mode Stacking.................................................................................................................................................860
Important Points to Remember....................................................................................................................................... 861
Stacking Installation Tasks................................................................................................................................................861
Create a Stack..............................................................................................................................................................861
Add Units to an Existing Stack.................................................................................................................................. 865
Split a Stack................................................................................................................................................................. 867
Stacking Configuration Tasks.......................................................................................................................................... 867
Assigning Unit Numbers to Units in an Stack.......................................................................................................... 867
Creating a Virtual Stack Unit on a Stack..................................................................................................................868
Displaying Information about a Stack....................................................................................................................... 868
Influencing Management Unit Selection on a Stack............................................................................................... 870
Managing Redundancy on a Stack.............................................................................................................................871
Resetting a Unit on a Stack........................................................................................................................................ 871
Enabling Mixed-mode Stacking.................................................................................................................................. 871
Verify a Stack Configuration............................................................................................................................................872
Displaying the Status of Stacking Ports................................................................................................................... 872
Remove Units or Front End Ports from a Stack........................................................................................................... 873
Removing a Unit from a Stack...................................................................................................................................873
Removing Front End Port Stacking.......................................................................................................................... 874
Troubleshoot a Stack........................................................................................................................................................874
Recover from Stack Link Flaps..................................................................................................................................875
Recover from a Card Problem State on a Stack.....................................................................................................875
26
54 Storm Control.........................................................................................................................877
Configure Storm Control.................................................................................................................................................. 877
Configuring Storm Control from INTERFACE Mode.............................................................................................. 877
Configuring Storm Control from CONFIGURATION Mode................................................................................... 878
55 Spanning Tree Protocol (STP)................................................................................................. 879
Protocol Overview............................................................................................................................................................ 879
Configure Spanning Tree..................................................................................................................................................879
Important Points to Remember.......................................................................................................................................880
Configuring Interfaces for Layer 2 Mode.......................................................................................................................880
Enabling Spanning Tree Protocol Globally...................................................................................................................... 881
Adding an Interface to the Spanning Tree Group.........................................................................................................883
Modifying Global Parameters.......................................................................................................................................... 883
Modifying Interface STP Parameters.............................................................................................................................884
Contents
Enabling PortFast..............................................................................................................................................................884
Prevent Network Disruptions with BPDU Guard....................................................................................................885
Selecting STP Root...........................................................................................................................................................887
STP Root Guard................................................................................................................................................................ 887
Root Guard Scenario...................................................................................................................................................887
Configuring Root Guard..............................................................................................................................................888
Enabling SNMP Traps for Root Elections and Topology Changes.............................................................................889
Configuring Spanning Trees as Hitless...........................................................................................................................889
STP Loop Guard................................................................................................................................................................889
Configuring Loop Guard............................................................................................................................................. 890
Displaying STP Guard Configuration............................................................................................................................... 891
56 SupportAssist........................................................................................................................ 892
Configuring SupportAssist Using a Configuration Wizard........................................................................................... 892
Configuring SupportAssist Manually...............................................................................................................................893
Configuring SupportAssist Activity.................................................................................................................................894
Configuring SupportAssist Company............................................................................................................................. 896
Configuring SupportAssist Person..................................................................................................................................896
Configuring SupportAssist Server...................................................................................................................................897
Viewing SupportAssist Configuration.............................................................................................................................898
57 System Time and Date............................................................................................................ 900
Network Time Protocol....................................................................................................................................................900
Protocol Overview....................................................................................................................................................... 901
Configure the Network Time Protocol......................................................................................................................901
Enabling NTP................................................................................................................................................................901
Configuring NTP Broadcasts.....................................................................................................................................902
Disabling NTP on an Interface................................................................................................................................... 902
Configuring a Source IP Address for NTP Packets................................................................................................ 902
Configuring NTP Authentication............................................................................................................................... 903
Configuring NTP control key password................................................................................................................... 905
Configuring the NTP Step-Threshold...................................................................................................................... 905
Dell EMC Networking OS Time and Date...................................................................................................................... 905
Configuration Task List ............................................................................................................................................. 905
Setting the Time and Date for the Switch Software Clock...................................................................................905
Setting the Timezone................................................................................................................................................. 906
Set Daylight Saving Time........................................................................................................................................... 906
Setting Daylight Saving Time Once.......................................................................................................................... 906
Setting Recurring Daylight Saving Time...................................................................................................................907
58 Tunneling...............................................................................................................................909
