Dell PowerSwitch S5000 User Manual

Dell PowerSwitch S5000 User Manual

Dell 9.7(0.0) Configuration Guide for the S5000 Switch

Notes, Cautions, and Warnings

NOTE: A NOTE indicates important information that helps you make better use of your computer.

CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.

WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Delland the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.

2015 - 02

Rev. A00

Contents

 

1 About this Guide..................................................................................................

37

Audience..............................................................................................................................................

37

Conventions........................................................................................................................................

37

Related Documents.............................................................................................................................

37

2 Configuration Fundamentals...........................................................................

38

Accessing the Command Line............................................................................................................

38

CLI Modes............................................................................................................................................

38

Navigating CLI Modes...................................................................................................................

40

Port Numbering Convention..............................................................................................................

42

The do Command...............................................................................................................................

42

The no Command...............................................................................................................................

43

Obtaining Help....................................................................................................................................

44

Entering and Editing Commands.......................................................................................................

44

Command History...............................................................................................................................

45

Filtering show Command Outputs.....................................................................................................

45

Multiple Users in Configuration Mode...............................................................................................

47

3 Getting Started...................................................................................................

48

Accessing Ports...................................................................................................................................

48

Accessing the RJ-45/RS-232 Console Port.......................................................................................

48

Pin Assignments..................................................................................................................................

49

Accessing the CLI Interface and Running Scripts Using SSH............................................................

49

Entering CLI commands Using an SSH Connection...................................................................

49

Executing Local CLI Scripts Using an SSH Connection...............................................................

49

Default Configuration.........................................................................................................................

50

Accessing the USB-B Console Port...................................................................................................

50

Booting Process...................................................................................................................................

51

Enter the Initial Configuration Information........................................................................................

53

Configuring the Enable Password......................................................................................................

53

Configuring a Host Name...................................................................................................................

54

Navigating CLI Modes.........................................................................................................................

54

Default Configuration.........................................................................................................................

54

Configuring Layer 2 (Data Link) Mode................................................................................................

54

Accessing the System Remotely.........................................................................................................

55

Configure the Management Port IP Address.....................................................................................

55

Configure a Management Route........................................................................................................

55

Configuring a Username and Password.............................................................................................

56

Creating a Port-based VLAN...............................................................................................................

56

Assigning Interfaces to a VLAN...........................................................................................................

56

Assigning an IP Address to a VLAN.....................................................................................................

57

Connect the S5000 to the Network...................................................................................................

57

Configure File Management...............................................................................................................

57

Copying Files to and from the System...............................................................................................

58

Important Points to Remember....................................................................................................

58

Mounting an NFS File System.............................................................................................................

59

Important Points to Remember....................................................................................................

59

Saving the Running-Configuration....................................................................................................

60

Viewing Files........................................................................................................................................

61

View Configuration Files.....................................................................................................................

62

Compressing Configuration Files.......................................................................................................

63

Managing the File System...................................................................................................................

66

Enabling Software Features on Devices Using a Command Option................................................

67

View Command History......................................................................................................................

67

Upgrading and Downgrading Dell Networking OS...........................................................................

68

Using Hashes to Validate Software Images.......................................................................................

68

Using HTTP for File Transfers.............................................................................................................

69

4 Switch Management..........................................................................................

70

Configuring Privilege Levels...............................................................................................................

70

Creating a Custom Privilege Level................................................................................................

70

Removing a Command from EXEC Mode.........................................................................................

70

Moving a Command from EXEC Privilege Mode to EXEC Mode......................................................

70

Allowing Access to CONFIGURATION Mode Commands.................................................................

71

Allowing Access to the Following Modes...........................................................................................

71

Applying a Privilege Level to a Username..........................................................................................

73

Applying a Privilege Level to a Terminal Line.....................................................................................

73

Configuring Logging...........................................................................................................................

73

Log Messages in the Internal Buffer...................................................................................................

74

Configuration Task List for System Log Management.................................................................

74

Disabling System Logging.............................................................................................................

74

Sending System Messages to a Syslog Server..............................................................................

74

Configuring a UNIX System as a Syslog Server..................................................................................

75

Changing System Logging Settings....................................................................................................

75

Display the Logging Buffer and the Logging Configuration..............................................................

76

Configuring a UNIX Logging Facility Level.........................................................................................

77

Synchronizing Log Messages..............................................................................................................

78

Enabling Timestamp on Syslog Messages..........................................................................................

78

File Transfer Services...........................................................................................................................

79

Configuration Task List for File Transfer Services........................................................................

79

Enabling the FTP Server................................................................................................................

79

Configuring FTP Server Parameters..............................................................................................

79

Configuring FTP Client Parameters..............................................................................................

80

Terminal Lines......................................................................................................................................

81

Denying and Permitting Access to a Terminal Line.....................................................................

81

Configuring Login Authentication for Terminal Lines.......................................................................

81

Setting Time Out of EXEC Privilege Mode.........................................................................................

82

Using Telnet to get to Another Network Device...............................................................................

83

Lock CONFIGURATION Mode............................................................................................................

84

Viewing the Configuration Lock Status........................................................................................

84

View the Configuration Lock Status...................................................................................................

85

Recovering from a Forgotten Password............................................................................................

85

Recovering from a Forgotten Enable Password................................................................................

86

Recovering from a Failed Start...........................................................................................................

86

5 802.1ag.................................................................................................................

88

Ethernet CFM......................................................................................................................................

88

Maintenance Domains........................................................................................................................

89

Maintenance Points............................................................................................................................

89

Maintenance End Points.....................................................................................................................

90

Implementation Information...............................................................................................................

91

Configuring the CFM...........................................................................................................................

91

Related Configuration Tasks.........................................................................................................

91

Enabling Ethernet CFM........................................................................................................................

91

Creating a Maintenance Domain........................................................................................................

91

Creating a Maintenance Association..................................................................................................

92

Create Maintenance Points................................................................................................................

92

Creating a Maintenance End Point...............................................................................................

92

Creating a Maintenance Intermediate Point................................................................................

93

Displaying the MP Databases........................................................................................................

94

Setting the MP Database Persistence...........................................................................................

94

Continuity Check Messages...............................................................................................................

95

Enabling CCM................................................................................................................................

96

Enabling Cross-Checking.............................................................................................................

96

Sending Loopback Messages and Responses...................................................................................

96

Sending Linktrace Messages and Responses.....................................................................................

97

Caching Link Trace........................................................................................................................

97

Enabling CFM SNMP Traps.................................................................................................................

98

Displaying Ethernet CFM Statistics...................................................................................................

100

6 802.1X.................................................................................................................

101

The Port-Authentication Process.....................................................................................................

102

EAP over RADIUS..............................................................................................................................

104

RADIUS Attributes for 802.1 Support..........................................................................................

104

Configuring 802.1X...........................................................................................................................

104

Related Configuration Tasks.......................................................................................................

104

Important Points to Remember..................................................................................................

105

Enabling 802.1X.................................................................................................................................

105

Configuring Request Identity Re-Transmissions.............................................................................

107

Configuring a Quiet Period after a Failed Authentication...............................................................

107

Forcibly Authorizing or Unauthorizing a Port..................................................................................

108

Re-Authenticating a Port..................................................................................................................

109

Configuring Timeouts.......................................................................................................................

110

Configuring Dynamic VLAN Assignment with Port Authentication.................................................

111

Guest and Authentication-Fail VLANs...............................................................................................

112

Configuring a Guest VLAN...........................................................................................................

113

Configuring an Authentication-Fail VLAN..................................................................................

113

7 Access Control List (ACL) VLAN Groups and Content Addressable

 

Memory (CAM)......................................................................................................

115

Optimizing CAM Utilization During the Attachment of ACLs to VLANs..........................................

115

Guidelines for Configuring ACL VLAN groups.................................................................................

116

Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.........................

117

Configuring ACL VLAN Groups...................................................................................................

