Dell PowerSwitch S4048T-ON Manual

0 (0)
Dell PowerSwitch S4048T-ON Manual

Dell EMC Configuration Guide for the S4048T–ON System

9.14.2.8

September 2020

Rev. A00

Notes, cautions, and warnings

NOTE: A NOTE indicates important information that helps you make better use of your product.

CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.

WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

© 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.

Contents

Chapter 1: About this Guide.........................................................................................................

33

Audience..............................................................................................................................................................................

33

Conventions........................................................................................................................................................................

33

Related Documents...........................................................................................................................................................

33

Chapter 2: Configuration Fundamentals......................................................................................

34

Accessing the Command Line........................................................................................................................................

34

CLI Modes...........................................................................................................................................................................

34

Navigating CLI Modes................................................................................................................................................

36

The do Command..............................................................................................................................................................

39

Undoing Commands..........................................................................................................................................................

39

Obtaining Help....................................................................................................................................................................

40

Entering and Editing Commands...................................................................................................................................

40

Command History...............................................................................................................................................................

41

Filtering show Command Outputs.................................................................................................................................

41

Multiple Users in Configuration Mode..........................................................................................................................

42

Chapter 3: Getting Started..........................................................................................................

43

Console Access..................................................................................................................................................................

43

Serial Console...............................................................................................................................................................

43

Accessing the CLI Interface and Running Scripts Using SSH................................................................................

44

Default Configuration.......................................................................................................................................................

45

Configuring a Host Name................................................................................................................................................

45

Accessing the System Remotely...................................................................................................................................

45

Configure the Management Port IP Address.......................................................................................................

46

Configure a Management Route..............................................................................................................................

46

Configuring a Username and Password.................................................................................................................

46

Configuring the Enable Password.................................................................................................................................

47

Configuration File Management.....................................................................................................................................

48

Copy Files to and from the System.........................................................................................................................

48

Mounting an NFS File System..................................................................................................................................

48

Save the Running-Configuration.............................................................................................................................

50

Configure the Overload Bit for a Startup Scenario............................................................................................

50

Viewing Files.................................................................................................................................................................

50

Compressing Configuration Files..............................................................................................................................

51

Managing the File System...............................................................................................................................................

53

Enabling Software Features on Devices Using a Command Option.....................................................................

54

View Command History...................................................................................................................................................

54

Upgrading Dell EMC Networking OS............................................................................................................................

56

Verify Software Images Before Installation................................................................................................................

56

Using HTTP for File Transfers........................................................................................................................................

57

Chapter 4: Management..............................................................................................................

58

Configuring Privilege Levels...........................................................................................................................................

58

Contents 3

Removing a Command from EXEC Mode..............................................................................................................

59

Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................

59

Allowing Access to CONFIGURATION Mode Commands.................................................................................

59

Allowing Access to Different Modes......................................................................................................................

59

Applying a Privilege Level to a Username..............................................................................................................

61

Applying a Privilege Level to a Terminal Line........................................................................................................

61

Configuring Logging..........................................................................................................................................................

61

Audit and Security Logs..............................................................................................................................................

61

Configuring Logging Format .............................................................................................................................

63

Display the Logging Buffer and the Logging Configuration..............................................................................

63

Setting Up a Secure Connection to a Syslog Server.................................................................................

64

Sending System Messages to a Syslog Server....................................................................................................

65

Track Login Activity..........................................................................................................................................................

65

Restrictions for Tracking Login Activity................................................................................................................

65

Configuring Login Activity Tracking........................................................................................................................

66

Display Login Statistics..............................................................................................................................................

66

Limit Concurrent Login Sessions...................................................................................................................................

67

Restrictions for Limiting the Number of Concurrent Sessions........................................................................

68

Configuring Concurrent Session Limit....................................................................................................................

68

Enabling the System to Clear Existing Sessions..................................................................................................

68

Enabling Secured CLI Mode............................................................................................................................................

69

Log Messages in the Internal Buffer............................................................................................................................

69

Disabling System Logging...............................................................................................................................................

69

Sending System Messages to a Syslog Server..........................................................................................................

70

Configuring a UNIX System as a Syslog Server...................................................................................................

70

Changing System Logging Settings..............................................................................................................................

70

Display the Logging Buffer and the Logging Configuration.....................................................................................

71

Configuring a UNIX Logging Facility Level..................................................................................................................

72

Synchronizing Log Messages.........................................................................................................................................

72

Enabling Timestamp on Syslog Messages...................................................................................................................

73

File Transfer Services.......................................................................................................................................................

76

Enabling the FTP Server............................................................................................................................................

76

Configuring FTP Server Parameters.......................................................................................................................

76

Configuring FTP Client Parameters.........................................................................................................................

77

Terminal Lines.....................................................................................................................................................................

77

Denying and Permitting Access to a Terminal Line.............................................................................................

77

Configuring Login Authentication for Terminal Lines..........................................................................................

78

Setting Timeout for EXEC Privilege Mode..................................................................................................................

79

Using Telnet to get to Another Network Device.......................................................................................................

80

Lock CONFIGURATION Mode.......................................................................................................................................

80

LPC Bus Quality Degradation..........................................................................................................................................

81

Restoring the Factory Default Settings........................................................................................................................

81

Restoring Factory Default Environment Variables..............................................................................................

82

Viewing the Reason for Last System Reboot.............................................................................................................

83

Chapter 5: 802.1X........................................................................................................................

84

Port-Authentication Process..........................................................................................................................................

85

EAP over RADIUS........................................................................................................................................................

86

Configuring 802.1X............................................................................................................................................................

87

Important Points to Remember......................................................................................................................................

87

4 Contents

Enabling 802.1X..................................................................................................................................................................

88

Configuring Request Identity Re-Transmissions........................................................................................................

89

Configuring a Quiet Period after a Failed Authentication..................................................................................

90

Forcibly Authorizing or Unauthorizing a Port.............................................................................................................

90

Re-Authenticating a Port.................................................................................................................................................

91

Configuring Timeouts.......................................................................................................................................................

92

Configuring Dynamic VLAN Assignment with Port Authentication......................................................................

93

Guest and Authentication-Fail VLANs..........................................................................................................................

94

Configuring a Guest VLAN........................................................................................................................................

94

Configuring an Authentication-Fail VLAN.............................................................................................................

94

Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)....

96

Optimizing CAM Utilization During the Attachment of ACLs to VLANs.............................................................

96

Guidelines for Configuring ACL VLAN Groups...........................................................................................................

97

Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters..........................................

97

Configuring ACL VLAN Groups................................................................................................................................

97

Configuring FP Blocks for VLAN Parameters.......................................................................................................

98

Viewing CAM Usage.........................................................................................................................................................

99

Allocating FP Blocks for VLAN Processes.................................................................................................................

100

Unified Forwarding Table (UFT) Modes....................................................................................................................

100

Configuring UFT Modes............................................................................................................................................

101

Chapter 7: Access Control Lists (ACLs).....................................................................................

102

IP Access Control Lists (ACLs)....................................................................................................................................

103

CAM Usage.................................................................................................................................................................

103

Implementing ACLs on Dell EMC Networking OS..............................................................................................

104

Important Points to Remember....................................................................................................................................

105

Configuration Task List for Route Maps..............................................................................................................

106

Configuring Match Routes......................................................................................................................................

108

Configuring Set Conditions.....................................................................................................................................

109

Configure a Route Map for Route Redistribution..............................................................................................

109

Configure a Route Map for Route Tagging..........................................................................................................

110

Continue Clause..........................................................................................................................................................

110

IP Fragment Handling.......................................................................................................................................................

111

IP Fragments ACL Examples.....................................................................................................................................

111

Layer 4 ACL Rules Examples....................................................................................................................................

111

Configure a Standard IP ACL........................................................................................................................................

112

Configuring a Standard IP ACL Filter.....................................................................................................................

113

Configure an Extended IP ACL......................................................................................................................................

114

Configuring Filters with a Sequence Number......................................................................................................

114

Configuring Filters Without a Sequence Number...............................................................................................

115

Configure Layer 2 and Layer 3 ACLs...........................................................................................................................

115

Assign an IP ACL to an Interface..................................................................................................................................

116

Applying an IP ACL...........................................................................................................................................................

116

Counting ACL Hits......................................................................................................................................................

117

Configure Ingress ACLs...................................................................................................................................................

117

Configure Egress ACLs...................................................................................................................................................

118

Applying Egress Layer 3 ACLs (Control-Plane)..................................................................................................

118

IP Prefix Lists....................................................................................................................................................................

119

Contents 5

Configuration Task List for Prefix Lists................................................................................................................

119

ACL Remarks....................................................................................................................................................................

122

Configuring a Remark...............................................................................................................................................

123

Deleting a Remark......................................................................................................................................................

123

ACL Resequencing...........................................................................................................................................................

124

Resequencing an ACL or Prefix List......................................................................................................................

124

Route Maps.......................................................................................................................................................................

125

Logging of ACL Processes............................................................................................................................................

126

Guidelines for Configuring ACL Logging..............................................................................................................

126

Configuring ACL Logging.........................................................................................................................................

127

Flow-Based Monitoring..................................................................................................................................................

127

Enabling Flow-Based Monitoring...........................................................................................................................

129

Configuring UDF ACL.....................................................................................................................................................

130

Configuring IP Mirror Access Group...........................................................................................................................

132

Sample Configuration................................................................................................................................................

133

Example of viewing IP mirror–access–group applied to an Interface..........................................................

133

Chapter 8: Bidirectional Forwarding Detection (BFD)................................................................

134

How BFD Works...............................................................................................................................................................

134

BFD Packet Format...................................................................................................................................................

135

BFD Sessions..............................................................................................................................................................

136

BFD Three-Way Handshake....................................................................................................................................

137

Session State Changes.............................................................................................................................................

138

Important Points to Remember....................................................................................................................................

138

Configure BFD..................................................................................................................................................................

138

Configure BFD for Physical Ports..........................................................................................................................

139

Configure BFD for Static Routes...........................................................................................................................

140

Configure BFD for IPv6 Static Routes.................................................................................................................

144

Configure BFD for OSPF..........................................................................................................................................