Configuring a Tunnel.........................................................................................................................................................909
Configuring Tunnel Keepalive Settings........................................................................................................................... 910
Configuring a Tunnel Interface.........................................................................................................................................910
Configuring Tunnel Allow-Remote Decapsulation.......................................................................................................... 911
Configuring the Tunnel Source Anylocal..........................................................................................................................911
59 Uplink Failure Detection (UFD).................................................................................................912
Feature Description........................................................................................................................................................... 912
Contents
27
How Uplink Failure Detection Works...............................................................................................................................913
UFD and NIC Teaming.......................................................................................................................................................914
Important Points to Remember....................................................................................................................................... 914
Configuring Uplink Failure Detection...............................................................................................................................915
Clearing a UFD-Disabled Interface.................................................................................................................................. 916
Displaying Uplink Failure Detection.................................................................................................................................. 917
Sample Configuration: Uplink Failure Detection.............................................................................................................918
60 Upgrade Procedures............................................................................................................... 920
61 Virtual LANs (VLANs)...............................................................................................................921
Default VLAN......................................................................................................................................................................921
Port-Based VLANs............................................................................................................................................................922
VLANs and Port Tagging..................................................................................................................................................922
Configuration Task List.....................................................................................................................................................923
Creating a Port-Based VLAN.....................................................................................................................................923
Assigning Interfaces to a VLAN.................................................................................................................................923
Moving Untagged Interfaces..................................................................................................................................... 924
Assigning an IP Address to a VLAN.......................................................................................................................... 925
Configuring Native VLANs...............................................................................................................................................926
Enabling Null VLAN as the Default VLAN...................................................................................................................... 926
62 Virtual Link Trunking (VLT)......................................................................................................927
Overview............................................................................................................................................................................ 927
VLT Terminology......................................................................................................................................................... 929
Layer-2 Traffic in VLT Domains.................................................................................................................................929
Interspersed VLANs....................................................................................................................................................930
VLT on Core Switches.................................................................................................................................................931
Enhanced VLT.............................................................................................................................................................. 931
Configure Virtual Link Trunking....................................................................................................................................... 932
Important Points to Remember.................................................................................................................................932
Configuration Notes....................................................................................................................................................933
Primary and Secondary VLT Peers........................................................................................................................... 936
RSTP and VLT............................................................................................................................................................. 936
VLT Bandwidth Monitoring........................................................................................................................................ 937
VLT and Stacking........................................................................................................................................................ 937
VLT and IGMP Snooping............................................................................................................................................ 937
VLT IPv6....................................................................................................................................................................... 937
VLT Port Delayed Restoration................................................................................................................................... 937
PIM-Sparse Mode Support on VLT.......................................................................................................................... 938
VLT Routing ................................................................................................................................................................ 939
Non-VLT ARP Sync.................................................................................................................................................... 942
RSTP Configuration.......................................................................................................................................................... 942
Preventing Forwarding Loops in a VLT Domain......................................................................................................942
Sample RSTP configuration....................................................................................................................................... 943
Configuring VLT...........................................................................................................................................................943
PVST+ Configuration........................................................................................................................................................952
Peer Routing Configuration Example............................................................................................................................. 953
Dell-1 Switch Configuration........................................................................................................................................953
28
Contents
Dell-2 Switch Configuration....................................................................................................................................... 957
R1 Configuration..........................................................................................................................................................960
Access Switch A1 Configurations and Verification.................................................................................................. 961
eVLT Configuration Example...........................................................................................................................................962
PIM-Sparse Mode Configuration Example.................................................................................................................... 964
Verifying a VLT Configuration......................................................................................................................................... 964
Additional VLT Sample Configurations........................................................................................................................... 967
Troubleshooting VLT........................................................................................................................................................ 969
Reconfiguring Stacked Switches as VLT.......................................................................................................................970
Specifying VLT Nodes in a PVLAN................................................................................................................................. 970
Configuring a VLT VLAN or LAG in a PVLAN................................................................................................................973
Creating a VLT LAG or a VLT VLAN.........................................................................................................................973
Associating the VLT LAG or VLT VLAN in a PVLAN.............................................................................................. 974
Proxy ARP Capability on VLT Peer Nodes.....................................................................................................................975
VLT Nodes as Rendezvous Points for Multicast Resiliency........................................................................................ 976
Configuring VLAN-Stack over VLT.................................................................................................................................976
IPv6 Peer Routing in VLT Domains Overview............................................................................................................... 979
Configure BFD in VLT Domain.........................................................................................................................................983
Sample BFD configuration in VLT domain................................................................................................................983
