Dell 9.7(0.0) Configuration Guide for the S5000 Switch
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2015 - 02
Rev. A00
Contents |
|
1 About this Guide.................................................................................................. |
37 |
Audience.............................................................................................................................................. |
37 |
Conventions........................................................................................................................................ |
37 |
Related Documents............................................................................................................................. |
37 |
2 Configuration Fundamentals........................................................................... |
38 |
Accessing the Command Line............................................................................................................ |
38 |
CLI Modes............................................................................................................................................ |
38 |
Navigating CLI Modes................................................................................................................... |
40 |
Port Numbering Convention.............................................................................................................. |
42 |
The do Command............................................................................................................................... |
42 |
The no Command............................................................................................................................... |
43 |
Obtaining Help.................................................................................................................................... |
44 |
Entering and Editing Commands....................................................................................................... |
44 |
Command History............................................................................................................................... |
45 |
Filtering show Command Outputs..................................................................................................... |
45 |
Multiple Users in Configuration Mode............................................................................................... |
47 |
3 Getting Started................................................................................................... |
48 |
Accessing Ports................................................................................................................................... |
48 |
Accessing the RJ-45/RS-232 Console Port....................................................................................... |
48 |
Pin Assignments.................................................................................................................................. |
49 |
Accessing the CLI Interface and Running Scripts Using SSH............................................................ |
49 |
Entering CLI commands Using an SSH Connection................................................................... |
49 |
Executing Local CLI Scripts Using an SSH Connection............................................................... |
49 |
Default Configuration......................................................................................................................... |
50 |
Accessing the USB-B Console Port................................................................................................... |
50 |
Booting Process................................................................................................................................... |
51 |
Enter the Initial Configuration Information........................................................................................ |
53 |
Configuring the Enable Password...................................................................................................... |
53 |
Configuring a Host Name................................................................................................................... |
54 |
Navigating CLI Modes......................................................................................................................... |
54 |
Default Configuration......................................................................................................................... |
54 |
Configuring Layer 2 (Data Link) Mode................................................................................................ |
54 |
Accessing the System Remotely......................................................................................................... |
55 |
Configure the Management Port IP Address..................................................................................... |
55 |
Configure a Management Route........................................................................................................ |
55 |
Configuring a Username and Password............................................................................................. |
56 |
Creating a Port-based VLAN............................................................................................................... |
56 |
Assigning Interfaces to a VLAN........................................................................................................... |
56 |
Assigning an IP Address to a VLAN..................................................................................................... |
57 |
Connect the S5000 to the Network................................................................................................... |
57 |
Configure File Management............................................................................................................... |
57 |
Copying Files to and from the System............................................................................................... |
58 |
Important Points to Remember.................................................................................................... |
58 |
Mounting an NFS File System............................................................................................................. |
59 |
Important Points to Remember.................................................................................................... |
59 |
Saving the Running-Configuration.................................................................................................... |
60 |
Viewing Files........................................................................................................................................ |
61 |
View Configuration Files..................................................................................................................... |
62 |
Compressing Configuration Files....................................................................................................... |
63 |
Managing the File System................................................................................................................... |
66 |
Enabling Software Features on Devices Using a Command Option................................................ |
67 |
View Command History...................................................................................................................... |
67 |
Upgrading and Downgrading Dell Networking OS........................................................................... |
68 |
Using Hashes to Validate Software Images....................................................................................... |
68 |
Using HTTP for File Transfers............................................................................................................. |
69 |
4 Switch Management.......................................................................................... |
70 |
Configuring Privilege Levels............................................................................................................... |
70 |
Creating a Custom Privilege Level................................................................................................ |
70 |
Removing a Command from EXEC Mode......................................................................................... |
70 |