117

Configuring FP Blocks for VLAN Parameters..............................................................................

118

Viewing CAM Usage..........................................................................................................................

119

Allocating FP Blocks for VLAN Processes........................................................................................

120

8 Access Control Lists (ACLs).............................................................................

122

IP Access Control Lists (ACLs)..........................................................................................................

122

CAM Allocation and CAM Optimization...........................................................................................

123

User Configurable CAM Allocation.............................................................................................

123

CAM Optimization.......................................................................................................................

124

Test CAM Usage..........................................................................................................................

124

View CAM-ACL Settings..............................................................................................................

124

View CAM Usage.........................................................................................................................

126

QoS CAM Region Limitation.......................................................................................................

126

Implementing ACLs on Dell Networking OS....................................................................................

127

ACLs and VLANs...........................................................................................................................

127

ACL Optimization........................................................................................................................

127

Determine the Order in which ACLs are Used to Classify Traffic..............................................

127

IP Fragment Handling.......................................................................................................................

128

IP Fragments ACL Examples.......................................................................................................

129

Layer 4 ACL Rules Examples.......................................................................................................

129

Configure a Standard IP ACL............................................................................................................

130

Configuring a Standard IP ACL Filter...........................................................................................

131

Configure an Extended IP ACL.........................................................................................................

132

Configuring Filters with a Sequence Number............................................................................

132

Configuring Filters Without a Sequence Number......................................................................

133

Established Flag.................................................................................................................................

134

Configure Layer 2 and Layer 3 ACLs................................................................................................

134

Assign an IP ACL to an Interface.......................................................................................................

135

Applying an IP ACL......................................................................................................................

135

Counting ACL Hits.......................................................................................................................

136

Configure Ingress ACLs.....................................................................................................................

136

Configure Egress ACLs......................................................................................................................

137

Applying Egress Layer 3 ACLs (Control-Plane)...........................................................................

137

Configure ACLs to Loopback...........................................................................................................

138

Applying an ACL on Loopback Interfaces........................................................................................

138

IP Prefix Lists......................................................................................................................................

139

Implementation Information......................................................................................................

140

Configuration Task List for Prefix Lists.......................................................................................

140

Creating a Prefix List.........................................................................................................................

140

Creating a Prefix List Without a Sequence Number...................................................................

141

Viewing Prefix Lists......................................................................................................................

142

Applying a Prefix List for Route Redistribution...........................................................................

143

Applying a Filter to a Prefix List (OSPF).......................................................................................

143

ACL Resequencing............................................................................................................................

144

Resequencing an ACL or Prefix List............................................................................................

145

Route Maps........................................................................................................................................

146

Implementation Information......................................................................................................

146

Important Points to Remember..................................................................................................

146

Configuration Task List for Route Maps.....................................................................................

147

Creating a Route Map..................................................................................................................

147

Configure Route Map Filters.......................................................................................................

148

Configuring Match Routes..........................................................................................................

149

Configuring Set Conditions.........................................................................................................

151

Configure a Route Map for Route Redistribution......................................................................

152

Configure a Route Map for Route Tagging................................................................................

152

Continue Clause..........................................................................................................................

153

9 Bidirectional Forwarding Detection (BFD)...................................................

154

How BFD Works................................................................................................................................

154

BFD Packet Format............................................................................................................................

155

BFD Sessions.....................................................................................................................................

156

BFD Three-Way Handshake..............................................................................................................

157

Session State Changes......................................................................................................................

158

Important Points to Remember..................................................................................................

159

Configure BFD...................................................................................................................................

159

Configure BFD for Physical Ports...............................................................................................

160

Configure BFD for Static Routes.................................................................................................

163

Configure BFD for OSPF.............................................................................................................

165

Configure BFD for IS-IS...............................................................................................................

168

Configure BFD for BGP................................................................................................................

171

Configuring Protocol Liveness....................................................................................................

178

Troubleshooting BFD........................................................................................................................

178

10 Border Gateway Protocol IPv4 (BGPv4)....................................................

180

Autonomous Systems (AS)................................................................................................................

180

Sessions and Peers............................................................................................................................

182

Establish a Session.......................................................................................................................

183

Route Reflectors................................................................................................................................

184

Communities.....................................................................................................................................

185

BGP Attributes...................................................................................................................................

185

Best Path Selection Criteria.........................................................................................................

185

Weight................................................................................................................................................

187

Local Preference...............................................................................................................................

187

Multi-Exit Discriminators (MEDs)................................................................................................

188

Origin.................................................................................................................................................

189

AS Path..............................................................................................................................................

190

Next Hop...........................................................................................................................................

190

Multiprotocol BGP............................................................................................................................

190

Implement BGP with Dell Networking OS.......................................................................................

191

Additional Path (Add-Path) Support............................................................................................

191

Advertise IGP Cost as MED for Redistributed Routes.................................................................

191

Ignore Router-ID for Some Best-Path Calculations..................................................................

192

Four-Byte AS Numbers...............................................................................................................

192

AS4 Number Representation......................................................................................................

193

AS Number Migration........................................................................................................................

194

BGP4 Management Information Base (MIB)....................................................................................

196

Important Points to Remember..................................................................................................

196

Configuration Information................................................................................................................

197

BGP Configuration......................................................................................................................

197

Enabling BGP.....................................................................................................................................

198

Configuring AS4 Number Representations.....................................................................................

202

Configuring Peer Groups.................................................................................................................

203

Configuring BGP Fast Fall-Over.......................................................................................................

206

Configuring Passive Peering............................................................................................................

208

Maintaining Existing AS Numbers During an AS Migration

............................................................. 209

Allowing an AS Number to Appear in its Own AS Path...................................................................

210

Enabling Graceful Restart..................................................................................................................

211

Enabling Neighbor Graceful Restart.................................................................................................

212

Filtering on an AS-Path Attribute......................................................................................................

212

Regular Expressions as Filters.....................................................................................................

214

Filtering BGP Routes Using AS-PATH Information..........................................................................

215

Redistributing Routes........................................................................................................................

216

Enabling Additional Paths..................................................................................................................

217

Configuring IP Community Lists.......................................................................................................

217

Filtering Routes with Community Lists.............................................................................................

219

Manipulating the COMMUNITY Attribute.........................................................................................

219

Changing MED Attributes..................................................................................................................

221

Changing the LOCAL_PREFERENCE Attribute.................................................................................

221

Changing the NEXT_HOP Attribute.................................................................................................

222

Changing the WEIGHT Attribute......................................................................................................

223

Enabling Multipath............................................................................................................................

223

Filtering BGP Routes Using Route Maps..........................................................................................

223

Filtering BGP Routes Using AS-PATH Information..........................................................................

224

Filtering BGP Routes.........................................................................................................................

225

Filtering BGP Routes Using Route Maps....................................................................................

226

Filtering BGP Routes Using AS-PATH Information....................................................................

227

Configuring BGP Route Reflectors..................................................................................................

228

Aggregating Routes..........................................................................................................................

228

Configuring BGP Confederations....................................................................................................

229

Enabling Route Flap Dampening.....................................................................................................

230

Changing BGP Timers.......................................................................................................................

232

Enabling BGP Neighbor Soft-Reconfiguration................................................................................

233

Route Map Continue........................................................................................................................

234

Match a Clause with a Continue Clause....................................................................................

234

Set a Clause with a Continue Clause.........................................................................................

235

Enabling MBGP Configurations........................................................................................................

235

BGP Regular Expression Optimization.............................................................................................

236

Debugging BGP................................................................................................................................

236

Storing Last and Bad PDUs.........................................................................................................

237

Capturing PDUs...........................................................................................................................

238

PDU Counters.............................................................................................................................

239

Sample Configurations.....................................................................................................................

239

11 Bare Metal Provisioning (BMP).....................................................................

249

Prerequisites......................................................................................................................................

249

Restrictions.......................................................................................................................................

249

Reconfiguring Jumpstart and Normal Modes.................................................................................