146

Configure BFD for OSPFv3......................................................................................................................................

151

Configure BFD for IS-IS...........................................................................................................................................

154

Configure BFD for BGP............................................................................................................................................

156

Configure BFD for VRRP.........................................................................................................................................

162

Configuring Protocol Liveness................................................................................................................................

165

Chapter 9: Border Gateway Protocol (BGP)...............................................................................

166

BGP IP version 4 (BGPv4) Overview.........................................................................................................................

166

BGP Autonomous Systems......................................................................................................................................

166

AS4 Number Representation..................................................................................................................................

168

Four-Byte AS Numbers............................................................................................................................................

170

BGP router ID..............................................................................................................................................................

170

Sessions and Peers....................................................................................................................................................

170

Establish a Session....................................................................................................................................................

170

BGP Attributes for selecting Best Path................................................................................................................

171

Multiprotocol BGP.....................................................................................................................................................

176

BGP global and address family configuration......................................................................................................

177

Implement BGP with Dell EMC Networking OS.................................................................................................

178

Configuration Information.........................................................................................................................................

181

Basic BGP configuration tasks.....................................................................................................................................

182

6 Contents

Prerequisite for configuring a BGP network.......................................................................................................

182

Restrictions.................................................................................................................................................................

182

Enabling BGP..............................................................................................................................................................

182

Enabling four-byte autonomous system numbers.............................................................................................

184

Changing a BGP router ID.......................................................................................................................................

185

Configuring AS4 Number Representations..........................................................................................................

185

Configuring a BGP peer............................................................................................................................................

186

Example-Configuring BGP routing between peers............................................................................................

187

BGP peer group..........................................................................................................................................................

188

Advanced BGP configuration tasks.............................................................................................................................

195

Route-refresh and Soft-reconfiguration..............................................................................................................

195

Aggregating Routes...................................................................................................................................................

197

Filtering BGP...............................................................................................................................................................

199

Configuring BGP Fast Fall-Over............................................................................................................................

204

Configuring Passive Peering...................................................................................................................................

206

Enabling Graceful Restart.......................................................................................................................................

207

Redistributing Routes...............................................................................................................................................

208

Redistributing iBGP Routes into IGP....................................................................................................................

208

Enabling Additional Paths.........................................................................................................................................

211

Configuring IP Community Lists..............................................................................................................................

211

Configuring an IP Extended Community List......................................................................................................

212

Configure BGP attributes........................................................................................................................................

213

Enabling Multipath.....................................................................................................................................................

217

Route Reflectors........................................................................................................................................................

217

Enabling Route Flap Dampening.............................................................................................................................

219

Changing BGP keepalive and hold timers............................................................................................................

221

Setting the extended timer.....................................................................................................................................

221

Enabling or disabling BGP neighbors....................................................................................................................

222

Route Map Continue................................................................................................................................................

223

Configuring BGP Confederations..........................................................................................................................

224

Configuring a BGP VRF address family...............................................................................................................

224

Maintaining Existing AS Numbers During an AS Migration.............................................................................

225

Allowing an AS Number to Appear in its Own AS Path...................................................................................

226

Enabling MBGP Configurations..............................................................................................................................

227

MBGP support for IPv6...........................................................................................................................................

227

Configuring IPv6 MBGP between peers..............................................................................................................

227

Example-Configuring IPv4 and IPv6 neighbors..................................................................................................

228

Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor..................................

230

BGP Regular Expression Optimization.................................................................................................................

232

Debugging BGP..........................................................................................................................................................

232

Chapter 10: Content Addressable Memory (CAM)......................................................................

234

CAM Allocation................................................................................................................................................................

234

Test CAM Usage.............................................................................................................................................................

236

View CAM-ACL Settings...............................................................................................................................................

236

View CAM Usage............................................................................................................................................................

238

Configuring CAM Threshold and Silence Period.....................................................................................................

238

CAM Optimization...........................................................................................................................................................

240

Troubleshoot CAM Profiling.........................................................................................................................................

240

QoS CAM Region Limitation...................................................................................................................................

240

Contents 7

Chapter 11: Control Plane Policing (CoPP).................................................................................

241

Configure Control Plane Policing................................................................................................................................

242

Configuring CoPP for Protocols............................................................................................................................

243

Configuring CoPP for CPU Queues......................................................................................................................

244

CoPP for OSPFv3 Packets.....................................................................................................................................

245

Configuring CoPP for OSPFv3..............................................................................................................................

248

Displaying CoPP Configuration .............................................................................................................................

249

Chapter 12: Data Center Bridging (DCB)....................................................................................

251

Ethernet Enhancements in Data Center Bridging....................................................................................................

251

Priority-Based Flow Control...................................................................................................................................

252

Enhanced Transmission Selection.........................................................................................................................

253

Data Center Bridging Exchange Protocol (DCBx)............................................................................................

254

Data Center Bridging in a Traffic Flow................................................................................................................

254

Enabling Data Center Bridging....................................................................................................................................

255

DCB Maps and its Attributes.................................................................................................................................

255

Data Center Bridging: Default Configuration...........................................................................................................

256

Configuring Priority-Based Flow Control..................................................................................................................

256

Configuring Lossless Queues..................................................................................................................................

257

Configuring PFC in a DCB Map...................................................................................................................................

258

Applying a DCB Map on a Port....................................................................................................................................

259

Configuring PFC without a DCB Map........................................................................................................................

260

Priority-Based Flow Control Using Dynamic Buffer Method................................................................................

261

Behavior of Tagged Packets........................................................................................................................................

262

Configuration Example for DSCP and PFC Priorities.............................................................................................

263

Using PFC to Manage Converged Ethernet Traffic...............................................................................................

264

Configure Enhanced Transmission Selection...........................................................................................................

264

ETS Prerequisites and Restrictions......................................................................................................................

264

Creating an ETS Priority Group.............................................................................................................................

265

ETS Operation with DCBx......................................................................................................................................

265

Configuring Bandwidth Allocation for DCBx CIN..............................................................................................

266

Configuring ETS in a DCB Map..............................................................................................................................

267

Hierarchical Scheduling in ETS Output Policies......................................................................................................

268

Using ETS to Manage Converged Ethernet Traffic...............................................................................................

268

Applying DCB Policies in a Switch Stack..................................................................................................................

268

Configure a DCBx Operation........................................................................................................................................

269

DCBx Operation.........................................................................................................................................................

269

DCBx Port Roles........................................................................................................................................................

269

DCB Configuration Exchange..................................................................................................................................

271

Configuration Source Election................................................................................................................................

271

Propagation of DCB Information............................................................................................................................

271

Auto-Detection and Manual Configuration of the DCBx Version..................................................................

272

DCBx Example............................................................................................................................................................

272

DCBx Prerequisites and Restrictions....................................................................................................................

273

Configuring DCBx......................................................................................................................................................

273

Verifying the DCB Configuration.................................................................................................................................

276

QoS dot1p Traffic Classification and Queue Assignment......................................................................................

285

Configuring the Dynamic Buffer Method..................................................................................................................

286

8 Contents

Sample DCB Configuration...........................................................................................................................................

287

Chapter 13: Dynamic Host Configuration Protocol (DHCP)........................................................

289

DHCP Packet Format and Options.............................................................................................................................

289

Assign an IP Address using DHCP...............................................................................................................................

291

Implementation Information..........................................................................................................................................

291

Configure the System to be a DHCP Server............................................................................................................

292

Configuring the Server for Automatic Address Allocation..............................................................................

292

Specifying a Default Gateway................................................................................................................................

293

Configure a Method of Hostname Resolution....................................................................................................

294

Using DNS for Address Resolution.......................................................................................................................

294

Using NetBIOS WINS for Address Resolution....................................................................................................

294

Creating Manual Binding Entries...........................................................................................................................

294

Debugging the DHCP Server.................................................................................................................................

295

Using DHCP Clear Commands...............................................................................................................................

295

Configure the System to be a Relay Agent..............................................................................................................

295

Configure the System to be a DHCP Client.............................................................................................................

297

Configuring the DHCP Client System..................................................................................................................

297

DHCP Client on a Management Interface...........................................................................................................

298

DHCP Client Operation with Other Features.....................................................................................................

299

DHCP Relay When DHCP Server and Client are in Different VRFs...................................................................

300

Configuring Route Leaking between VRFs on DHCP Relay Agent...............................................................

300

Non-default VRF configuration for DHCPv6 helper address................................................................................

301

Configuring DHCP relay source interface..................................................................................................................

301

Global DHCP relay source IPv4 or IPv6 configuration ....................................................................................

301

Interface level DHCP relay source IPv4 or IPv6 configuration .....................................................................

302

Configure the System for User Port Stacking (Option 230)...............................................................................

303

Configure Secure DHCP................................................................................................................................................

303

Option 82 (DHCPv4 relay options).......................................................................................................................

303

DHCPv6 relay agent options..................................................................................................................................

304

DHCP Snooping.........................................................................................................................................................

304

Drop DHCP Packets on Snooped VLANs Only..................................................................................................

309

Dynamic ARP Inspection.........................................................................................................................................

309

Configuring Dynamic ARP Inspection..................................................................................................................

309

Source Address Validation..............................................................................................................................................

311

Enabling IP Source Address Validation..................................................................................................................

311

DHCP MAC Source Address Validation.................................................................................................................

311

Enabling IP+MAC Source Address Validation.....................................................................................................

312

Viewing the Number of SAV Dropped Packets..................................................................................................

312

Clearing the Number of SAV Dropped Packets..................................................................................................

313

Chapter 14: Equal Cost Multi-Path (ECMP)................................................................................

314

ECMP for Flow-Based Affinity.....................................................................................................................................

314

Configuring the Hash Algorithm.............................................................................................................................

314

Enabling Deterministic ECMP Next Hop..............................................................................................................

314

Configuring the Hash Algorithm Seed..................................................................................................................

315

Link Bundle Monitoring...................................................................................................................................................

315

Managing ECMP Group Paths................................................................................................................................

316

Creating an ECMP Group Bundle..........................................................................................................................

316

Contents 9

Modifying the ECMP Group Threshold................................................................................................................