VXLAN on VLT.................................................................................................................................................................. 987
63 VLT Proxy Gateway.................................................................................................................989
Proxy Gateway in VLT Domains......................................................................................................................................989
LLDP VLT Proxy Gateway in a Square VLT Topology........................................................................................... 992
Configuring a Static VLT Proxy Gateway...................................................................................................................... 993
Configuring an LLDP VLT Proxy Gateway.....................................................................................................................993
VLT Proxy Gateway Sample Topology...........................................................................................................................993
VLT Domain Configuration.........................................................................................................................................994
Dell-1 VLT Configuration.............................................................................................................................................994
Dell-2 VLT Configuration............................................................................................................................................995
Dell-3 VLT Configuration............................................................................................................................................996
Dell-4 VLT Configuration............................................................................................................................................997
64 Virtual Extensible LAN (VXLAN)...............................................................................................998
advertise-local-mac.......................................................................................................................................................... 999
Components of VXLAN network.................................................................................................................................... 999
Functional Overview of VXLAN Gateway....................................................................................................................1000
VXLAN Frame Format.................................................................................................................................................... 1000
Limitations on VXLAN .....................................................................................................................................................1001
Configuring and Controlling VXLAN from the NSX Controller GUI.......................................................................... 1002
Configuring and Controling VXLAN from Nuage Controller GUI.............................................................................. 1006
Configuring VxLAN Gateway......................................................................................................................................... 1007
Connecting to an NVP Controller............................................................................................................................1007
Advertising VXLAN Access Ports to Controller.....................................................................................................1008
Displaying VXLAN Configurations................................................................................................................................. 1008
VXLAN Service nodes for BFD......................................................................................................................................1009
Static Virtual Extensible LAN (VXLAN).........................................................................................................................1010
Configuring Static VXLAN.........................................................................................................................................1010
Displaying Static VXLAN Configurations..................................................................................................................1011
Contents
29
Disabling MAC Address Learning on Static VXLAN Tunnels.................................................................................1011
Preserving 802.1 p value across VXLAN tunnels..........................................................................................................1012
VXLAN Scenario............................................................................................................................................................... 1012
Routing in and out of VXLAN tunnels............................................................................................................................1013
Configuring VXLAN RIOT.......................................................................................................................................... 1014
VLT Scenario...............................................................................................................................................................1015
NSX Controller-based VXLAN for VLT......................................................................................................................... 1016
Important Points to Remember................................................................................................................................ 1016
Configure NSX Controller-based VxLAN in VLT Setup.........................................................................................1017
Configuring BFD and UFD for VXLAN..................................................................................................................... 1017
Configuring NSX-based VxLAN on VLT Peer Devices.......................................................................................... 1017
Configuring VLT for NSX-based VxLAN................................................................................................................. 1018
Configuring and Controlling VXLAN from the NSX Controller GUI.....................................................................1022
65 Virtual Routing and Forwarding (VRF).....................................................................................1027
VRF Overview.................................................................................................................................................................. 1027
VRF Configuration Notes............................................................................................................................................... 1028
DHCP...........................................................................................................................................................................1029
VRF Configuration...........................................................................................................................................................1029
Loading VRF CAM..................................................................................................................................................... 1029
Creating a Non-Default VRF Instance.................................................................................................................... 1029
Assigning an Interface to a VRF.............................................................................................................................. 1030
Assigning a Front-end Port to a Management VRF..............................................................................................1030
View VRF Instance Information............................................................................................................................... 1030
Assigning an OSPF Process to a VRF Instance.....................................................................................................1030
Configuring VRRP on a VRF Instance......................................................................................................................1031
Configuring Management VRF................................................................................................................................. 1031
Configuring a Static Route....................................................................................................................................... 1032
Sample VRF Configuration............................................................................................................................................. 1032
Route Leaking VRFs........................................................................................................................................................1038
Dynamic Route Leaking.................................................................................................................................................. 1038
Configuring Route Leaking without Filtering Criteria............................................................................................1039
Configuring Route Leaking with Filtering................................................................................................................ 1041
30
66 Virtual Router Redundancy Protocol (VRRP)........................................................................... 1044
VRRP Overview............................................................................................................................................................... 1044
VRRP Benefits................................................................................................................................................................. 1045
VRRP Implementation.....................................................................................................................................................1045
VRRP Configuration........................................................................................................................................................ 1046
Configuration Task List............................................................................................................................................. 1046
Setting VRRP Initialization Delay............................................................................................................................. 1054
Sample Configurations....................................................................................................................................................1054
VRRP in a VRF Configuration.................................................................................................................................. 1058
VRRP for IPv6 Configuration................................................................................................................................... 1063
Proxy Gateway with VRRP............................................................................................................................................ 1066
67 Debugging and Diagnostics..................................................................................................... 1071
Offline Diagnostics............................................................................................................................................................1071
Important Points to Remember................................................................................................................................ 1071
Contents
Loading...
+ 1078 hidden pages