249

Jumpstart Mode................................................................................................................................

251

DHCP Server/Configuration........................................................................................................

251

MAC-Based IP Assignment.........................................................................................................

253

DHCP Retry Mechanism.............................................................................................................

253

File Server..........................................................................................................................................

254

Domain Name Server.......................................................................................................................

254

Switch Boot and Set-up Behavior in Jumpstart Mode....................................................................

255

12 Content Addressable Memory (CAM).........................................................

257

CAM Allocation..................................................................................................................................

257

Re-Allocating CAM for Ingress ACLs and QoS................................................................................

258

Re-Allocating CAM for Egress ACLs.................................................................................................

259

Testing CAM Usage for QoS Policies...............................................................................................

260

Displaying CAM-ACL Settings..........................................................................................................

260

Displaying CAM-ACL-Egress Settings..............................................................................................

261

CAM Optimization.............................................................................................................................

261

Troubleshoot CAM Profiling.......................................................................................................

262

13 Control Plane Policing (CoPP).....................................................................

263

Configure Control Plane Policing....................................................................................................

264

Configuring CoPP for Protocols......................................................................................................

265

Configuring CoPP for CPU Queues.................................................................................................

267

Show Commands.............................................................................................................................

268

14 Data Center Bridging (DCB).........................................................................

270

Ethernet Enhancements in Data Center Bridging...........................................................................

270

Priority-Based Flow Control........................................................................................................

271

Enhanced Transmission Selection..............................................................................................

272

Data Center Bridging Exchange Protocol (DCBx)......................................................................

273

Data Center Bridging in a Traffic Flow.......................................................................................

274

Enabling Data Center Bridging.........................................................................................................

274

QoS dot1p Traffic Classification and Queue Assignment...............................................................

275

DCB Maps and its Attributes.............................................................................................................

276

DCB Map: Configuration Procedure..........................................................................................

276

Important Points to Remember..................................................................................................

276

Applying a DCB Map on a Port...................................................................................................

277

Configuring PFC without a DCB Map.........................................................................................

277

Configuring Lossless Queues.....................................................................................................

278

Data Center Bridging: Default Configuration..................................................................................

279

Configuring PFC and ETS in a DCB Map.........................................................................................

280

PFC Configuration Notes...........................................................................................................

280

PFC Prerequisites and Restrictions.............................................................................................

281

ETS Configuration Notes............................................................................................................

281

ETS Prerequisites and Restrictions.............................................................................................

282

Configuring Priority-Based Flow Control........................................................................................

283

Configuring Lossless Queues.....................................................................................................

284

Configure Enhanced Transmission Selection.................................................................................

284

ETS Prerequisites and Restrictions.............................................................................................

285

Creating an ETS Priority Group..................................................................................................

285

ETS Operation with DCBx..........................................................................................................

286

Configuring Bandwidth Allocation for DCBx CIN......................................................................

287

Applying DCB Policies in a Switch Stack..........................................................................................

287

Configure a DCBx Operation...........................................................................................................

288

DCBx Operation..........................................................................................................................

288

DCBx Port Roles..........................................................................................................................

288

DCB Configuration Exchange....................................................................................................

290

Configuration Source Election...................................................................................................

290

Propagation of DCB Information................................................................................................

291

Auto-Detection and Manual Configuration of the DCBx Version.............................................

291

Behavior of Tagged Packets.......................................................................................................

292

Configuration Example for DSCP and PFC Priorities.................................................................

292

DCBx Example.............................................................................................................................

293

DCBx Prerequisites and Restrictions..........................................................................................

294

Configuring DCBx.......................................................................................................................

294

Verifying the DCB Configuration.....................................................................................................

298

Using PFC and ETS to Manage Data Center Traffic........................................................................

309

PFC and ETS Configuration Command Examples.....................................................................

311

Using PFC and ETS to Manage Converged Ethernet Traffic......................................................

311

Hierarchical Scheduling in ETS Output Policies.........................................................................

311

Priority-Based Flow Control Using Dynamic Buffer Method..........................................................

312

Pause and Resume of Traffic......................................................................................................

312

Buffer Sizes for Lossless or PFC Packets....................................................................................

313

Configuring the Dynamic Buffer Method.........................................................................................

313

Sample Configurations......................................................................................................................

315

......................................................................................................................................................

315

15 Dynamic Host Configuration Protocol (DHCP)........................................

319

DHCP Packet Format and Options...................................................................................................

319

Assign an IP Address using DHCP.....................................................................................................

321

Implementation Information............................................................................................................

322

Configuration Tasks..........................................................................................................................

322

Configure the System to be a DHCP Server....................................................................................

323

Configuration Tasks....................................................................................................................

323

Configuring the Server for Automatic Address Allocation

........................................................ 324

Specifying a Default Gateway.....................................................................................................

325

Enabling the DHCP Server..........................................................................................................

325

Configure a Method of Hostname Resolution..........................................................................

326

Creating Manual Binding Entries................................................................................................

326

Debugging the DHCP Server......................................................................................................

327

Using DHCP Clear Commands...................................................................................................

327

Configure the System to be a Relay Agent......................................................................................

327

Configure the System for User Port Stacking..................................................................................

329

Configure Secure DHCP...................................................................................................................

329

Option 82....................................................................................................................................

329

DHCP Snooping..........................................................................................................................

330

Drop DHCP Packets on Snooped VLANs Only..........................................................................

332

Dynamic ARP Inspection............................................................................................................

332

Source Address Validation..........................................................................................................

334

Viewing the Number of SAV Dropped Packets................................................................................

336

Clearing the Number of SAV Dropped Packets...............................................................................

336

16 Equal Cost Multi-Path (ECMP).....................................................................

338

ECMP for Flow-Based Affinity..........................................................................................................

338

Configuring the Hash Algorithm......................................................................................................

338

Enabling Deterministic ECMP Next Hop..........................................................................................

338

Configuring the Hash Algorithm Seed.............................................................................................

339

Link Bundle Monitoring....................................................................................................................

339

Managing ECMP Group Paths..........................................................................................................

340

Creating an ECMP Group Bundle....................................................................................................

340

Modifying the ECMP Group Threshold............................................................................................

341

17 Fabric Services................................................................................................

342

Configuring Switch Mode to Fabric Services...................................................................................

343

Name Server......................................................................................................................................

343

Link State Database..........................................................................................................................

344

Inter Switch Link (ISL)..................................................................................................................

345

Principal Switch Selection and Domain ID Assignment............................................................

345

Route Table.................................................................................................................................

345

Zoning...............................................................................................................................................

345

Creating Zone and Adding Members.........................................................................................

345

Creating Zone Alias and Adding Members................................................................................

346

Creating Zonesets.......................................................................................................................

346

Activating a Zoneset....................................................................................................................

347

Zone Merge (within ISL)..............................................................................................................

347

Configuring Fabric Parameters...................................................................................................

347

Displaying the Fabric Parameters...............................................................................................

348

18 FCoE Transit....................................................................................................

354

Fibre Channel over Ethernet............................................................................................................

354

Ensure Robustness in a Converged Ethernet Network...................................................................

354

FIP Snooping on Ethernet Bridges...................................................................................................

356

FIP Snooping in a Switch Stack........................................................................................................

359

Using FIP Snooping...........................................................................................................................

359

Enable the FCoE Transit Feature................................................................................................

359

FIP Snooping Prerequisites.........................................................................................................

360

Important Points to Remember.................................................................................................

360

Enabling the FCoE Transit Feature.............................................................................................

361

Enable FIP Snooping on VLANs..................................................................................................

361

Configure the FC-MAP Value.....................................................................................................

362

Configure a Port for a Bridge-to-Bridge Link............................................................................

362

Configure a Port for a Bridge-to-FCF Link................................................................................

362

Impact on Other Software Features...........................................................................................

362

FIP Snooping on an NPIV Proxy Gateway..................................................................................