Moving a Command from EXEC Privilege Mode to EXEC Mode...................................................... |
70 |
Allowing Access to CONFIGURATION Mode Commands................................................................. |
71 |
Allowing Access to the Following Modes........................................................................................... |
71 |
Applying a Privilege Level to a Username.......................................................................................... |
73 |
Applying a Privilege Level to a Terminal Line..................................................................................... |
73 |
Configuring Logging........................................................................................................................... |
73 |
Log Messages in the Internal Buffer................................................................................................... |
74 |
Configuration Task List for System Log Management................................................................. |
74 |
Disabling System Logging............................................................................................................. |
74 |
Sending System Messages to a Syslog Server.............................................................................. |
74 |
Configuring a UNIX System as a Syslog Server.................................................................................. |
75 |
Changing System Logging Settings.................................................................................................... |
75 |
Display the Logging Buffer and the Logging Configuration.............................................................. |
76 |
Configuring a UNIX Logging Facility Level......................................................................................... |
77 |
Synchronizing Log Messages.............................................................................................................. |
78 |
Enabling Timestamp on Syslog Messages.......................................................................................... |
78 |
File Transfer Services........................................................................................................................... |
79 |
Configuration Task List for File Transfer Services........................................................................ |
79 |
Enabling the FTP Server................................................................................................................ |
79 |
Configuring FTP Server Parameters.............................................................................................. |
79 |
Configuring FTP Client Parameters.............................................................................................. |
80 |
Terminal Lines...................................................................................................................................... |
81 |
Denying and Permitting Access to a Terminal Line..................................................................... |
81 |
Configuring Login Authentication for Terminal Lines....................................................................... |
81 |
Setting Time Out of EXEC Privilege Mode......................................................................................... |
82 |
Using Telnet to get to Another Network Device............................................................................... |
83 |
Lock CONFIGURATION Mode............................................................................................................ |
84 |
Viewing the Configuration Lock Status........................................................................................ |
84 |
View the Configuration Lock Status................................................................................................... |
85 |
Recovering from a Forgotten Password............................................................................................ |
85 |
Recovering from a Forgotten Enable Password................................................................................ |
86 |
Recovering from a Failed Start........................................................................................................... |
86 |
5 802.1ag................................................................................................................. |
88 |
Ethernet CFM...................................................................................................................................... |
88 |
Maintenance Domains........................................................................................................................ |
89 |
Maintenance Points............................................................................................................................ |
89 |
Maintenance End Points..................................................................................................................... |
90 |
Implementation Information............................................................................................................... |
91 |
Configuring the CFM........................................................................................................................... |
91 |
Related Configuration Tasks......................................................................................................... |
91 |
Enabling Ethernet CFM........................................................................................................................ |
91 |
Creating a Maintenance Domain........................................................................................................ |
91 |
Creating a Maintenance Association.................................................................................................. |
92 |
Create Maintenance Points................................................................................................................ |
92 |
Creating a Maintenance End Point............................................................................................... |
92 |
Creating a Maintenance Intermediate Point................................................................................ |
93 |
Displaying the MP Databases........................................................................................................ |
94 |
Setting the MP Database Persistence........................................................................................... |
94 |
Continuity Check Messages............................................................................................................... |
95 |
Enabling CCM................................................................................................................................ |
96 |
Enabling Cross-Checking............................................................................................................. |
96 |
Sending Loopback Messages and Responses................................................................................... |
96 |
Sending Linktrace Messages and Responses..................................................................................... |
97 |
Caching Link Trace........................................................................................................................ |
97 |
Enabling CFM SNMP Traps................................................................................................................. |
98 |
Displaying Ethernet CFM Statistics................................................................................................... |
100 |
6 802.1X................................................................................................................. |
101 |
The Port-Authentication Process..................................................................................................... |
102 |
EAP over RADIUS.............................................................................................................................. |
104 |
RADIUS Attributes for 802.1 Support.......................................................................................... |
104 |
Configuring 802.1X........................................................................................................................... |