316

RTAG7.................................................................................................................................................................................

317

Flow-based Hashing for ECMP....................................................................................................................................

318

Chapter 15: FIP Snooping...........................................................................................................

321

Fibre Channel over Ethernet.........................................................................................................................................

321

Ensure Robustness in a Converged Ethernet Network..........................................................................................

321

FIP Snooping on Ethernet Bridges..............................................................................................................................

322

FIP Snooping in a Switch Stack...................................................................................................................................

324

Using FIP Snooping.........................................................................................................................................................

324

FIP Snooping Prerequisites.....................................................................................................................................

324

Important Points to Remember.............................................................................................................................

324

Enabling the FCoE Transit Feature.......................................................................................................................

325

Enable FIP Snooping on VLANs.............................................................................................................................

325

Configure the FC-MAP Value................................................................................................................................

326

Configure a Port for a Bridge-to-Bridge Link.....................................................................................................

326

Configure a Port for a Bridge-to-FCF Link.........................................................................................................

326

Impact on Other Software Features....................................................................................................................

326

FIP Snooping Restrictions.......................................................................................................................................

327

Configuring FIP Snooping........................................................................................................................................

327

Displaying FIP Snooping Information..........................................................................................................................

328

FCoE Transit Configuration Example.........................................................................................................................

333

Chapter 16: FIPS Cryptography.................................................................................................

335

Configuration Tasks........................................................................................................................................................

335

Preparing the System....................................................................................................................................................

335

Enabling FIPS Mode.......................................................................................................................................................

336

Generating Host-Keys...................................................................................................................................................

336

Monitoring FIPS Mode Status.....................................................................................................................................

336

Disabling FIPS Mode.......................................................................................................................................................

337

Chapter 17: Force10 Resilient Ring Protocol (FRRP)..................................................................

338

Protocol Overview..........................................................................................................................................................

338

Ring Status.................................................................................................................................................................

339

Multiple FRRP Rings.................................................................................................................................................

339

Important FRRP Points............................................................................................................................................

340

Important FRRP Concepts......................................................................................................................................

341

Implementing FRRP.........................................................................................................................................................

341

FRRP Configuration........................................................................................................................................................

342

Creating the FRRP Group.......................................................................................................................................

342

Configuring the Control VLAN...............................................................................................................................

342

Configuring and Adding the Member VLANs.....................................................................................................

343

Setting the FRRP Timers........................................................................................................................................

344

Clearing the FRRP Counters..................................................................................................................................

344

Viewing the FRRP Configuration...........................................................................................................................

344

Viewing the FRRP Information..............................................................................................................................

345

Troubleshooting FRRP...................................................................................................................................................

345

Sample Configuration and Topology..........................................................................................................................

345

FRRP Support on VLT...................................................................................................................................................

346

10 Contents

Chapter 18: GARP VLAN Registration Protocol (GVRP).............................................................

349

Configure GVRP..............................................................................................................................................................

350

Enabling GVRP Globally.................................................................................................................................................

350

Enabling GVRP on a Layer 2 Interface.......................................................................................................................

351

Configure GVRP Registration.......................................................................................................................................

351

Configure a GARP Timer...............................................................................................................................................

352

RPM Redundancy...........................................................................................................................................................

352

Chapter 19: High Availability (HA).............................................................................................

353

Component Redundancy...............................................................................................................................................

353

Automatic and Manual Stack Unit Failover.........................................................................................................

353

Synchronization between Management and Standby Units...........................................................................

354

Forcing a Stack Unit Failover.................................................................................................................................

354

Specifying an Auto-Failover Limit.........................................................................................................................

354

Disabling Auto-Reboot.............................................................................................................................................

355

Pre-Configuring a Stack Unit Slot..............................................................................................................................

355

Removing a Provisioned Logical Stack Unit.............................................................................................................

355

Hitless Behavior...............................................................................................................................................................

355

Graceful Restart..............................................................................................................................................................

355

Software Resiliency........................................................................................................................................................

356

Software Component Health Monitoring............................................................................................................

356

System Health Monitoring......................................................................................................................................

356

Failure and Event Logging......................................................................................................................................

356

Hot-Lock Behavior..........................................................................................................................................................

357

Chapter 20: Internet Group Management Protocol (IGMP)........................................................

358

IGMP Protocol Overview..............................................................................................................................................

358

IGMP Version 2..........................................................................................................................................................

358

IGMP Version 3..........................................................................................................................................................

360

Configure IGMP...............................................................................................................................................................

362

Viewing IGMP Enabled Interfaces..............................................................................................................................

363

Selecting an IGMP Version...........................................................................................................................................

363

Viewing IGMP Groups....................................................................................................................................................

364

Adjusting Timers..............................................................................................................................................................

364

Adjusting Query and Response Timers................................................................................................................

364

Preventing a Host from Joining a Group..................................................................................................................

365

Enabling IGMP Immediate-Leave................................................................................................................................

367

IGMP Snooping................................................................................................................................................................

368

Configuring IGMP Snooping...................................................................................................................................

368

Removing a Group-Port Association....................................................................................................................

368

Disabling Multicast Flooding...................................................................................................................................

369

Specifying a Port as Connected to a Multicast Router...................................................................................

369

Configuring the Switch as Querier........................................................................................................................

369

Fast Convergence after MSTP Topology Changes................................................................................................

370

Egress Interface Selection (EIS) for HTTP and IGMP Applications...................................................................

370

Designating a Multicast Router Interface..................................................................................................................

377

Chapter 21: Interfaces...............................................................................................................

378

Contents 11

Interface Types................................................................................................................................................................

379

View Basic Interface Information................................................................................................................................

379

Resetting an Interface to its Factory Default State................................................................................................

381

Enabling a Physical Interface........................................................................................................................................

381

Physical Interfaces..........................................................................................................................................................

382

Configuration Task List for Physical Interfaces.................................................................................................

382

Overview of Layer Modes.......................................................................................................................................

382

Configuring Layer 2 (Data Link) Mode................................................................................................................

383

Configuring Layer 2 (Interface) Mode.................................................................................................................

383

Configuring Layer 3 (Network) Mode..................................................................................................................

383

Configuring Layer 3 (Interface) Mode.................................................................................................................

384

Automatic recovery of an Err-disabled interface....................................................................................................

384

Configuring an automatic recovery for an Err-disabled interface.................................................................

385

Egress Interface Selection (EIS).................................................................................................................................

385

Configuring EIS..........................................................................................................................................................

386

Management Interfaces................................................................................................................................................

386

Configuring Management Interfaces....................................................................................................................

386

Configuring a Management Interface on an Ethernet Port............................................................................

387

VLAN Interfaces..............................................................................................................................................................

388

Loopback Interfaces.......................................................................................................................................................

389

Null Interfaces..................................................................................................................................................................

389

Configuring Port Delay..................................................................................................................................................

389

Port Channel Interfaces................................................................................................................................................

390

Port Channel Definition and Standards...............................................................................................................

390

Port Channel Benefits..............................................................................................................................................

390

Port Channel Implementation.................................................................................................................................

390

Interfaces in Port Channels.....................................................................................................................................

391

Configuration Tasks for Port Channel Interfaces..............................................................................................

391

Creating a Port Channel...........................................................................................................................................

391

Adding a Physical Interface to a Port Channel..................................................................................................

392

Reassigning an Interface to a New Port Channel.............................................................................................

393

Configuring the Minimum Oper Up Links in a Port Channel...........................................................................

394

Adding or Removing a Port Channel from a VLAN...........................................................................................

394

Assigning an IP Address to a Port Channel........................................................................................................

395

Deleting or Disabling a Port Channel....................................................................................................................

395

Load Balancing Through Port Channels..............................................................................................................

396

Changing the Hash Algorithm................................................................................................................................

396

Bulk Configuration..........................................................................................................................................................

396

Interface Range.........................................................................................................................................................

396

Bulk Configuration Examples..................................................................................................................................

397

Defining Interface Range Macros...............................................................................................................................

398

Define the Interface Range....................................................................................................................................

399

Choosing an Interface-Range Macro...................................................................................................................

399

Monitoring and Maintaining Interfaces......................................................................................................................

399

Maintenance Using TDR..........................................................................................................................................

400

Non Dell-Qualified Transceivers..................................................................................................................................

400

Splitting 40G Ports without Reload............................................................................................................................

401

Splitting QSFP Ports to SFP+ Ports..........................................................................................................................

402

Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..............................................................................

403

Link Dampening...............................................................................................................................................................

405

12 Contents

Enabling Link Dampening........................................................................................................................................

408

Link Bundle Monitoring..................................................................................................................................................

409

Using Ethernet Pause Frames for Flow Control......................................................................................................

409

Enabling Pause Frames.............................................................................................................................................

410

Configure the MTU Size on an Interface....................................................................................................................

411

Port-Pipes..........................................................................................................................................................................

412

Auto-Negotiation on Ethernet Interfaces..................................................................................................................

412

Setting the Speed of Ethernet Interfaces...........................................................................................................

412

Set Auto-Negotiation Options................................................................................................................................

413

View Advanced Interface Information........................................................................................................................

414

Configuring the Interface Sampling Size..............................................................................................................

415

Configuring the Traffic Sampling Size Globally........................................................................................................

416

Dynamic Counters............................................................................................................................................................

417

Clearing Interface Counters....................................................................................................................................

417

Discard Counters.............................................................................................................................................................

418

Display discard counters..........................................................................................................................................

418

Chapter 22: Internet Protocol Security (IPSec).........................................................................

420

Configuring IPSec ..........................................................................................................................................................

420

Chapter 23: IPv4 Routing..........................................................................................................

422

IP Addresses.....................................................................................................................................................................

423

Configuration Tasks for IP Addresses........................................................................................................................

423

Assigning IP Addresses to an Interface.....................................................................................................................

423

Configuring Static Routes.............................................................................................................................................

424

Adding description for IPv4 and IPv6 static routes..........................................................................................

425

Configure Static Routes for the Management Interface......................................................................................

426

IPv4 Path MTU Discovery Overview..........................................................................................................................

426

Using the Configured Source IP Address in ICMP Messages..............................................................................