363

FIP Snooping in an S5000 Stack.................................................................................................

363

Impact on Other Software Features...........................................................................................

363

FIP Snooping Restrictions...........................................................................................................

364

Configuring FIP Snooping..........................................................................................................

365

Displaying FIP Snooping Information........................................................................................

366

FCoE Transit Configuration Example...............................................................................................

372

19 Enabling FIPS Cryptography........................................................................

374

Configuration Tasks..........................................................................................................................

374

Preparing the System........................................................................................................................

374

Enabling FIPS Mode...........................................................................................................................

375

Generating Host-Keys.......................................................................................................................

375

Monitoring FIPS Mode Status...........................................................................................................

376

Disabling FIPS Mode.........................................................................................................................

376

20 Fibre Channel Interface................................................................................

378

Configure Fibre Channel Interfaces.................................................................................................

378

Enabling Fibre Channel Capability...................................................................................................

378

Configuring Fibre Channel Interfaces..............................................................................................

378

Displaying Fibre Channel Information.............................................................................................

379

Troubleshooting Fibre Channel Operation.....................................................................................

382

Configuring the Fibre Channel Port Group in Passthrough Ethernet Mode..................................

384

Displaying Fibre Channel Port Group Mode Information...............................................................

384

21 Force10 Resilient Ring Protocol (FRRP).....................................................

386

Protocol Overview............................................................................................................................

386

Ring Status...................................................................................................................................

388

Multiple FRRP Rings....................................................................................................................

389

Important FRRP Points................................................................................................................

390

Important FRRP Concepts..........................................................................................................

391

Implementing FRRP..........................................................................................................................

392

FRRP Configuration..........................................................................................................................

392

Creating the FRRP Group...........................................................................................................

393

Configuring the Control VLAN...................................................................................................

393

Configuring and Adding the Member VLANs............................................................................

394

Setting the FRRP Timers.............................................................................................................

395

Clearing the FRRP Counters.......................................................................................................

396

Viewing the FRRP Configuration................................................................................................

396

Viewing the FRRP Information...................................................................................................

396

Troubleshooting FRRP......................................................................................................................

396

Configuration Checks.................................................................................................................

396

Sample Configuration and Topology...............................................................................................

397

22 GARP VLAN Registration Protocol (GVRP)................................................

399

Important Points to Remember.......................................................................................................

399

Configure GVRP................................................................................................................................

399

Related Configuration Tasks......................................................................................................

400

Enabling GVRP Globally...................................................................................................................

400

Enabling GVRP on a Layer 2 Interface.............................................................................................

401

Configure GVRP Registration...........................................................................................................

401

Configure a GARP Timer..................................................................................................................

402

23 High Availability (HA).....................................................................................

403

High Availability on Stacks................................................................................................................

403

Hitless Behavior................................................................................................................................

403

Graceful Restart................................................................................................................................

404

Software Resiliency..........................................................................................................................

404

System Health Monitoring..........................................................................................................

404

Failure and Event Logging..........................................................................................................

404

Trace Log....................................................................................................................................

404

Core Dumps................................................................................................................................

404

System Log..................................................................................................................................

405

Hot-Lock Behavior...........................................................................................................................

405

Component Redundancy.................................................................................................................

405

Automatic and Manual Stack Unit Failover................................................................................

405

Synchronization between Management and Standby Units.....................................................

406

Forcing an Stack Unit Failover....................................................................................................

406

Specifying an Auto-Failover Limit..............................................................................................

407

Disabling Auto-Reboot...............................................................................................................

407

Manually Synchronizing Management and Standby Units........................................................

407

24 Internet Group Management Protocol (IGMP)........................................

408

IGMP Implementation Information.................................................................................................

408

IGMP Protocol Overview..................................................................................................................

408

IGMP Version 2...........................................................................................................................

408

Join a Multicast Group...............................................................................................................

409

Leaving a Multicast Group..........................................................................................................

409

IGMP Version 3............................................................................................................................

410

Configure IGMP.................................................................................................................................

413

Related Configuration Tasks.......................................................................................................

413

Viewing IGMP Enabled Interfaces....................................................................................................

414

Selecting an IGMP Version................................................................................................................

414

Viewing IGMP Groups.......................................................................................................................

415

Adjusting Timers................................................................................................................................

415

Adjusting Query and Response Timers......................................................................................

415

Enabling IGMP Immediate-Leave.....................................................................................................

416

IGMP Snooping.................................................................................................................................

416

IGMP Snooping Implementation Information...........................................................................

416

Configuring IGMP Snooping.......................................................................................................

417

Removing a Group-Port Association..........................................................................................

417

Enabling IGMP Immediate-Leave...............................................................................................

418

Disabling Multicast Flooding.......................................................................................................

418

Specifying a Port as Connected to a Multicast Router..............................................................

418

Configuring the Switch as Querier.............................................................................................

418

Fast Convergence after MSTP Topology Changes..........................................................................

419

Egress Interface Selection (EIS) for HTTP and IGMP Applications..................................................

419

Protocol Separation....................................................................................................................

420

Enabling and Disabling Management Egress Interface Selection.............................................

421

Handling of Management Route Configuration........................................................................

422

Handling of Switch-Initiated Traffic...........................................................................................

423

Handling of Switch-Destined Traffic..........................................................................................

424

Handling of Transit Traffic (Traffic Separation)..........................................................................

424

Mapping of Management Applications and Traffic Type..........................................................

425

Behavior of Various Applications for Switch-Initiated Traffic ..................................................

426

Behavior of Various Applications for Switch-Destined Traffic .................................................

427

Interworking of EIS With Various Applications..........................................................................

428

Designating a Multicast Router Interface........................................................................................

428

25 Interfaces.........................................................................................................

429

Basic Interface Configuration..........................................................................................................

429

Advanced Interface Configuration...................................................................................................

429

Interface Types.................................................................................................................................

430

View Basic Interface Information.....................................................................................................

430

Enabling a Physical Interface............................................................................................................

432

Physical Interfaces............................................................................................................................

432

Configuration Task List for Physical Interfaces..........................................................................

433

Overview of Layer Modes...........................................................................................................

433

Configuring Layer 2 (Data Link) Mode.......................................................................................

433

Configuring Layer 2 (Interface) Mode........................................................................................

434

Configuring Layer 3 (Network) Mode........................................................................................

434

Configuring Layer 3 (Interface) Mode........................................................................................

435

Egress Interface Selection (EIS)........................................................................................................

435

Important Points to Remember.................................................................................................

436

Configuring EIS...........................................................................................................................

436

Management Interfaces....................................................................................................................

436

Configuring Management Interfaces.........................................................................................

436

Configuring Management Interfaces on the S-Series...............................................................

437

VLAN Interfaces................................................................................................................................

438

Loopback Interfaces.........................................................................................................................

438

Null Interfaces...................................................................................................................................

439

Port Channel Interfaces....................................................................................................................

439

Port Channel Definition and Standards.....................................................................................

439

Port Channel Benefits.................................................................................................................

440

Port Channel Implementation...................................................................................................

440

10/100/1000 Mbps Interfaces in Port Channels.......................................................................

440

Configuration Tasks for Port Channel Interfaces......................................................................

441

Creating a Port Channel.............................................................................................................

441

Adding a Physical Interface to a Port Channel..........................................................................

442

Reassigning an Interface to a New Port Channel......................................................................

444

Configuring the Minimum Oper Up Links in a Port Channel....................................................

444

.....................................................................................................................................................

445

Assigning an IP Address to a Port Channel................................................................................

445

Deleting or Disabling a Port Channel........................................................................................

446

Load Balancing Through Port Channels....................................................................................

446

Load-Balancing Method.............................................................................................................

446

Changing the Hash Algorithm....................................................................................................

447

Bulk Configuration............................................................................................................................

448

Interface Range...........................................................................................................................

448

Bulk Configuration Examples.....................................................................................................