104 |
Related Configuration Tasks....................................................................................................... |
104 |
Important Points to Remember.................................................................................................. |
105 |
Enabling 802.1X................................................................................................................................. |
105 |
Configuring Request Identity Re-Transmissions............................................................................. |
107 |
Configuring a Quiet Period after a Failed Authentication............................................................... |
107 |
Forcibly Authorizing or Unauthorizing a Port.................................................................................. |
108 |
Re-Authenticating a Port.................................................................................................................. |
109 |
Configuring Timeouts....................................................................................................................... |
110 |
Configuring Dynamic VLAN Assignment with Port Authentication................................................. |
111 |
Guest and Authentication-Fail VLANs............................................................................................... |
112 |
Configuring a Guest VLAN........................................................................................................... |
113 |
Configuring an Authentication-Fail VLAN.................................................................................. |
113 |
7 Access Control List (ACL) VLAN Groups and Content Addressable |
|
Memory (CAM)...................................................................................................... |
115 |
Optimizing CAM Utilization During the Attachment of ACLs to VLANs.......................................... |
115 |
Guidelines for Configuring ACL VLAN groups................................................................................. |
116 |
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters......................... |
117 |
Configuring ACL VLAN Groups................................................................................................... |
117 |
Configuring FP Blocks for VLAN Parameters.............................................................................. |
118 |
Viewing CAM Usage.......................................................................................................................... |
119 |
Allocating FP Blocks for VLAN Processes........................................................................................ |
120 |
8 Access Control Lists (ACLs)............................................................................. |
122 |
IP Access Control Lists (ACLs).......................................................................................................... |
122 |
CAM Allocation and CAM Optimization........................................................................................... |
123 |
User Configurable CAM Allocation............................................................................................. |
123 |
CAM Optimization....................................................................................................................... |
124 |
Test CAM Usage.......................................................................................................................... |
124 |
View CAM-ACL Settings.............................................................................................................. |
124 |
View CAM Usage......................................................................................................................... |
126 |
QoS CAM Region Limitation....................................................................................................... |
126 |
Implementing ACLs on Dell Networking OS.................................................................................... |
127 |
ACLs and VLANs........................................................................................................................... |
127 |
ACL Optimization........................................................................................................................ |
127 |
Determine the Order in which ACLs are Used to Classify Traffic.............................................. |
127 |
IP Fragment Handling....................................................................................................................... |
128 |
IP Fragments ACL Examples....................................................................................................... |
129 |
Layer 4 ACL Rules Examples....................................................................................................... |
129 |
Configure a Standard IP ACL............................................................................................................ |
130 |
Configuring a Standard IP ACL Filter........................................................................................... |
131 |
Configure an Extended IP ACL......................................................................................................... |
132 |
Configuring Filters with a Sequence Number............................................................................ |
132 |
Configuring Filters Without a Sequence Number...................................................................... |
133 |
Established Flag................................................................................................................................. |
134 |
Configure Layer 2 and Layer 3 ACLs................................................................................................ |
134 |
Assign an IP ACL to an Interface....................................................................................................... |
135 |
Applying an IP ACL...................................................................................................................... |
135 |
Counting ACL Hits....................................................................................................................... |
136 |
Configure Ingress ACLs..................................................................................................................... |
136 |
Configure Egress ACLs...................................................................................................................... |
137 |
Applying Egress Layer 3 ACLs (Control-Plane)........................................................................... |
137 |
Configure ACLs to Loopback........................................................................................................... |
138 |
Applying an ACL on Loopback Interfaces........................................................................................ |
138 |
IP Prefix Lists...................................................................................................................................... |
139 |
Implementation Information...................................................................................................... |
140 |
Configuration Task List for Prefix Lists....................................................................................... |
140 |
Creating a Prefix List......................................................................................................................... |
140 |
Creating a Prefix List Without a Sequence Number................................................................... |
141 |
Viewing Prefix Lists...................................................................................................................... |
142 |
Applying a Prefix List for Route Redistribution........................................................................... |
143 |
Applying a Filter to a Prefix List (OSPF)....................................................................................... |
143 |
ACL Resequencing............................................................................................................................ |
144 |
Resequencing an ACL or Prefix List............................................................................................ |
145 |