427

Configuring the Duration to Establish a TCP Connection.....................................................................................

427

Enabling Directed Broadcast........................................................................................................................................

428

Resolution of Host Names............................................................................................................................................

428

Enabling Dynamic Resolution of Host Names..........................................................................................................

428

Specifying the Local System Domain and a List of Domains................................................................................

429

Configuring DNS with Traceroute..............................................................................................................................

429

ARP.....................................................................................................................................................................................

430

Configuration Tasks for ARP........................................................................................................................................

430

Configuring Static ARP Entries...................................................................................................................................

430

Enabling Proxy ARP.........................................................................................................................................................

431

Clearing ARP Cache........................................................................................................................................................

431

ARP Learning via Gratuitous ARP................................................................................................................................

431

Enabling ARP Learning via Gratuitous ARP...............................................................................................................

431

ARP Learning via ARP Request...................................................................................................................................

432

Configuring ARP Retries...............................................................................................................................................

432

ICMP..................................................................................................................................................................................

433

Configuration Tasks for ICMP.....................................................................................................................................

433

Enabling ICMP Unreachable Messages.....................................................................................................................

433

ICMP Redirects...............................................................................................................................................................

433

UDP Helper.......................................................................................................................................................................

434

Contents 13

Enabling UDP Helper......................................................................................................................................................

435

Configuring a Broadcast Address...............................................................................................................................

435

Configurations Using UDP Helper...............................................................................................................................

436

UDP Helper with Broadcast-All Addresses...............................................................................................................

436

UDP Helper with Subnet Broadcast Addresses.......................................................................................................

437

UDP Helper with Configured Broadcast Addresses...............................................................................................

437

UDP Helper with No Configured Broadcast Addresses.........................................................................................

438

Troubleshooting UDP Helper........................................................................................................................................

438

Chapter 24: IPv6 Routing..........................................................................................................

439

Protocol Overview..........................................................................................................................................................

439

Extended Address Space........................................................................................................................................

439

Stateless Autoconfiguration...................................................................................................................................

439

IPv6 Headers..............................................................................................................................................................

440

IPv6 Header Fields.....................................................................................................................................................

441

Extension Header Fields..........................................................................................................................................

442

Addressing..................................................................................................................................................................

443

Implementing IPv6 with Dell EMC Networking OS.................................................................................................

444

ICMPv6..............................................................................................................................................................................

446

Path MTU discovery.......................................................................................................................................................

446

IPv6 Neighbor Discovery...............................................................................................................................................

446

IPv6 Neighbor Discovery of MTU Packets.........................................................................................................

447

Configuration Task List for IPv6 RDNSS..................................................................................................................

447

Configuring the IPv6 Recursive DNS Server......................................................................................................

447

Debugging IPv6 RDNSS Information Sent to the Host ..................................................................................

448

Displaying IPv6 RDNSS Information.....................................................................................................................

449

Secure Shell (SSH) Over an IPv6 Transport............................................................................................................

449

Configuration Tasks for IPv6.......................................................................................................................................

450

Adjusting Your CAM-Profile...................................................................................................................................

450

Assigning an IPv6 Address to an Interface.........................................................................................................

450

Assigning a Static IPv6 Route................................................................................................................................

451

Configuring Telnet with IPv6..................................................................................................................................

451

SNMP over IPv6........................................................................................................................................................

452

Displaying IPv6 Information....................................................................................................................................

452

Displaying an IPv6 Interface Information............................................................................................................

452

Showing IPv6 Routes...............................................................................................................................................

453

Showing the Running-Configuration for an Interface......................................................................................

454

Clearing IPv6 Routes................................................................................................................................................

455

Disabling ND Entry Timeout...................................................................................................................................

455

Configuring IPv6 RA Guard..........................................................................................................................................

455

Configuring IPv6 RA Guard on an Interface.......................................................................................................

457

Monitoring IPv6 RA Guard......................................................................................................................................

457

Chapter 25: iSCSI Optimization.................................................................................................

458

iSCSI Optimization Overview.......................................................................................................................................

458

Monitoring iSCSI Traffic Flows..............................................................................................................................

459

Application of Quality of Service to iSCSI Traffic Flows.................................................................................

460

Information Monitored in iSCSI Traffic Flows....................................................................................................

460

Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................

461

14 Contents

Configuring Detection and Ports for Dell Compellent Arrays.........................................................................

461

Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer...........................................................

461

Enable and Disable iSCSI Optimization................................................................................................................

462

Default iSCSI Optimization Values..............................................................................................................................

462

iSCSI Optimization Prerequisites................................................................................................................................

463

Configuring iSCSI Optimization...................................................................................................................................

463

Displaying iSCSI Optimization Information...............................................................................................................

465

Chapter 26: Intermediate System to Intermediate System.........................................................

467

IS-IS Protocol Overview................................................................................................................................................

467

IS-IS Addressing..............................................................................................................................................................

467

Multi-Topology IS-IS......................................................................................................................................................

468

Transition Mode.........................................................................................................................................................

468

Interface Support......................................................................................................................................................

468

Adjacencies.................................................................................................................................................................

468

Graceful Restart..............................................................................................................................................................

469

Timers..........................................................................................................................................................................

469

Implementation Information.........................................................................................................................................

469

Configuration Information.............................................................................................................................................

470

Configuration Tasks for IS-IS.................................................................................................................................

470

Configuring the Distance of a Route....................................................................................................................

477

Changing the IS-Type...............................................................................................................................................

477

Redistributing IPv4 Routes.....................................................................................................................................

480

Redistributing IPv6 Routes.....................................................................................................................................

480

Configuring Authentication Passwords................................................................................................................

481

Setting the Overload Bit..........................................................................................................................................

481

Debugging IS-IS.........................................................................................................................................................

482

IS-IS Metric Styles..........................................................................................................................................................

483

Configure Metric Values................................................................................................................................................

483

Maximum Values in the Routing Table.................................................................................................................

483

Change the IS-IS Metric Style in One Level Only.............................................................................................

483

Leaks from One Level to Another.........................................................................................................................

485

Sample Configurations...................................................................................................................................................

485

Chapter 27: Link Aggregation Control Protocol (LACP).............................................................

488

Introduction to Dynamic LAGs and LACP.................................................................................................................

488

Important Points to Remember.............................................................................................................................

488

LACP Modes...............................................................................................................................................................

489

Configuring LACP Commands................................................................................................................................

489

LACP Configuration Tasks............................................................................................................................................

489

Creating a LAG..........................................................................................................................................................

490

Configuring the LAG Interfaces as Dynamic......................................................................................................

490

Setting the LACP Long Timeout............................................................................................................................

491

Monitoring and Debugging LACP...........................................................................................................................

491

Shared LAG State Tracking...........................................................................................................................................

491

Configuring Shared LAG State Tracking.............................................................................................................

492

Important Points about Shared LAG State Tracking........................................................................................

493

LACP Basic Configuration Example............................................................................................................................

494

Configure a LAG on ALPHA....................................................................................................................................

494

Contents 15

Chapter 28: Layer 2...................................................................................................................

502

Manage the MAC Address Table................................................................................................................................

502

Clearing the MAC Address Table..........................................................................................................................

502

Setting the Aging Time for Dynamic Entries......................................................................................................

502

Configuring a Static MAC Address.......................................................................................................................

503

Displaying the MAC Address Table.......................................................................................................................

503

MAC Learning Limit........................................................................................................................................................

503

Setting the MAC Learning Limit............................................................................................................................

504

mac learning-limit Dynamic.....................................................................................................................................

504

mac learning-limit mac-address-sticky................................................................................................................

504

mac learning-limit station-move............................................................................................................................

504

mac learning-limit no-station-move.....................................................................................................................

505

Learning Limit Violation Actions............................................................................................................................

505

Setting Station Move Violation Actions..............................................................................................................

505

Recovering from Learning Limit and Station Move Violations.......................................................................

506

Enabling port security..............................................................................................................................................

506

NIC Teaming....................................................................................................................................................................

506

Configure Redundant Pairs...........................................................................................................................................

507

Far-End Failure Detection.............................................................................................................................................

510

FEFD State Changes.................................................................................................................................................

511

Configuring FEFD.......................................................................................................................................................

511

Enabling FEFD on an Interface...............................................................................................................................

512

Debugging FEFD........................................................................................................................................................

513

Chapter 29: Link Layer Discovery Protocol (LLDP).....................................................................

515

802.1AB (LLDP) Overview............................................................................................................................................

515

Protocol Data Units...................................................................................................................................................

515

Optional TLVs...................................................................................................................................................................

517

Management TLVs.....................................................................................................................................................

517

TIA-1057 (LLDP-MED) Overview................................................................................................................................

518

TIA Organizationally Specific TLVs........................................................................................................................

519

Configure LLDP...............................................................................................................................................................

522

CONFIGURATION versus INTERFACE Configurations.........................................................................................

523

Enabling LLDP..................................................................................................................................................................

523

Disabling and Undoing LLDP..................................................................................................................................

523

Enabling LLDP on Management Ports.......................................................................................................................

524

Disabling and Undoing LLDP on Management Ports........................................................................................

524

Advertising TLVs.............................................................................................................................................................

524

Storing and Viewing Unrecognized LLDP TLVs......................................................................................................

525

Viewing the LLDP Configuration.................................................................................................................................

526

Viewing Information Advertised by Adjacent LLDP Neighbors............................................................................

527

Examples of Viewing Information Advertised by Neighbors...........................................................................

527

Configuring LLDPDU Intervals.....................................................................................................................................

529

Configuring LLDP Notification Interval......................................................................................................................

530

Configuring LLDP Notification Interval......................................................................................................................

530

Configuring Transmit and Receive Mode..................................................................................................................

530

Configuring the Time to Live Value.............................................................................................................................

531

Debugging LLDP..............................................................................................................................................................

532

16 Contents

Relevant Management Objects...................................................................................................................................

533

Chapter 30: Microsoft Network Load Balancing.........................................................................

538

Configuring a Switch for NLB ....................................................................................................................................

539

Enabling a Switch for Multicast NLB...................................................................................................................

540

Chapter 31: Multicast Source Discovery Protocol (MSDP).........................................................