449

Defining Interface Range Macros....................................................................................................

450

Define the Interface Range........................................................................................................

450

Choosing an Interface-Range Macro.........................................................................................

451

Monitoring and Maintaining Interfaces............................................................................................

451

Maintenance Using TDR.............................................................................................................

452

Splitting QSFP Ports to SFP+ Ports..................................................................................................

453

Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................

453

Important Points to Remember.................................................................................................

454

Support for LM4 Optics..............................................................................................................

454

Example Scenarios......................................................................................................................

454

Link Dampening................................................................................................................................

458

Important Points to Remember.................................................................................................

459

Enabling Link Dampening...........................................................................................................

459

Link Bundle Monitoring....................................................................................................................

460

Using Ethernet Pause Frames for Flow Control..............................................................................

461

Enabling Pause Frames...............................................................................................................

462

Configure the MTU Size on an Interface.........................................................................................

462

Port-Pipes.........................................................................................................................................

463

Auto-Negotiation on Ethernet Interfaces........................................................................................

463

Setting the Speed and Duplex Mode of Ethernet Interfaces....................................................

464

Set Auto-Negotiation Options...................................................................................................

465

View Advanced Interface Information.............................................................................................

466

Configuring the Interface Sampling Size...................................................................................

467

Dynamic Counters............................................................................................................................

468

Clearing Interface Counters.......................................................................................................

469

Enhanced Validation of Interface Ranges.......................................................................................

469

26 Internet Protocol Security (IPSec)...............................................................

471

Configuring IPSec ............................................................................................................................

472

27 IPv4 Routing....................................................................................................

473

IP Addresses......................................................................................................................................

473

Implementation Information......................................................................................................

473

Configuration Tasks for IP Addresses..............................................................................................

473

Assigning IP Addresses to an Interface............................................................................................

474

Configuring Static Routes.................................................................................................................

475

Configure Static Routes for the Management Interface.................................................................

477

IPv4 Path MTU Discovery Overview.................................................................................................

477

Using the Configured Source IP Address in ICMP Messages..........................................................

478

Configuring the ICMP Source Interface.....................................................................................

478

Configuring the Duration to Establish a TCP Connection..............................................................

479

Enabling Directed Broadcast............................................................................................................

479

Resolution of Host Names...............................................................................................................

480

Enabling Dynamic Resolution of Host Names................................................................................

480

Specifying the Local System Domain and a List of Domains..........................................................

481

Configuring DNS with Traceroute....................................................................................................

481

ARP....................................................................................................................................................

482

Configuration Tasks for ARP............................................................................................................

482

Configuring Static ARP Entries.........................................................................................................

483

Enabling Proxy ARP..........................................................................................................................

483

Clearing ARP Cache..........................................................................................................................

483

ARP Learning via Gratuitous ARP.....................................................................................................

484

Enabling ARP Learning via Gratuitous ARP......................................................................................

484

ARP Learning via ARP Request.........................................................................................................

485

Configuring ARP Retries...................................................................................................................

485

ICMP..................................................................................................................................................

486

Configuration Tasks for ICMP..........................................................................................................

486

Enabling ICMP Unreachable Messages...........................................................................................

486

UDP Helper.......................................................................................................................................

487

Configure UDP Helper................................................................................................................

487

Important Points to Remember.................................................................................................

487

Enabling UDP Helper........................................................................................................................

487

Configuring a Broadcast Address....................................................................................................

488

Configurations Using UDP Helper...................................................................................................

488

UDP Helper with Broadcast-All Addresses......................................................................................

489

UDP Helper with Subnet Broadcast Addresses...............................................................................

489

UDP Helper with Configured Broadcast Addresses........................................................................

490

UDP Helper with No Configured Broadcast Addresses..................................................................

491

Troubleshooting UDP Helper...........................................................................................................

491

28 IPv6 Routing...................................................................................................

492

Protocol Overview............................................................................................................................

492

Extended Address Space............................................................................................................

492

Stateless Autoconfiguration.......................................................................................................

492

IPv6 Headers...............................................................................................................................

493

IPv6 Header Fields......................................................................................................................

493

Extension Header Fields.............................................................................................................

495

Addressing...................................................................................................................................

496

Implementing IPv6 with Dell Networking OS..................................................................................

497

ICMPv6........................................................................................................................................

497

Path MTU Discovery...................................................................................................................

498

IPv6 Neighbor Discovery............................................................................................................

498

Secure Shell (SSH) Over an IPv6 Transport................................................................................

499

Configuration Tasks for IPv6............................................................................................................

499

Adjusting Your CAM-Profile.......................................................................................................

500

Assigning an IPv6 Address to an Interface.................................................................................

500

Assigning a Static IPv6 Route......................................................................................................

501

Configuring Telnet with IPv6......................................................................................................

501

SNMP over IPv6...........................................................................................................................

502

Showing IPv6 Information..........................................................................................................

502

Showing an IPv6 Interface..........................................................................................................

503

Showing IPv6 Routes..................................................................................................................

503

Showing the Running-Configuration for an Interface..............................................................

505

Clearing IPv6 Routes...................................................................................................................

505

Configuring IPv6 RA Guard..............................................................................................................

505

Configuring IPv6 RA Guard on an Interface..............................................................................

507

Monitoring IPv6 RA Guard..........................................................................................................

508

29 iSCSI Optimization.........................................................................................

509

iSCSI Optimization Overview...........................................................................................................

509

Monitoring iSCSI Traffic Flows....................................................................................................

510

Application of Quality of Service to iSCSI Traffic Flows.............................................................

511

Information Monitored in iSCSI Traffic Flows.............................................................................

511

Detection and Auto-Configuration for Dell EqualLogic Arrays.................................................

512

Configuring Detection and Ports for Dell Compellent Arrays...................................................

512

Enable and Disable iSCSI Optimization......................................................................................

513

Default iSCSI Optimization Values....................................................................................................

513

iSCSI Optimization Prerequisites......................................................................................................

514

Configuring iSCSI Optimization........................................................................................................

514

Displaying iSCSI Optimization Information......................................................................................

516

30 Intermediate System to Intermediate System..........................................

518

IS-IS Protocol Overview....................................................................................................................

518

IS-IS Addressing................................................................................................................................

518

Multi-Topology IS-IS.........................................................................................................................

519

Transition Mode...........................................................................................................................

519

Interface Support........................................................................................................................

520

Adjacencies.................................................................................................................................

520

Graceful Restart................................................................................................................................

520

Timers..........................................................................................................................................

520

Implementation Information............................................................................................................

521

Configuration Information...............................................................................................................

522

Configuration Tasks for IS-IS......................................................................................................

522

Configuring the Distance of a Route..........................................................................................

531

Changing the IS-Type.................................................................................................................

531

IS-IS Metric Styles.............................................................................................................................

536

Configure Metric Values...................................................................................................................

536

Maximum Values in the Routing Table.......................................................................................

537

Change the IS-IS Metric Style in One Level Only......................................................................

537

Leaks from One Level to Another..............................................................................................

539

Sample Configurations.....................................................................................................................

539

31 Link Aggregation Control Protocol (LACP)...............................................

542

Introduction to Dynamic LAGs and LACP.......................................................................................

542

Important Points to Remember.................................................................................................

542

LACP Modes................................................................................................................................

543

Configuring LACP Commands...................................................................................................

543

LACP Configuration Tasks................................................................................................................

544

Creating a LAG............................................................................................................................

544

Configuring the LAG Interfaces as Dynamic.............................................................................

544

Setting the LACP Long Timeout.................................................................................................

545

Monitoring and Debugging LACP..............................................................................................

546

Shared LAG State Tracking...............................................................................................................

546

Configuring Shared LAG State Tracking.....................................................................................

547

Important Points about Shared LAG State Tracking..................................................................

548

LACP Basic Configuration Example.................................................................................................

549

Configure a LAG on ALPHA........................................................................................................