Route Maps........................................................................................................................................ |
146 |
Implementation Information...................................................................................................... |
146 |
Important Points to Remember.................................................................................................. |
146 |
Configuration Task List for Route Maps..................................................................................... |
147 |
Creating a Route Map.................................................................................................................. |
147 |
Configure Route Map Filters....................................................................................................... |
148 |
Configuring Match Routes.......................................................................................................... |
149 |
Configuring Set Conditions......................................................................................................... |
151 |
Configure a Route Map for Route Redistribution...................................................................... |
152 |
Configure a Route Map for Route Tagging................................................................................ |
152 |
Continue Clause.......................................................................................................................... |
153 |
9 Bidirectional Forwarding Detection (BFD)................................................... |
154 |
How BFD Works................................................................................................................................ |
154 |
BFD Packet Format............................................................................................................................ |
155 |
BFD Sessions..................................................................................................................................... |
156 |
BFD Three-Way Handshake.............................................................................................................. |
157 |
Session State Changes...................................................................................................................... |
158 |
Important Points to Remember.................................................................................................. |
159 |
Configure BFD................................................................................................................................... |
159 |
Configure BFD for Physical Ports............................................................................................... |
160 |
Configure BFD for Static Routes................................................................................................. |
163 |
Configure BFD for OSPF............................................................................................................. |
165 |
Configure BFD for IS-IS............................................................................................................... |
168 |
Configure BFD for BGP................................................................................................................ |
171 |
Configuring Protocol Liveness.................................................................................................... |
178 |
Troubleshooting BFD........................................................................................................................ |
178 |
10 Border Gateway Protocol IPv4 (BGPv4).................................................... |
180 |
Autonomous Systems (AS)................................................................................................................ |
180 |
Sessions and Peers............................................................................................................................ |
182 |
Establish a Session....................................................................................................................... |
183 |
Route Reflectors................................................................................................................................ |
184 |
Communities..................................................................................................................................... |
185 |
BGP Attributes................................................................................................................................... |
185 |
Best Path Selection Criteria......................................................................................................... |
185 |
Weight................................................................................................................................................ |
187 |
Local Preference............................................................................................................................... |
187 |
Multi-Exit Discriminators (MEDs)................................................................................................ |
188 |
Origin................................................................................................................................................. |
189 |
AS Path.............................................................................................................................................. |
190 |
Next Hop........................................................................................................................................... |
190 |
Multiprotocol BGP............................................................................................................................ |
190 |
Implement BGP with Dell Networking OS....................................................................................... |
191 |
Additional Path (Add-Path) Support............................................................................................ |
191 |
Advertise IGP Cost as MED for Redistributed Routes................................................................. |
191 |
Ignore Router-ID for Some Best-Path Calculations.................................................................. |
192 |
Four-Byte AS Numbers............................................................................................................... |
192 |
AS4 Number Representation...................................................................................................... |
193 |
AS Number Migration........................................................................................................................ |
194 |
BGP4 Management Information Base (MIB).................................................................................... |
196 |
Important Points to Remember.................................................................................................. |
196 |
Configuration Information................................................................................................................ |
197 |
BGP Configuration...................................................................................................................... |
197 |
Enabling BGP..................................................................................................................................... |
198 |
Configuring AS4 Number Representations..................................................................................... |
202 |
Configuring Peer Groups................................................................................................................. |
203 |
Configuring BGP Fast Fall-Over....................................................................................................... |
206 |
Configuring Passive Peering............................................................................................................ |
208 |
Maintaining Existing AS Numbers During an AS Migration |
............................................................. 209 |
Allowing an AS Number to Appear in its Own AS Path................................................................... |
210 |
Enabling Graceful Restart.................................................................................................................. |