541

Anycast RP.......................................................................................................................................................................

542

Implementation Information.........................................................................................................................................

543

Configure Multicast Source Discovery Protocol.....................................................................................................

543

Related Configuration Tasks..................................................................................................................................

543

Enable MSDP...................................................................................................................................................................

547

Manage the Source-Active Cache..............................................................................................................................

548

Viewing the Source-Active Cache........................................................................................................................

548

Limiting the Source-Active Cache........................................................................................................................

548

Clearing the Source-Active Cache.......................................................................................................................

549

Enabling the Rejected Source-Active Cache.....................................................................................................

549

Accept Source-Active Messages that Fail the RFP Check..................................................................................

549

Specifying Source-Active Messages..........................................................................................................................

552

Limiting the Source-Active Messages from a Peer................................................................................................

553

Preventing MSDP from Caching a Local Source....................................................................................................

553

Preventing MSDP from Caching a Remote Source...............................................................................................

554

Preventing MSDP from Advertising a Local Source..............................................................................................

554

Logging Changes in Peership States.........................................................................................................................

555

Terminating a Peership..................................................................................................................................................

555

Clearing Peer Statistics.................................................................................................................................................

555

Debugging MSDP............................................................................................................................................................

556

MSDP with Anycast RP................................................................................................................................................

556

Configuring Anycast RP................................................................................................................................................

557

Reducing Source-Active Message Flooding.......................................................................................................

558

Specifying the RP Address Used in SA Messages............................................................................................

558

MSDP Sample Configurations.....................................................................................................................................

560

Chapter 32: Multicast Listener Discovery Protocol....................................................................

563

MLD timers.......................................................................................................................................................................

566

Reducing Host Response Burstiness...................................................................................................................

566

Configuring MLD Version..............................................................................................................................................

567

Clearing MLD groups......................................................................................................................................................

567

Debugging MLD...............................................................................................................................................................

567

Explicit Tracking..............................................................................................................................................................

567

Reducing Leave Latency...............................................................................................................................................

567

Displaying MLD groups table........................................................................................................................................

568

Displaying MLD Interfaces............................................................................................................................................

568

Chapter 33: Multiple Spanning Tree Protocol (MSTP)...............................................................

569

Spanning Tree Variations..............................................................................................................................................

570

Implementation Information....................................................................................................................................

570

Configure Multiple Spanning Tree Protocol.............................................................................................................

570

Related Configuration Tasks..................................................................................................................................

570

Contents 17

Enable Multiple Spanning Tree Globally.....................................................................................................................

571

Adding and Removing Interfaces.................................................................................................................................

571

Creating Multiple Spanning Tree Instances...............................................................................................................

571

Influencing MSTP Root Selection...............................................................................................................................

572

Interoperate with Non-Dell Bridges............................................................................................................................

573

Changing the Region Name or Revision....................................................................................................................

573

Modifying Global Parameters.......................................................................................................................................

573

Modifying the Interface Parameters..........................................................................................................................

574

Setting STP path cost as constant............................................................................................................................

575

Configuring an EdgePort...............................................................................................................................................

576

Flush MAC Addresses after a Topology Change.....................................................................................................

576

MSTP Sample Configurations......................................................................................................................................

577

Debugging and Verifying MSTP Configurations......................................................................................................

580

Chapter 34: Multicast Features.................................................................................................

582

Enabling IP Multicast......................................................................................................................................................

582

Implementation Information.........................................................................................................................................

582

Multicast Policies............................................................................................................................................................

583

IPv4 Multicast Policies.............................................................................................................................................

583

Understanding Multicast Traceroute (mtrace).......................................................................................................

589

Printing Multicast Traceroute (mtrace) Paths........................................................................................................

590

Supported Error Codes..................................................................................................................................................

591

mtrace Scenarios............................................................................................................................................................

592

Chapter 35: Multicast Listener Discovery Protocol....................................................................

598

MLD timers........................................................................................................................................................................

601

Reducing Host Response Burstiness....................................................................................................................

601

Clearing MLD groups.....................................................................................................................................................

602

Debugging MLD...............................................................................................................................................................

602

Explicit Tracking..............................................................................................................................................................

602

Reducing Leave Latency...............................................................................................................................................

602

Displaying MLD groups table........................................................................................................................................

602

Displaying MLD Interfaces............................................................................................................................................

603

MLD Snooping.................................................................................................................................................................

603

Enable MLD Snooping..............................................................................................................................................

603

Disable MLD Snooping.............................................................................................................................................

603

Configure the switch as a querier.........................................................................................................................

604

Specify port as connected to multicast router..................................................................................................

604

Enable Snooping Explicit Tracking........................................................................................................................

604

Display the MLD Snooping Table..........................................................................................................................

604

Chapter 36: Object Tracking.....................................................................................................

605

Object Tracking Overview............................................................................................................................................

605

Track Layer 2 Interfaces.........................................................................................................................................

606

Track Layer 3 Interfaces.........................................................................................................................................

606

Track IPv4 and IPv6 Routes...................................................................................................................................

607

Set Tracking Delays..................................................................................................................................................

608

VRRP Object Tracking.............................................................................................................................................

608

Object Tracking Configuration....................................................................................................................................

608

18 Contents

Tracking a Layer 2 Interface..................................................................................................................................

608

Tracking a Layer 3 Interface..................................................................................................................................

609

Track an IPv4/IPv6 Route.......................................................................................................................................

610

Displaying Tracked Objects...........................................................................................................................................

613

Chapter 37: Open Shortest Path First (OSPFv2 and OSPFv3)....................................................

616

Protocol Overview...........................................................................................................................................................

616

Autonomous System (AS) Areas...........................................................................................................................

616

Area Types...................................................................................................................................................................

617

Networks and Neighbors.........................................................................................................................................

618

Router Types...............................................................................................................................................................

618

Designated and Backup Designated Routers......................................................................................................

619

Link-State Advertisements (LSAs)........................................................................................................................

619

Router Priority and Cost.........................................................................................................................................

620

OSPF with Dell EMC Networking OS.........................................................................................................................

621

Graceful Restart.........................................................................................................................................................

621

Fast Convergence (OSPFv2, IPv4 Only)............................................................................................................

622

Multi-Process OSPFv2 with VRF..........................................................................................................................

623

OSPF ACK Packing...................................................................................................................................................

623

Setting OSPF Adjacency with Cisco Routers....................................................................................................

623

Configuration Information.............................................................................................................................................

624

Configuration Task List for OSPFv2 (OSPF for IPv4).....................................................................................

624

OSPFv3 NSSA...........................................................................................................................................................

636

Configuration Task List for OSPFv3 (OSPF for IPv6).....................................................................................

637

MIB Support for OSPFv3..............................................................................................................................................

649

Viewing the OSPFv3 MIB........................................................................................................................................

649

Configuration Task List for OSPFv3 (OSPF for IPv6)..........................................................................................

650

Enabling IPv6 Unicast Routing..............................................................................................................................

650

Applying cost for OSPFv3......................................................................................................................................

650

Assigning IPv6 Addresses on an Interface..........................................................................................................

651

Assigning Area ID on an Interface..........................................................................................................................

651

Assigning OSPFv3 Process ID and Router ID Globally.....................................................................................

651

Assigning OSPFv3 Process ID and Router ID to a VRF...................................................................................

652

Configuring Stub Areas...........................................................................................................................................

652

Configuring Passive-Interface...............................................................................................................................

652

Redistributing Routes...............................................................................................................................................

653

Configuring a Default Route...................................................................................................................................

653

Enabling OSPFv3 Graceful Restart......................................................................................................................

653

OSPFv3 Authentication Using IPsec....................................................................................................................

655

Troubleshooting OSPFv3.........................................................................................................................................

661

Chapter 38: Policy-based Routing (PBR)...................................................................................

663

Overview...........................................................................................................................................................................

663

Implementing PBR..........................................................................................................................................................

664

Configuration Task List for Policy-based Routing..................................................................................................

664

Create a Redirect List..............................................................................................................................................

665

Create a Rule for a Redirect-list...........................................................................................................................

665

Apply a Redirect-list to an Interface using a Redirect-group.........................................................................

667

Sample Configuration.....................................................................................................................................................

669

Contents 19

Chapter 39: PIM Sparse-Mode (PIM-SM)..................................................................................

673

Implementation Information..........................................................................................................................................

673

Protocol Overview..........................................................................................................................................................

673

Requesting Multicast Traffic..................................................................................................................................

673

Refuse Multicast Traffic..........................................................................................................................................

674

Send Multicast Traffic.............................................................................................................................................

674

Configuring PIM-SM.......................................................................................................................................................

674

Related Configuration Tasks..................................................................................................................................

675

Enable PIM-SM................................................................................................................................................................

675

Configuring S,G Expiry Timers.....................................................................................................................................

677

Configuring a Static Rendezvous Point.....................................................................................................................

677

Overriding Bootstrap Router Updates.................................................................................................................

678

Configuring a Designated Router................................................................................................................................

678

Creating Multicast Boundaries and Domains...........................................................................................................

680

Electing an RP using the BSR Mechanism...............................................................................................................

680

Chapter 40: PIM Source-Specific Mode (PIM-SSM)..................................................................

682

Implementation Information.........................................................................................................................................

682

Configure PIM-SSM.......................................................................................................................................................

682

Enabling PIM-SSM..........................................................................................................................................................

683

Use PIM-SSM with IGMP Version 2 Hosts..............................................................................................................

683

Electing an RP using the BSR Mechanism...............................................................................................................

685

Enabling RP to Server Specific Multicast Groups.............................................................................................

686

Chapter 41: Port Monitoring......................................................................................................

688

Important Points to Remember...................................................................................................................................

688

Port Monitoring...............................................................................................................................................................

689

Configuring Port Monitoring.........................................................................................................................................

691

Configuring Monitor Multicast Queue.......................................................................................................................

692

Enabling Flow-Based Monitoring................................................................................................................................

693

Remote Port Mirroring..................................................................................................................................................

694

Remote Port Mirroring Example............................................................................................................................

694

Configuring Remote Port Mirroring......................................................................................................................