549

32 Layer 2..............................................................................................................

557

Manage the MAC Address Table.......................................................................................................

557

Clearing the MAC Address Table................................................................................................

557

Setting the Aging Time for Dynamic Entries..............................................................................

557

Configuring a Static MAC Address.............................................................................................

558

Displaying the MAC Address Table.............................................................................................

558

MAC Learning Limit...........................................................................................................................

558

mac learning-limit Dynamic.......................................................................................................

559

mac learning-limit mac-address-sticky.....................................................................................

559

mac learning-limit station-move...............................................................................................

559

Learning Limit Violation Actions.................................................................................................

559

Setting Station Move Violation Actions......................................................................................

560

Recovering from Learning Limit and Station Move Violations..................................................

560

NIC Teaming......................................................................................................................................

561

Configure Redundant Pairs..............................................................................................................

562

Important Points about Configuring Redundant Pairs..............................................................

564

Far-End Failure Detection................................................................................................................

565

FEFD State Changes....................................................................................................................

566

Configuring FEFD........................................................................................................................

567

Enabling FEFD on an Interface...................................................................................................

568

Debugging FEFD.........................................................................................................................

569

33 Link Layer Discovery Protocol (LLDP).........................................................

571

802.1AB (LLDP) Overview..................................................................................................................

571

Protocol Data Units.....................................................................................................................

571

Optional TLVs....................................................................................................................................

572

Management TLVs.......................................................................................................................

572

TIA-1057 (LLDP-MED) Overview................................................................................................

574

Configure LLDP.................................................................................................................................

579

Related Configuration Tasks.......................................................................................................

579

Important Points to Remember.................................................................................................

580

LLDP Compatibility.....................................................................................................................

580

CONFIGURATION versus INTERFACE Configurations..............................................................

580

Enabling LLDP..............................................................................................................................

581

Disabling and Undoing LLDP......................................................................................................

581

Enabling LLDP on Management Ports..............................................................................................

581

Disabling and Undoing LLDP on Management Ports................................................................

581

Advertising TLVs................................................................................................................................

582

Viewing the LLDP Configuration......................................................................................................

583

Viewing Information Advertised by Adjacent LLDP Agents............................................................

584

Configuring LLDPDU Intervals.........................................................................................................

585

Configuring Transmit and Receive Mode........................................................................................

585

Configuring a Time to Live...............................................................................................................

586

Debugging LLDP...............................................................................................................................

587

Relevant Management Objects........................................................................................................

588

34 Microsoft Network Load Balancing............................................................

594

NLB Unicast Mode Scenario.............................................................................................................

594

NLB Multicast Mode Scenario..........................................................................................................

595

Limitations With Enabling NLB on Switches....................................................................................

595

Benefits and Working of Microsoft Clustering.................................................................................

595

Enable and Disable VLAN Flooding .................................................................................................

596

Configuring a Switch for NLB ..........................................................................................................

596

.....................................................................................................................................................

596

35 Multicast Source Discovery Protocol (MSDP)...........................................

597

Protocol Overview............................................................................................................................

597

Anycast RP........................................................................................................................................

599

Implementation Information............................................................................................................

599

Configure Multicast Source Discovery Protocol.............................................................................

599

Related Configuration Tasks............................................................................................................

599

Enable MSDP.....................................................................................................................................

603

Manage the Source-Active Cache...................................................................................................

604

Viewing the Source-Active Cache.............................................................................................

604

Limiting the Source-Active Cache.............................................................................................

604

Clearing the Source-Active Cache............................................................................................

605

Enabling the Rejected Source-Active Cache............................................................................

605

Accept Source-Active Messages that Fail the RFP Check..............................................................

605

Specifying Source-Active Messages................................................................................................

609

Limiting the Source-Active Messages from a Peer..........................................................................

610

Preventing MSDP from Caching a Local Source.............................................................................

610

Preventing MSDP from Caching a Remote Source..........................................................................

611

Preventing MSDP from Advertising a Local Source.........................................................................

612

Logging Changes in Peership States................................................................................................

613

Terminating a Peership.....................................................................................................................

613

Clearing Peer Statistics......................................................................................................................

613

Debugging MSDP..............................................................................................................................

614

Configuring Anycast RP....................................................................................................................

614

Reducing Source-Active Message Flooding..............................................................................

615

Specifying the RP Address Used in SA Messages.......................................................................

615

MSDP Sample Configurations..........................................................................................................

618

36 Multiple Spanning Tree Protocol (MSTP)..................................................

622

Protocol Overview............................................................................................................................

622

Configure Multiple Spanning Tree Protocol....................................................................................

623

Related Configuration Tasks.......................................................................................................

623

Enable Multiple Spanning Tree Globally..........................................................................................

623

Adding and Removing Interfaces.....................................................................................................

624

Creating Multiple Spanning Tree Instances.....................................................................................

624

Influencing MSTP Root Selection.....................................................................................................

625

Interoperate with Non-Dell Networking OS Bridges......................................................................

626

Modifying Global Parameters...........................................................................................................

626

Modifying the Interface Parameters.................................................................................................

627

Configuring an EdgePort..................................................................................................................

628

Configuring Fast Hellos for Link State Detection............................................................................

629

Flush MAC Addresses after a Topology Change.............................................................................

630

MSTP Sample Configurations..........................................................................................................

630

Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-

 

ConfigurationSFTOS Example Running-Configuration.............................................................

631

Debugging and Verifying MSTP Configurations..............................................................................

633

37 Multicast Features..........................................................................................

636

Enabling IP Multicast........................................................................................................................

636

Implementation Information............................................................................................................

636

First Packet Forwarding for Lossless Multicast................................................................................

637

IPv4 Multicast Policies......................................................................................................................

637

Limiting the Number of Multicast Routes..................................................................................

637

Preventing a Host from Joining a Group...................................................................................

638

Preventing a PIM Router from Forming an Adjacency..............................................................

641

Preventing a Source from Registering with the RP....................................................................

641

Preventing a PIM Router from Processing a Join......................................................................

644

38 NPIV Proxy Gateway......................................................................................

645

Benefits of an NPIV Proxy Gateway.................................................................................................

645

NPIV Proxy Gateway Operation.......................................................................................................

645

NPIV Proxy Gateway: Protocol Services....................................................................................

647

NPIV Proxy Gateway Functionality.............................................................................................

647

NPIV Proxy Gateway: Terms and Definitions.............................................................................

647

DCB Maps....................................................................................................................................

649

FCoE Maps..................................................................................................................................

649

Configure an NPIV Proxy Gateway..................................................................................................

650

Enabling Fibre Channel Capability on the Switch.....................................................................

650

Creating a DCB Map...................................................................................................................

650

Applying a DCB Map on Server-Facing Ethernet Ports.............................................................

651

Creating an FCoE VLAN..............................................................................................................

652

FCoE Maps...................................................................................................................................

652

Applying an FCoE Map on Server-Facing Ethernet Ports..........................................................

653

Applying an FCoE Map on Fabric-Facing FC Ports...................................................................

654

Sample Configuration.................................................................................................................

654

Display NPIV Proxy Gateway Information.......................................................................................

656

39 Object Tracking..............................................................................................

662

Object Tracking Overview................................................................................................................

662

Track Layer 2 Interfaces..............................................................................................................

663

Track Layer 3 Interfaces..............................................................................................................

663

Track IPv4 and IPv6 Routes........................................................................................................

664

Set Tracking Delays.....................................................................................................................

665

VRRP Object Tracking.................................................................................................................

665

Object Tracking Configuration........................................................................................................

665

Tracking a Layer 2 Interface.......................................................................................................

665

Tracking a Layer 3 Interface.......................................................................................................

667

Track an IPv4/IPv6 Route...........................................................................................................

668

Displaying Tracked Objects..............................................................................................................

672

40 Open Shortest Path First (OSPFv2).............................................................

674

Protocol Overview............................................................................................................................