211 |
Enabling Neighbor Graceful Restart................................................................................................. |
212 |
Filtering on an AS-Path Attribute...................................................................................................... |
212 |
Regular Expressions as Filters..................................................................................................... |
214 |
Filtering BGP Routes Using AS-PATH Information.......................................................................... |
215 |
Redistributing Routes........................................................................................................................ |
216 |
Enabling Additional Paths.................................................................................................................. |
217 |
Configuring IP Community Lists....................................................................................................... |
217 |
Filtering Routes with Community Lists............................................................................................. |
219 |
Manipulating the COMMUNITY Attribute......................................................................................... |
219 |
Changing MED Attributes.................................................................................................................. |
221 |
Changing the LOCAL_PREFERENCE Attribute................................................................................. |
221 |
Changing the NEXT_HOP Attribute................................................................................................. |
222 |
Changing the WEIGHT Attribute...................................................................................................... |
223 |
Enabling Multipath............................................................................................................................ |
223 |
Filtering BGP Routes Using Route Maps.......................................................................................... |
223 |
Filtering BGP Routes Using AS-PATH Information.......................................................................... |
224 |
Filtering BGP Routes......................................................................................................................... |
225 |
Filtering BGP Routes Using Route Maps.................................................................................... |
226 |
Filtering BGP Routes Using AS-PATH Information.................................................................... |
227 |
Configuring BGP Route Reflectors.................................................................................................. |
228 |
Aggregating Routes.......................................................................................................................... |
228 |
Configuring BGP Confederations.................................................................................................... |
229 |
Enabling Route Flap Dampening..................................................................................................... |
230 |
Changing BGP Timers....................................................................................................................... |
232 |
Enabling BGP Neighbor Soft-Reconfiguration................................................................................ |
233 |
Route Map Continue........................................................................................................................ |
234 |
Match a Clause with a Continue Clause.................................................................................... |
234 |
Set a Clause with a Continue Clause......................................................................................... |
235 |
Enabling MBGP Configurations........................................................................................................ |
235 |
BGP Regular Expression Optimization............................................................................................. |
236 |
Debugging BGP................................................................................................................................ |
236 |
Storing Last and Bad PDUs......................................................................................................... |
237 |
Capturing PDUs........................................................................................................................... |
238 |
PDU Counters............................................................................................................................. |
239 |
Sample Configurations..................................................................................................................... |
239 |
11 Bare Metal Provisioning (BMP)..................................................................... |
249 |
Prerequisites...................................................................................................................................... |
249 |
Restrictions....................................................................................................................................... |
249 |
Reconfiguring Jumpstart and Normal Modes................................................................................. |
249 |
Jumpstart Mode................................................................................................................................ |
251 |
DHCP Server/Configuration........................................................................................................ |
251 |
MAC-Based IP Assignment......................................................................................................... |
253 |
DHCP Retry Mechanism............................................................................................................. |
253 |
File Server.......................................................................................................................................... |
254 |
Domain Name Server....................................................................................................................... |
254 |
Switch Boot and Set-up Behavior in Jumpstart Mode.................................................................... |
255 |
12 Content Addressable Memory (CAM)......................................................... |
257 |
CAM Allocation.................................................................................................................................. |
257 |
Re-Allocating CAM for Ingress ACLs and QoS................................................................................ |
258 |
Re-Allocating CAM for Egress ACLs................................................................................................. |
259 |
Testing CAM Usage for QoS Policies............................................................................................... |
260 |
Displaying CAM-ACL Settings.......................................................................................................... |
260 |
Displaying CAM-ACL-Egress Settings.............................................................................................. |
261 |
CAM Optimization............................................................................................................................. |
261 |
Troubleshoot CAM Profiling....................................................................................................... |
262 |
13 Control Plane Policing (CoPP)..................................................................... |
263 |
Configure Control Plane Policing.................................................................................................... |
264 |
Configuring CoPP for Protocols...................................................................................................... |
265 |
Configuring CoPP for CPU Queues................................................................................................. |
267 |
Show Commands............................................................................................................................. |
268 |
14 Data Center Bridging (DCB)......................................................................... |