695

Displaying Remote-Port Mirroring Configurations............................................................................................

696

Configuration procedure for Remote Port Mirroring........................................................................................

697

Encapsulated Remote Port Monitoring......................................................................................................................

701

ERPM Behavior on a typical Dell EMC Networking OS ........................................................................................

703

Port Monitoring on VLT.................................................................................................................................................

704

Chapter 42: Private VLANs (PVLAN)..........................................................................................

707

Private VLAN Concepts.................................................................................................................................................

707

Using the Private VLAN Commands...........................................................................................................................

708

Configuration Task List..................................................................................................................................................

709

Creating PVLAN ports.............................................................................................................................................

709

Creating a Primary VLAN........................................................................................................................................

709

Creating a Community VLAN..................................................................................................................................

710

Creating an Isolated VLAN.......................................................................................................................................

711

Private VLAN Configuration Example.........................................................................................................................

712

20 Contents

Inspecting the Private VLAN Configuration..............................................................................................................

713

Chapter 43: Per-VLAN Spanning Tree Plus (PVST+)..................................................................

715

Protocol Overview...........................................................................................................................................................

715

Implementation Information..........................................................................................................................................

716

Configure Per-VLAN Spanning Tree Plus..................................................................................................................

717

Enabling PVST+................................................................................................................................................................

717

Disabling PVST+...............................................................................................................................................................

717

Influencing PVST+ Root Selection..............................................................................................................................

718

Modifying Global PVST+ Parameters.........................................................................................................................

719

Modifying Interface PVST+ Parameters....................................................................................................................

719

Configuring an EdgePort...............................................................................................................................................

720

PVST+ in Multi-Vendor Networks...............................................................................................................................

721

Enabling PVST+ Extend System ID.............................................................................................................................

721

PVST+ Sample Configurations.....................................................................................................................................

722

Chapter 44: Quality of Service (QoS).........................................................................................

724

Implementation Information..........................................................................................................................................

726

Port-Based QoS Configurations..................................................................................................................................

726

Setting dot1p Priorities for Incoming Traffic......................................................................................................

726

Honoring dot1p Priorities on Ingress Traffic.......................................................................................................

727

Configuring Port-Based Rate Policing..................................................................................................................

727

Configuring Port-Based Rate Shaping.................................................................................................................

728

Policy-Based QoS Configurations...............................................................................................................................

729

Classify Traffic...........................................................................................................................................................

729

Create a QoS Policy..................................................................................................................................................

732

Create Policy Maps...................................................................................................................................................

734

DSCP Color Maps............................................................................................................................................................

737

Creating a DSCP Color Map...................................................................................................................................

737

Displaying DSCP Color Maps..................................................................................................................................

738

Displaying a DSCP Color Policy Configuration ..................................................................................................

739

Enabling QoS Rate Adjustment....................................................................................................................................

739

Enabling Strict-Priority Queueing...............................................................................................................................

740

Weighted Random Early Detection.............................................................................................................................

740

Creating WRED Profiles...........................................................................................................................................

741

Applying a WRED Profile to Traffic.......................................................................................................................

741

Displaying Default and Configured WRED Profiles............................................................................................

742

Displaying WRED Drop Statistics..........................................................................................................................

742

Displaying egress–queue Statistics.......................................................................................................................

742

Pre-Calculating Available QoS CAM Space..............................................................................................................

742

Configuring Weights and ECN for WRED ................................................................................................................

743

Configuring WRED and ECN Attributes....................................................................................................................

745

Guidelines for Configuring ECN for Classifying and Color-Marking Packets...................................................

746

Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class..........................

746

Classifying Incoming Packets Using ECN and Color-Marking........................................................................

747

Sample configuration to mark non-ecn packets as “yellow” with single traffic class..............................

748

Applying Layer 2 Match Criteria on a Layer 3 Interface........................................................................................

749

Applying DSCP and VLAN Match Criteria on a Service Queue...........................................................................

750

Classifying Incoming Packets Using ECN and Color-Marking..............................................................................

750

Contents 21

Guidelines for Configuring ECN for Classifying and Color-Marking Packets...................................................

752

Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class................................

753

Sample configuration to mark non-ecn packets as “yellow” with single traffic class....................................

753

Enabling Buffer Statistics Tracking ...........................................................................................................................

754

Chapter 45: Routing Information Protocol (RIP)........................................................................

757

Protocol Overview..........................................................................................................................................................

757

RIPv1.............................................................................................................................................................................

757

RIPv2............................................................................................................................................................................

757

Implementation Information..........................................................................................................................................

757

Configuration Information.............................................................................................................................................

758

Configuration Task List............................................................................................................................................

758

RIP Configuration Example.....................................................................................................................................

764

Chapter 46: Remote Monitoring (RMON)..................................................................................

769

Implementation Information..........................................................................................................................................

769

Fault Recovery.................................................................................................................................................................

769

Setting the RMON Alarm........................................................................................................................................

769

Configuring an RMON Event..................................................................................................................................

770

Configuring RMON Collection Statistics..............................................................................................................

771

Configuring the RMON Collection History...........................................................................................................

771

Chapter 47: Rapid Spanning Tree Protocol (RSTP)....................................................................

773

Protocol Overview..........................................................................................................................................................

773

Configuring Rapid Spanning Tree................................................................................................................................

773

Important Points to Remember...................................................................................................................................

774

RSTP and VLT............................................................................................................................................................

774

Configuring Interfaces for Layer 2 Mode..................................................................................................................

774

Enabling Rapid Spanning Tree Protocol Globally.....................................................................................................

775

Adding and Removing Interfaces.................................................................................................................................

777

Modifying Global Parameters.......................................................................................................................................

777

Enabling SNMP Traps for Root Elections and Topology Changes................................................................

778

Modifying Interface Parameters..................................................................................................................................

778

Enabling SNMP Traps for Root Elections and Topology Changes......................................................................

778

Influencing RSTP Root Selection................................................................................................................................

779

Configuring an EdgePort...............................................................................................................................................

779

Configuring Fast Hellos for Link State Detection...................................................................................................

780

Chapter 48: Software-Defined Networking (SDN)......................................................................

781

Chapter 49: Security.................................................................................................................

782

AAA Accounting...............................................................................................................................................................

782

Configuration Task List for AAA Accounting......................................................................................................

782

RADIUS Accounting..................................................................................................................................................

784

AAA Authentication........................................................................................................................................................

789

Configuration Task List for AAA Authentication................................................................................................

789

Obscuring Passwords and Keys...................................................................................................................................

792

AAA Authorization...........................................................................................................................................................

792

Privilege Levels Overview.......................................................................................................................................

793

22 Contents

Configuration Task List for Privilege Levels.......................................................................................................

793

RADIUS..............................................................................................................................................................................

797

RADIUS Authentication............................................................................................................................................

797

Configuration Task List for RADIUS.....................................................................................................................

798

Support for Change of Authorization and Disconnect Messages packets..................................................

801

TACACS+...........................................................................................................................................................................

811

Configuration Task List for TACACS+...................................................................................................................

811

TACACS+ Remote Authentication.........................................................................................................................

813

Command Authorization...........................................................................................................................................

814

Protection from TCP Tiny and Overlapping Fragment Attacks...........................................................................

814

Enabling SCP and SSH...................................................................................................................................................

814

Using SCP with SSH to Copy a Software Image...............................................................................................

815

Removing the RSA Host Keys and Zeroizing Storage .....................................................................................

816

Configuring When to Re-generate an SSH Key ................................................................................................

816

Configuring the SSH Server Key Exchange Algorithm.....................................................................................

816

Configuring the HMAC Algorithm for the SSH Server.....................................................................................

817

Configuring the SSH Server Cipher List...............................................................................................................

817

Configuring DNS in the SSH Server......................................................................................................................

818

Secure Shell Authentication....................................................................................................................................

818

Troubleshooting SSH...............................................................................................................................................

820

Telnet..................................................................................................................................................................................

821

VTY Line and Access-Class Configuration................................................................................................................

821

VTY Line Local Authentication and Authorization.............................................................................................

821

VTY Line Remote Authentication and Authorization........................................................................................

822

VTY MAC-SA Filter Support...................................................................................................................................

822

Role-Based Access Control..........................................................................................................................................

823

Overview of RBAC....................................................................................................................................................

823

User Roles...................................................................................................................................................................

825

AAA Authentication and Authorization for Roles..............................................................................................

828

Role Accounting.........................................................................................................................................................

831

Display Information About User Roles..................................................................................................................

832

Two Factor Authentication (2FA)...............................................................................................................................

833

Handling Access-Challenge Message...................................................................................................................

833

Configuring Challenge Response Authentication for SSHv2..........................................................................

833

SMS-OTP Mechanism..............................................................................................................................................

834

Configuring the System to Drop Certain ICMP Reply Messages........................................................................

834

Dell EMC Networking OS Security Hardening.........................................................................................................

835

Dell EMC Networking OS Image Verification.....................................................................................................

836

Startup Configuration Verification........................................................................................................................

837

Configuring the root User Password....................................................................................................................

838

Locking Access to GRUB Interface......................................................................................................................

838

Enabling User Lockout for Failed Login Attempts............................................................................................

839

Chapter 50: Service Provider Bridging......................................................................................

840

VLAN Stacking.................................................................................................................................................................

840

Configure VLAN Stacking........................................................................................................................................

841

Creating Access and Trunk Ports.........................................................................................................................

842

Enable VLAN-Stacking for a VLAN.......................................................................................................................

842

Configuring the Protocol Type Value for the Outer VLAN Tag.....................................................................

843

Configuring Dell EMC Networking OS Options for Trunk Ports....................................................................

843

Contents 23

Debugging VLAN Stacking......................................................................................................................................

844

VLAN Stacking in Multi-Vendor Networks.........................................................................................................

844

VLAN Stacking Packet Drop Precedence.................................................................................................................

848

Enabling Drop Eligibility............................................................................................................................................

848

Honoring the Incoming DEI Value..........................................................................................................................

848

Marking Egress Packets with a DEI Value..........................................................................................................

849

Dynamic Mode CoS for VLAN Stacking....................................................................................................................

849

Mapping C-Tag to S-Tag dot1p Values................................................................................................................