674

Autonomous System (AS) Areas.................................................................................................

674

Designated and Backup Designated Routers............................................................................

678

Link-State Advertisements (LSAs)...............................................................................................

678

Virtual Links.................................................................................................................................

679

Router Priority and Cost.............................................................................................................

680

Implementing OSPF with Dell Networking OS...............................................................................

680

Fast Convergence (OSPFv2, IPv4 Only)......................................................................................

681

Multi-Process OSPFv2 (IPv4 only)..............................................................................................

681

RFC-2328 Compliant OSPF Flooding........................................................................................

681

OSPF ACK Packing......................................................................................................................

682

OSPF Adjacency with Cisco Routers..........................................................................................

682

Configuration Information...............................................................................................................

683

Configuration Task List for OSPFv2 (OSPF for IPv4)..................................................................

683

Sample Configurations for OSPFv2...........................................................................................

698

41 Policy-based Routing (PBR)..........................................................................

701

Overview............................................................................................................................................

701

Implementing Policy-based Routing with Dell Networking OS.....................................................

703

Configuration Task List for Policy-based Routing...........................................................................

703

PBR Exceptions (Permit).............................................................................................................

706

Sample Configuration.......................................................................................................................

709

Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View

 

Redirect-List GOLD.....................................................................................................................

710

42 PIM Sparse-Mode (PIM-SM).........................................................................

714

Implementation Information............................................................................................................

714

Protocol Overview.............................................................................................................................

714

Requesting Multicast Traffic........................................................................................................

714

Refuse Multicast Traffic...............................................................................................................

715

Send Multicast Traffic..................................................................................................................

715

Configuring PIM-SM..........................................................................................................................

716

Configuring S,G Expiry Timers..........................................................................................................

717

Configuring a Static Rendezvous Point............................................................................................

718

Overriding Bootstrap Router Updates........................................................................................

718

Configuring a Designated Router.....................................................................................................

719

Creating Multicast Boundaries and Domains...................................................................................

719

43 PIM Source-Specific Mode (PIM-SSM).......................................................

721

Implementation Information.............................................................................................................

721

Important Points to Remember..................................................................................................

721

Configure PIM-SMM.........................................................................................................................

722

Related Configuration Tasks.......................................................................................................

722

Enabling PIM-SSM.............................................................................................................................

722

Use PIM-SSM with IGMP Version 2 Hosts........................................................................................

722

Configuring PIM-SSM with IGMPv2............................................................................................

723

44 Port Monitoring..............................................................................................

725

Important Points to Remember........................................................................................................

725

Port Monitoring.................................................................................................................................

726

Configuring Port Monitoring............................................................................................................

727

Enabling Flow-Based Monitoring.....................................................................................................

729

Remote Port Mirroring......................................................................................................................

730

Remote Port Mirroring Example.................................................................................................

730

Configuring Remote Port Mirroring............................................................................................

731

Displaying Remote-Port Mirroring Configurations....................................................................

733

Configuring the Sample Remote Port Mirroring........................................................................

733

Configuring the Encapsulated Remote Port Mirroring....................................................................

737

Changes to Default BehaviorConfiguration steps for ERPM ....................................................

737

ERPM Behavior on a typical Dell Networking OS ...........................................................................

739

Decapsulation of ERPM packets at the Destination IP/ Analyzer..............................................

739

45 Private VLANs (PVLAN)..................................................................................

741

Private VLAN Concepts.....................................................................................................................

741

Using the Private VLAN Commands.................................................................................................

742

Configuration Task List.....................................................................................................................

743

Creating PVLAN Ports.................................................................................................................

743

Creating a Primary VLAN............................................................................................................

744

Creating a Community VLAN.....................................................................................................

745

Creating an Isolated VLAN..........................................................................................................

746

Private VLAN Configuration Example...............................................................................................

747

Inspecting the Private VLAN Configuration...............................................................................

748

46 Per-VLAN Spanning Tree Plus (PVST+).......................................................

751

Protocol Overview.............................................................................................................................

751

Implementation Information............................................................................................................

752

Configure Per-VLAN Spanning Tree Plus.........................................................................................

752

Related Configuration Tasks.......................................................................................................

752

Enabling PVST+.................................................................................................................................

752

Disabling PVST+................................................................................................................................

753

Influencing PVST+ Root Selection.............................................................................................

753

Modifying Global PVST+ Parameters...............................................................................................

755

Modifying Interface PVST+ Parameters...........................................................................................

756

Configuring an EdgePort..................................................................................................................

757

PVST+ in Multi-Vendor Networks....................................................................................................

758

Enabling PVST+ Extend System ID...................................................................................................

758

PVST+ Sample Configurations.........................................................................................................

759

47 Quality of Service (QoS)................................................................................

761

Implementation Information............................................................................................................

763

Port-Based QoS Configurations.......................................................................................................

763

Setting dot1p Priorities for Incoming Traffic..............................................................................

764

Honoring dot1p Priorities on Ingress Traffic..............................................................................

764

Configuring Port-Based Rate Policing.......................................................................................

765

Configuring Port-Based Rate Shaping.......................................................................................

765

Policy-Based QoS Configurations...................................................................................................

766

Classify Traffic.............................................................................................................................

766

Create a QoS Policy....................................................................................................................

770

Create Policy Maps......................................................................................................................

772

DSCP Color Maps..............................................................................................................................

776

Creating a DSCP Color Map.......................................................................................................

776

Displaying DSCP Color Maps......................................................................................................

777

Displaying a DSCP Color Policy Configuration .........................................................................

777

Enabling QoS Rate Adjustment........................................................................................................

778

Enabling Strict-Priority Queueing....................................................................................................

778

Weighted Random Early Detection..................................................................................................

779

Creating WRED Profiles..............................................................................................................

780

Applying a WRED Profile to Traffic.............................................................................................

780

Displaying Default and Configured WRED Profiles...................................................................

780

Displaying WRED Drop Statistics................................................................................................

780

Pre-Calculating Available QoS CAM Space.....................................................................................

780

Configuring Weights and ECN for WRED .......................................................................................

782

Global Service Pools With WRED and ECN Settings..................................................................

782

Configuring WRED and ECN Attributes...........................................................................................

784

Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................

785

Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class..........

785

Classifying Incoming Packets Using ECN and Color-Marking..................................................

786

Sample configuration to mark non-ecn packets as “yellow” with single traffic class.............

788

Applying Layer 2 Match Criteria on a Layer 3 Interface..................................................................

789

Applying DSCP and VLAN Match Criteria on a Service Queue.......................................................

790

Classifying Incoming Packets Using ECN and Color-Marking........................................................

791

Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................

793

Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class................

794

Sample configuration to mark non-ecn packets as “yellow” with single traffic class...................

794

48 Routing Information Protocol (RIP)...........................................................

796

Protocol Overview............................................................................................................................

796

RIPv1............................................................................................................................................

796

RIPv2............................................................................................................................................

796

Implementation Information............................................................................................................

797

Configuration Information................................................................................................................

797

Configuration Task List...............................................................................................................

797

RIP Configuration Example..............................................................................................................

803

RIP Configuration on Core2.......................................................................................................

803

Core 2 RIP Output......................................................................................................................

804

RIP Configuration on Core3.......................................................................................................

805

Core 3 RIP Output......................................................................................................................

805

RIP Configuration Summary.......................................................................................................

807

49 Remote Monitoring (RMON).......................................................................

809

Implementation Information...........................................................................................................

809

Fault Recovery..................................................................................................................................

809

Setting the rmon Alarm...............................................................................................................

810

Configuring an RMON Event.......................................................................................................

811

Configuring RMON Collection Statistics....................................................................................

811

Configuring the RMON Collection History................................................................................

812

50 Rapid Spanning Tree Protocol (RSTP)........................................................

813

Protocol Overview............................................................................................................................

813

Configuring Rapid Spanning Tree....................................................................................................

813

Related Configuration Tasks.......................................................................................................