270 |
Ethernet Enhancements in Data Center Bridging........................................................................... |
270 |
Priority-Based Flow Control........................................................................................................ |
271 |
Enhanced Transmission Selection.............................................................................................. |
272 |
Data Center Bridging Exchange Protocol (DCBx)...................................................................... |
273 |
Data Center Bridging in a Traffic Flow....................................................................................... |
274 |
Enabling Data Center Bridging......................................................................................................... |
274 |
QoS dot1p Traffic Classification and Queue Assignment............................................................... |
275 |
DCB Maps and its Attributes............................................................................................................. |
276 |
DCB Map: Configuration Procedure.......................................................................................... |
276 |
Important Points to Remember.................................................................................................. |
276 |
Applying a DCB Map on a Port................................................................................................... |
277 |
Configuring PFC without a DCB Map......................................................................................... |
277 |
Configuring Lossless Queues..................................................................................................... |
278 |
Data Center Bridging: Default Configuration.................................................................................. |
279 |
Configuring PFC and ETS in a DCB Map......................................................................................... |
280 |
PFC Configuration Notes........................................................................................................... |
280 |
PFC Prerequisites and Restrictions............................................................................................. |
281 |
ETS Configuration Notes............................................................................................................ |
281 |
ETS Prerequisites and Restrictions............................................................................................. |
282 |
Configuring Priority-Based Flow Control........................................................................................ |
283 |
Configuring Lossless Queues..................................................................................................... |
284 |
Configure Enhanced Transmission Selection................................................................................. |
284 |
ETS Prerequisites and Restrictions............................................................................................. |
285 |
Creating an ETS Priority Group.................................................................................................. |
285 |
ETS Operation with DCBx.......................................................................................................... |
286 |
Configuring Bandwidth Allocation for DCBx CIN...................................................................... |
287 |
Applying DCB Policies in a Switch Stack.......................................................................................... |
287 |
Configure a DCBx Operation........................................................................................................... |
288 |
DCBx Operation.......................................................................................................................... |
288 |
DCBx Port Roles.......................................................................................................................... |
288 |
DCB Configuration Exchange.................................................................................................... |
290 |
Configuration Source Election................................................................................................... |
290 |
Propagation of DCB Information................................................................................................ |
291 |
Auto-Detection and Manual Configuration of the DCBx Version............................................. |
291 |
Behavior of Tagged Packets....................................................................................................... |
292 |
Configuration Example for DSCP and PFC Priorities................................................................. |
292 |
DCBx Example............................................................................................................................. |
293 |
DCBx Prerequisites and Restrictions.......................................................................................... |
294 |
Configuring DCBx....................................................................................................................... |
294 |
Verifying the DCB Configuration..................................................................................................... |
298 |
Using PFC and ETS to Manage Data Center Traffic........................................................................ |
309 |
PFC and ETS Configuration Command Examples..................................................................... |
311 |
Using PFC and ETS to Manage Converged Ethernet Traffic...................................................... |
311 |
Hierarchical Scheduling in ETS Output Policies......................................................................... |
311 |
Priority-Based Flow Control Using Dynamic Buffer Method.......................................................... |
312 |
Pause and Resume of Traffic...................................................................................................... |
312 |
Buffer Sizes for Lossless or PFC Packets.................................................................................... |
313 |
Configuring the Dynamic Buffer Method......................................................................................... |
313 |
Sample Configurations...................................................................................................................... |
315 |
...................................................................................................................................................... |
315 |
15 Dynamic Host Configuration Protocol (DHCP)........................................ |
319 |
DHCP Packet Format and Options................................................................................................... |
319 |
Assign an IP Address using DHCP..................................................................................................... |
321 |
Implementation Information............................................................................................................ |
322 |
Configuration Tasks.......................................................................................................................... |
322 |
Configure the System to be a DHCP Server.................................................................................... |
323 |
Configuration Tasks.................................................................................................................... |
323 |
Configuring the Server for Automatic Address Allocation |
........................................................ 324 |
Specifying a Default Gateway..................................................................................................... |
325 |
Enabling the DHCP Server.......................................................................................................... |
325 |
Configure a Method of Hostname Resolution.......................................................................... |
326 |
Creating Manual Binding Entries................................................................................................ |
326 |
Debugging the DHCP Server...................................................................................................... |