851

Layer 2 Protocol Tunneling...........................................................................................................................................

851

Enabling Layer 2 Protocol Tunneling....................................................................................................................

853

Specifying a Destination MAC Address for BPDUs..........................................................................................

854

Setting Rate-Limit BPDUs......................................................................................................................................

854

Debugging Layer 2 Protocol Tunneling................................................................................................................

854

Provider Backbone Bridging.........................................................................................................................................

855

Chapter 51: sFlow......................................................................................................................

856

Overview...........................................................................................................................................................................

856

Implementation Information.........................................................................................................................................

856

Enabling Extended sFlow..............................................................................................................................................

857

Enabling and Disabling sFlow on an Interface..........................................................................................................

858

Enabling and Disabling sFlow for Egress Traffic...............................................................................................

858

Enabling sFlow Max-Header Size Extended.............................................................................................................

858

sFlow Show Commands................................................................................................................................................

859

Displaying Show sFlow Global................................................................................................................................

859

Displaying Show sFlow on an Interface...............................................................................................................

860

Displaying Show sFlow on a Stack-unit...............................................................................................................

860

Configuring Specify Collectors.....................................................................................................................................

861

Changing the Polling Intervals......................................................................................................................................

861

Back-Off Mechanism......................................................................................................................................................

861

sFlow on LAG ports.........................................................................................................................................................

861

Enabling Extended sFlow...............................................................................................................................................

861

Important Points to Remember.............................................................................................................................

862

Chapter 52: Simple Network Management Protocol (SNMP).....................................................

864

Protocol Overview..........................................................................................................................................................

865

Implementation Information.........................................................................................................................................

865

SNMPv3 Compliance With FIPS.................................................................................................................................

865

Configuration Task List for SNMP.............................................................................................................................

866

Important Points to Remember...................................................................................................................................

866

Set up SNMP...................................................................................................................................................................

866

Creating a Community.............................................................................................................................................

867

Setting Up User-Based Security (SNMPv3)......................................................................................................

867

Enable SNMPv3 traps..............................................................................................................................................

868

Reading Managed Object Values................................................................................................................................

868

Writing Managed Object Values..................................................................................................................................

869

Configuring Contact and Location Information using SNMP...............................................................................

869

Subscribing to Managed Object Value Updates using SNMP..............................................................................

870

Enabling a Subset of SNMP Traps..............................................................................................................................

871

Enabling an SNMP Agent to Notify Syslog Server Failure....................................................................................

872

24 Contents

Copy Configuration Files Using SNMP......................................................................................................................

873

Copying a Configuration File..................................................................................................................................

875

Copying Configuration Files via SNMP................................................................................................................

876

Copying the Startup-Config Files to the Running-Config...............................................................................

876

Copying the Startup-Config Files to the Server via FTP................................................................................

876

Copying the Startup-Config Files to the Server via TFTP..............................................................................

877

Copy a Binary File to the Startup-Configuration...............................................................................................

877

Additional MIB Objects to View Copy Statistics................................................................................................

877

Obtaining a Value for MIB Objects........................................................................................................................

878

MIB Support to Display Reason for Last System Reboot.....................................................................................

879

Viewing the Reason for Last System Reboot Using SNMP............................................................................

879

MIB Support for Power Monitoring............................................................................................................................

879

MIB Support to Display the Available Memory Size on Flash..............................................................................

880

Viewing the Available Flash Memory Size...........................................................................................................

880

MIB Support to Display the Software Core Files Generated by the System...................................................

880

Viewing the Software Core Files Generated by the System...........................................................................

881

MIB Support to Display the Available Partitions on Flash......................................................................................

881

Viewing the Available Partitions on Flash............................................................................................................

882

MIB Support to Display Egress Queue Statistics....................................................................................................

883

MIB Support to ECMP Group Count..........................................................................................................................

883

Viewing the ECMP Group Count Information....................................................................................................

883

MIB Support for entAliasMappingTable ...................................................................................................................

886

Viewing the entAliasMappingTable MIB..............................................................................................................

886

MIB Support for LAG.....................................................................................................................................................

887

Viewing the LAG MIB...............................................................................................................................................

888

MIB Support to Display Unrecognized LLDP TLVs.................................................................................................

889

MIB Support to Display Reserved Unrecognized LLDP TLVs........................................................................

889

MIB Support to Display Organizational Specific Unrecognized LLDP TLVs...............................................

890

MIB Support for LLDP Notification Interval..............................................................................................................

891

MIB support for Port Security......................................................................................................................................

891

Global MIB objects for port security.....................................................................................................................

891

MIB support for interface level port security.....................................................................................................

891

MIB objects for configuring MAC addresses......................................................................................................

893

MIB objects for configuring MAC addresses......................................................................................................

893

Manage VLANs using SNMP........................................................................................................................................

894

Creating a VLAN........................................................................................................................................................

894

Assigning a VLAN Alias............................................................................................................................................

894

Displaying the Ports in a VLAN..............................................................................................................................

895

Add Tagged and Untagged Ports to a VLAN.....................................................................................................

896

Managing Overload on Startup....................................................................................................................................

897

Enabling and Disabling a Port using SNMP...............................................................................................................

897

Fetch Dynamic MAC Entries using SNMP................................................................................................................

897

Example of Deriving the Interface Index Number...................................................................................................

899

MIB Objects for Viewing the System Image on Flash Partitions...................................................................

899

Monitoring BGP sessions via SNMP..........................................................................................................................

899

Monitor Port-Channels...................................................................................................................................................

901

Enabling an SNMP Agent to Notify Syslog Server Failure...................................................................................

902

Troubleshooting SNMP Operation..............................................................................................................................

903

Transceiver Monitoring.................................................................................................................................................

903

Configuring SNMP context name...............................................................................................................................

904

Contents 25

Chapter 53: Stacking................................................................................................................

906

Stacking Overview.........................................................................................................................................................

906

Stack Management Roles.......................................................................................................................................

906

Stack Master Election..............................................................................................................................................

907

Virtual IP......................................................................................................................................................................

909

Failover Roles.............................................................................................................................................................

909

MAC Addressing on Stacks....................................................................................................................................

909

Stacking LAG..............................................................................................................................................................

910

Supported Stacking Topologies.............................................................................................................................

910

High Availability on Stacks.......................................................................................................................................

911

Management Access on Stacks..............................................................................................................................

911

Mixed-mode Stacking...............................................................................................................................................

912

Important Points to Remember....................................................................................................................................

913

Stacking Installation Tasks............................................................................................................................................

913

Create a Stack............................................................................................................................................................

914

Add Units to an Existing Stack...............................................................................................................................

917

Split a Stack...............................................................................................................................................................

920

Stacking Configuration Tasks......................................................................................................................................

920

Assigning Unit Numbers to Units in an Stack....................................................................................................

920

Creating a Virtual Stack Unit on a Stack.............................................................................................................

920

Displaying Information about a Stack...................................................................................................................

921

Influencing Management Unit Selection on a Stack.........................................................................................

923

Managing Redundancy on a Stack........................................................................................................................

924

Resetting a Unit on a Stack....................................................................................................................................

924

Enabling Mixed-mode Stacking.............................................................................................................................

924

Verify a Stack Configuration........................................................................................................................................

925

Displaying the Status of Stacking Ports..............................................................................................................

925

Remove Units or Front End Ports from a Stack.....................................................................................................

926

Removing a Unit from a Stack...............................................................................................................................

926

Removing Front End Port Stacking......................................................................................................................

927

Troubleshoot a Stack.....................................................................................................................................................

927

Recover from Stack Link Flaps..............................................................................................................................

927

Recover from a Card Problem State on a Stack...............................................................................................

928

Chapter 54: Storm Control........................................................................................................

930

Configure Storm Control...............................................................................................................................................

930

Configuring Storm Control from INTERFACE Mode........................................................................................

930

Configuring Storm Control from CONFIGURATION Mode.............................................................................

931

Chapter 55: Spanning Tree Protocol (STP)...............................................................................

932

Protocol Overview..........................................................................................................................................................

932

Configure Spanning Tree..............................................................................................................................................

932

Important Points to Remember...................................................................................................................................

933

Configuring Interfaces for Layer 2 Mode..................................................................................................................

934

Enabling Spanning Tree Protocol Globally................................................................................................................

935

Adding an Interface to the Spanning Tree Group...................................................................................................

936

Modifying Global Parameters.......................................................................................................................................

937

Modifying Interface STP Parameters.........................................................................................................................

938

26 Contents

Enabling PortFast............................................................................................................................................................

938

Prevent Network Disruptions with BPDU Guard..............................................................................................

939

Selecting STP Root.........................................................................................................................................................

941

STP Root Guard...............................................................................................................................................................

941

Root Guard Scenario.................................................................................................................................................

941

Configuring Root Guard...........................................................................................................................................

942

Enabling SNMP Traps for Root Elections and Topology Changes......................................................................

943

Configuring Spanning Trees as Hitless......................................................................................................................

943

STP Loop Guard..............................................................................................................................................................

943

Configuring Loop Guard..........................................................................................................................................

944

Displaying STP Guard Configuration..........................................................................................................................

945

Chapter 56: SupportAssist........................................................................................................

946

Configuring SupportAssist Using a Configuration Wizard....................................................................................

946

Configuring SupportAssist Manually...........................................................................................................................

947

Configuring SupportAssist Activity............................................................................................................................

948

Configuring SupportAssist Company.........................................................................................................................

950

Configuring SupportAssist Person.............................................................................................................................

950

Configuring SupportAssist Server...............................................................................................................................

951

Viewing SupportAssist Configuration........................................................................................................................

952

Chapter 57: System Time and Date............................................................................................

954

Network Time Protocol.................................................................................................................................................

954

Protocol Overview....................................................................................................................................................

955

Configure the Network Time Protocol................................................................................................................

955

Enabling NTP.............................................................................................................................................................

955

Configuring NTP Broadcasts.................................................................................................................................

956

Disabling NTP on an Interface...............................................................................................................................

956

Configuring a Source IP Address for NTP Packets..........................................................................................

956

Configuring NTP Authentication...........................................................................................................................