813

Important Points to Remember..................................................................................................

813

RSTP and VLT..............................................................................................................................

814

Configuring Interfaces for Layer 2 Mode.........................................................................................

814

Enabling Rapid Spanning Tree Protocol Globally............................................................................

816

Adding and Removing Interfaces...............................................................................................

818

Modifying Global Parameters.....................................................................................................

819

Modifying Interface Parameters.................................................................................................

820

Configuring an EdgePort............................................................................................................

820

Influencing RSTP Root Selection................................................................................................

821

Enabling SNMP Traps for Root Elections and Topology Changes...........................................

822

51 Software-Defined Networking (SDN).........................................................

823

52 Security............................................................................................................

824

AAA Accounting................................................................................................................................

824

Configuration Task List for AAA Accounting.............................................................................

824

AAA Authentication...........................................................................................................................

826

Configuration Task List for AAA Authentication........................................................................

827

Obscuring Passwords and Keys.......................................................................................................

829

AAA Authorization.............................................................................................................................

830

Privilege Levels Overview...........................................................................................................

830

Configuration Task List for Privilege Levels...............................................................................

830

RADIUS..............................................................................................................................................

834

RADIUS Authentication and Authorization................................................................................

835

Configuration Task List for RADIUS...........................................................................................

836

TACACS+..........................................................................................................................................

839

Configuration Task List for TACACS+........................................................................................

839

Command Authorization............................................................................................................

841

Protection from TCP Tiny and Overlapping Fragment Attacks......................................................

842

Enabling SCP and SSH......................................................................................................................

842

Using SCP with SSH to Copy a Software Image........................................................................

843

Secure Shell Authentication.......................................................................................................

844

Enabling SSH Authentication by Password................................................................................

844

Using RSA Authentication of SSH...............................................................................................

845

Configuring Host-Based SSH Authentication............................................................................

845

Using Client-Based SSH Authentication....................................................................................

846

Troubleshooting SSH..................................................................................................................

847

Telnet.................................................................................................................................................

847

VTY Line and Access-Class Configuration......................................................................................

847

VTY Line Local Authentication and Authorization.....................................................................

848

VTY Line Remote Authentication and Authorization................................................................

848

VTY MAC-SA Filter Support........................................................................................................

849

53 Service Provider Bridging.............................................................................

850

VLAN Stacking...................................................................................................................................

850

Important Points to Remember..................................................................................................

851

Configure VLAN Stacking.................................................................................................................

852

Related Configuration Tasks.......................................................................................................

852

Creating Access and Trunk Ports...............................................................................................

852

Enable VLAN-Stacking for a VLAN.............................................................................................

853

Configuring the Protocol Type Value for the Outer VLAN Tag................................................

853

Dell Networking OS Options for Trunk Ports............................................................................

853

Debugging VLAN Stacking..........................................................................................................

854

VLAN Stacking in Multi-Vendor Networks.................................................................................

855

VLAN Stacking Packet Drop Precedence........................................................................................

859

Enabling Drop Eligibility..............................................................................................................

859

Honoring the Incoming DEI Value.............................................................................................

860

Marking Egress Packets with a DEI Value..................................................................................

860

Dynamic Mode CoS for VLAN Stacking...........................................................................................

861

Mapping C-Tag to S-Tag dot1p Values.....................................................................................

862

Layer 2 Protocol Tunneling..............................................................................................................

863

Implementation Information......................................................................................................

865

Enabling Layer 2 Protocol Tunneling.........................................................................................

865

Specifying a Destination MAC Address for BPDUs....................................................................

866

Setting Rate-Limit BPDUs...........................................................................................................

866

Debugging Layer 2 Protocol Tunneling.....................................................................................

867

Provider Backbone Bridging.............................................................................................................

867

54 sFlow................................................................................................................

868

Overview...........................................................................................................................................

868

Implementation Information............................................................................................................

869

Important Points to Remember.................................................................................................

869

Enabling and Disabling sFlow...........................................................................................................

870

Enabling and Disabling sFlow on an Interface................................................................................

870

Enabling sFlow Max-Header Size Extended....................................................................................

870

sFlow Show Commands...................................................................................................................

871

Displaying Show sFlow Global....................................................................................................

872

Displaying Show sFlow on an Interface.....................................................................................

872

Displaying Show sFlow on a Stack-unit.....................................................................................

873

Configuring Specify Collectors........................................................................................................

873

Changing the Polling Intervals.........................................................................................................

873

Back-Off Mechanism........................................................................................................................

873

sFlow on LAG ports...........................................................................................................................

874

55 Simple Network Management Protocol (SNMP)......................................

875

Protocol Overview............................................................................................................................

875

Implementation Information............................................................................................................

875

Configuration Task List for SNMP....................................................................................................

875

Related Configuration Tasks.......................................................................................................

876

Important Points to Remember.................................................................................................

876

Set up SNMP......................................................................................................................................

876

Creating a Community...............................................................................................................

876

Setting Up User-Based Security (SNMPv3).................................................................................

877

Reading Managed Object Values.....................................................................................................

878

Writing Managed Object Values.......................................................................................................

879

Configuring Contact and Location Information using SNMP.........................................................

879

Subscribing to Managed Object Value Updates using SNMP.........................................................

880

Enabling a Subset of SNMP Traps....................................................................................................

881

Copy Configuration Files Using SNMP............................................................................................

883

Copying a Configuration File.....................................................................................................

885

Copying Configuration Files via SNMP......................................................................................

886

Copying the Startup-Config Files to the Running-Config........................................................

886

Copying the Startup-Config Files to the Server via FTP............................................................

887

Copying the Startup-Config Files to the Server via TFTP..........................................................

887

Copy a Binary File to the Startup-Configuration.......................................................................

888

Additional MIB Objects to View Copy Statistics........................................................................

888

Obtaining a Value for MIB Objects..................................................................................................

889

MIB Support to Display the Available Memory Size on Flash.........................................................

890

Viewing the Available Flash Memory Size..................................................................................

890

MIB Support to Display the Software Core Files Generated by the System..................................

890

Viewing the Software Core Files Generated by the System......................................................

891

Manage VLANs using SNMP.............................................................................................................

891

Creating a VLAN..........................................................................................................................

891

Assigning a VLAN Alias................................................................................................................

892

Displaying the Ports in a VLAN...................................................................................................

892

Add Tagged and Untagged Ports to a VLAN..............................................................................

893

Managing Overload on Startup........................................................................................................

894

Enabling and Disabling a Port using SNMP......................................................................................

895

Fetch Dynamic MAC Entries using SNMP........................................................................................

896

Deriving Interface Indices.................................................................................................................

897

Monitor Port-Channels....................................................................................................................

898

Troubleshooting SNMP Operation..................................................................................................

899

56 Stacking...........................................................................................................

900

Stacking S5000 Switches.................................................................................................................

900

Stack Management Roles...........................................................................................................

901

Stack Master Election.................................................................................................................

902

Virtual IP......................................................................................................................................

903

Failover Roles..............................................................................................................................

903

MAC Addressing..........................................................................................................................

903

Stacking LAG...............................................................................................................................

903

High Availability on S5000 Stacks..............................................................................................

903

Management Access on S-Series Stacks...................................................................................

904

S-Series Stacking Installation Tasks...........................................................................................

905

Stack Unit and Stack Group Numbering....................................................................................

910

Supported Stacking Topologies..................................................................................................

911

Configuring an S5000 Switch Stack.................................................................................................

912

Stack and Cable Requirements...................................................................................................

912

Cables for Stacked Switches.......................................................................................................

913

Accessing the Stack CLI..............................................................................................................

914

Assigning a Priority to Stacked Switches....................................................................................

914

Renumbering a Stack Unit..........................................................................................................

914

Configuring Stacking Ports and Bringing Up a Stack.......................................................................

915

Provisioning a Stack Unit..................................................................................................................

920

Loading...
+ 1096 hidden pages