957

Configuring NTP control key password...............................................................................................................

959

Configuring the NTP Step-Threshold..................................................................................................................

959

Dell EMC Networking OS Time and Date.................................................................................................................

959

Configuration Task List ..........................................................................................................................................

959

Setting the Time and Date for the Switch Software Clock...........................................................................

960

Setting the Timezone...............................................................................................................................................

960

Set Daylight Saving Time.........................................................................................................................................

961

Setting Daylight Saving Time Once.......................................................................................................................

961

Setting Recurring Daylight Saving Time...............................................................................................................

961

Chapter 58: Tunneling...............................................................................................................

963

Configuring a Tunnel......................................................................................................................................................

963

Configuring Tunnel Keepalive Settings......................................................................................................................

964

Configuring a Tunnel Interface....................................................................................................................................

964

Configuring Tunnel Allow-Remote Decapsulation...................................................................................................

965

Configuring the Tunnel Source Anylocal...................................................................................................................

965

Chapter 59: Uplink Failure Detection (UFD)...............................................................................

967

Feature Description........................................................................................................................................................

967

Contents 27

How Uplink Failure Detection Works..........................................................................................................................

968

UFD and NIC Teaming...................................................................................................................................................

969

Important Points to Remember...................................................................................................................................

969

Configuring Uplink Failure Detection..........................................................................................................................

970

Clearing a UFD-Disabled Interface..............................................................................................................................

971

Displaying Uplink Failure Detection.............................................................................................................................

972

Sample Configuration: Uplink Failure Detection......................................................................................................

974

Chapter 60: Upgrade Procedures...............................................................................................

976

Chapter 61: Virtual LANs (VLANs)..............................................................................................

977

Default VLAN....................................................................................................................................................................

977

Port-Based VLANs..........................................................................................................................................................

978

VLANs and Port Tagging...............................................................................................................................................

978

Configuration Task List..................................................................................................................................................

979

Creating a Port-Based VLAN.................................................................................................................................

979

Assigning Interfaces to a VLAN.............................................................................................................................

980

Moving Untagged Interfaces..................................................................................................................................

981

Assigning an IP Address to a VLAN......................................................................................................................

982

Configuring Native VLANs............................................................................................................................................

982

Enabling Null VLAN as the Default VLAN.................................................................................................................

983

Chapter 62: Virtual Link Trunking (VLT)....................................................................................

984

Overview...........................................................................................................................................................................

984

VLT Terminology.......................................................................................................................................................

986

Layer-2 Traffic in VLT Domains.............................................................................................................................

987

Interspersed VLANs..................................................................................................................................................

988

VLT on Core Switches.............................................................................................................................................

988

Enhanced VLT............................................................................................................................................................

989

Configure Virtual Link Trunking...................................................................................................................................

990

Important Points to Remember.............................................................................................................................

990

Configuration Notes.................................................................................................................................................

992

Primary and Secondary VLT Peers.......................................................................................................................

994

RSTP and VLT...........................................................................................................................................................

995

VLT Bandwidth Monitoring.....................................................................................................................................

995

VLT and Stacking......................................................................................................................................................

995

VLT and IGMP Snooping.........................................................................................................................................

996

VLT IPv6......................................................................................................................................................................

996

VLT Port Delayed Restoration...............................................................................................................................

996

Additional ARP Refresh on VLTi............................................................................................................................

996

PIM-Sparse Mode Support on VLT......................................................................................................................

997

VLT Routing ..............................................................................................................................................................

999

Non-VLT ARP Sync................................................................................................................................................

1002

RSTP Configuration......................................................................................................................................................

1002

Preventing Forwarding Loops in a VLT Domain...............................................................................................

1002

Sample RSTP configuration..................................................................................................................................

1003

Configuring VLT.......................................................................................................................................................

1003

PVST+ Configuration....................................................................................................................................................

1012

Peer Routing Configuration Example........................................................................................................................

1013

28 Contents

Dell-1 Switch Configuration...................................................................................................................................

1014

Dell-2 Switch Configuration...................................................................................................................................

1018

R1 Configuration.......................................................................................................................................................

1021

Access Switch A1 Configurations and Verification..........................................................................................

1022

eVLT Configuration Example......................................................................................................................................

1022

PIM-Sparse Mode Configuration Example..............................................................................................................

1025

Verifying a VLT Configuration....................................................................................................................................

1025

Additional VLT Sample Configurations.....................................................................................................................

1028

Troubleshooting VLT....................................................................................................................................................

1030

Reconfiguring Stacked Switches as VLT.................................................................................................................

1031

Specifying VLT Nodes in a PVLAN...........................................................................................................................

1032

Configuring a VLT VLAN or LAG in a PVLAN.........................................................................................................

1035

Creating a VLT LAG or a VLT VLAN...................................................................................................................

1035

Associating the VLT LAG or VLT VLAN in a PVLAN......................................................................................

1036

Proxy ARP Capability on VLT Peer Nodes..............................................................................................................

1037

VLT Nodes as Rendezvous Points for Multicast Resiliency...............................................................................

1038

Configuring VLAN-Stack over VLT...........................................................................................................................

1038

IPv6 Peer Routing in VLT Domains Overview.........................................................................................................

1041

Configure BFD in VLT Domain...................................................................................................................................

1045

Sample BFD configuration in VLT domain.........................................................................................................

1045

VXLAN on VLT...............................................................................................................................................................

1049

Chapter 63: VLT Proxy Gateway...............................................................................................

1052

Proxy Gateway in VLT Domains................................................................................................................................

1052

LLDP VLT Proxy Gateway in a Square VLT Topology....................................................................................

1055

Configuring a Static VLT Proxy Gateway...............................................................................................................

1056

Configuring an LLDP VLT Proxy Gateway..............................................................................................................

1056

VLT Proxy Gateway Sample Topology.....................................................................................................................

1057

VLT Domain Configuration....................................................................................................................................

1057

Dell-1 VLT Configuration........................................................................................................................................

1057

Dell-2 VLT Configuration.......................................................................................................................................

1058

Dell-3 VLT Configuration.......................................................................................................................................

1059

Dell-4 VLT Configuration.......................................................................................................................................

1060

Chapter 64: Virtual Extensible LAN (VXLAN)............................................................................

1061

advertise-local-mac......................................................................................................................................................

1062

Components of VXLAN network...............................................................................................................................

1062

Functional Overview of VXLAN Gateway...............................................................................................................

1063

VXLAN Frame Format..................................................................................................................................................

1063

Limitations on VXLAN .................................................................................................................................................

1065

Configuring and Controlling VXLAN from the NSX Controller GUI..................................................................

1065

Configuring and Controling VXLAN from Nuage Controller GUI.......................................................................

1070

Configuring VxLAN Gateway.......................................................................................................................................

1071

Connecting to an NVP Controller.........................................................................................................................

1071

Advertising VXLAN Access Ports to Controller................................................................................................

1071

Displaying VXLAN Configurations.............................................................................................................................

1072

VXLAN Service nodes for BFD...................................................................................................................................

1073

Static Virtual Extensible LAN (VXLAN)...................................................................................................................

1073

Configuring Static VXLAN.....................................................................................................................................

1074

Contents 29

Displaying Static VXLAN Configurations...........................................................................................................

1074

Disabling MAC Address Learning on Static VXLAN Tunnels........................................................................

1075

Preserving 802.1 p value across VXLAN tunnels...................................................................................................

1076

VXLAN Scenario............................................................................................................................................................

1076

Routing in and out of VXLAN tunnels......................................................................................................................

1076

Configuring VXLAN RIOT......................................................................................................................................

1078

VLT Scenario............................................................................................................................................................

1079

NSX Controller-based VXLAN for VLT....................................................................................................................

1080

Important Points to Remember............................................................................................................................

1081

Configure NSX Controller-based VxLAN in VLT Setup..................................................................................

1081

Configuring BFD and UFD for VXLAN................................................................................................................

1081

Configuring NSX-based VxLAN on VLT Peer Devices....................................................................................

1081

Configuring VLT for NSX-based VxLAN............................................................................................................

1082

Configuring and Controlling VXLAN from the NSX Controller GUI.............................................................

1087

Chapter 65: Virtual Routing and Forwarding (VRF)..................................................................

1092

VRF Overview................................................................................................................................................................

1092

VRF Configuration Notes............................................................................................................................................

1093

DHCP..........................................................................................................................................................................

1095

VRF Configuration........................................................................................................................................................

1095

Loading VRF CAM...................................................................................................................................................

1095

Creating a Non-Default VRF Instance................................................................................................................

1095

Assigning an Interface to a VRF..........................................................................................................................

1095

Assigning a Front-end Port to a Management VRF........................................................................................

1095

View VRF Instance Information...........................................................................................................................

1096

Assigning an OSPF Process to a VRF Instance...............................................................................................

1096

Configuring VRRP on a VRF Instance................................................................................................................

1096

Configuring Management VRF.............................................................................................................................

1097

Configuring a Static Route....................................................................................................................................

1098

Sample VRF Configuration..........................................................................................................................................

1098

Route Leaking VRFs......................................................................................................................................................

1103

Dynamic Route Leaking................................................................................................................................................

1104

Configuring Route Leaking without Filtering Criteria......................................................................................

1104

Configuring Route Leaking with Filtering...........................................................................................................

1106

Chapter 66: Virtual Router Redundancy Protocol (VRRP).........................................................

1109

VRRP Overview..............................................................................................................................................................

1109

VRRP Benefits.................................................................................................................................................................

1110

VRRP Implementation....................................................................................................................................................

1110

VRRP Configuration........................................................................................................................................................

1111

Configuration Task List............................................................................................................................................

1111

Setting VRRP Initialization Delay...........................................................................................................................

1119

Sample Configurations..................................................................................................................................................

1120

VRRP in a VRF Configuration................................................................................................................................

1123

VRRP for IPv6 Configuration................................................................................................................................

1128

Proxy Gateway with VRRP..........................................................................................................................................

1132

Chapter 67: Debugging and Diagnostics....................................................................................

1136

Offline Diagnostics.........................................................................................................................................................

1136

30 Contents

Loading...
+ 1144 hidden pages