327 |
Using DHCP Clear Commands................................................................................................... |
327 |
Configure the System to be a Relay Agent...................................................................................... |
327 |
Configure the System for User Port Stacking.................................................................................. |
329 |
Configure Secure DHCP................................................................................................................... |
329 |
Option 82.................................................................................................................................... |
329 |
DHCP Snooping.......................................................................................................................... |
330 |
Drop DHCP Packets on Snooped VLANs Only.......................................................................... |
332 |
Dynamic ARP Inspection............................................................................................................ |
332 |
Source Address Validation.......................................................................................................... |
334 |
Viewing the Number of SAV Dropped Packets................................................................................ |
336 |
Clearing the Number of SAV Dropped Packets............................................................................... |
336 |
16 Equal Cost Multi-Path (ECMP)..................................................................... |
338 |
ECMP for Flow-Based Affinity.......................................................................................................... |
338 |
Configuring the Hash Algorithm...................................................................................................... |
338 |
Enabling Deterministic ECMP Next Hop.......................................................................................... |
338 |
Configuring the Hash Algorithm Seed............................................................................................. |
339 |
Link Bundle Monitoring.................................................................................................................... |
339 |
Managing ECMP Group Paths.......................................................................................................... |
340 |
Creating an ECMP Group Bundle.................................................................................................... |
340 |
Modifying the ECMP Group Threshold............................................................................................ |
341 |
17 Fabric Services................................................................................................ |
342 |
Configuring Switch Mode to Fabric Services................................................................................... |
343 |
Name Server...................................................................................................................................... |
343 |
Link State Database.......................................................................................................................... |
344 |
Inter Switch Link (ISL).................................................................................................................. |
345 |
Principal Switch Selection and Domain ID Assignment............................................................ |
345 |
Route Table................................................................................................................................. |
345 |
Zoning............................................................................................................................................... |
345 |
Creating Zone and Adding Members......................................................................................... |
345 |
Creating Zone Alias and Adding Members................................................................................ |
346 |
Creating Zonesets....................................................................................................................... |
346 |
Activating a Zoneset.................................................................................................................... |
347 |
Zone Merge (within ISL).............................................................................................................. |
347 |
Configuring Fabric Parameters................................................................................................... |
347 |
Displaying the Fabric Parameters............................................................................................... |
348 |
18 FCoE Transit.................................................................................................... |
354 |
Fibre Channel over Ethernet............................................................................................................ |
354 |
Ensure Robustness in a Converged Ethernet Network................................................................... |
354 |
FIP Snooping on Ethernet Bridges................................................................................................... |
356 |
FIP Snooping in a Switch Stack........................................................................................................ |
359 |
Using FIP Snooping........................................................................................................................... |
359 |
Enable the FCoE Transit Feature................................................................................................ |
359 |
FIP Snooping Prerequisites......................................................................................................... |
360 |
Important Points to Remember................................................................................................. |
360 |
Enabling the FCoE Transit Feature............................................................................................. |
361 |
Enable FIP Snooping on VLANs.................................................................................................. |
361 |
Configure the FC-MAP Value..................................................................................................... |
362 |
Configure a Port for a Bridge-to-Bridge Link............................................................................ |
362 |
Configure a Port for a Bridge-to-FCF Link................................................................................ |
362 |
Impact on Other Software Features........................................................................................... |
362 |
FIP Snooping on an NPIV Proxy Gateway.................................................................................. |
363 |
FIP Snooping in an S5000 Stack................................................................................................. |
363 |
Impact on Other Software Features........................................................................................... |
363 |
FIP Snooping Restrictions........................................................................................................... |
364 |
Configuring FIP Snooping.......................................................................................................... |
365 |
Displaying FIP Snooping Information........................................................................................ |
366 |
FCoE Transit Configuration Example............................................................................................... |
372 |
19 Enabling FIPS Cryptography........................................................................ |
374 |
Configuration Tasks.......................................................................................................................... |
374 |
Preparing the System........................................................................................................................ |
374 |
Enabling FIPS Mode........................................................................................................................... |
375 |
Generating Host-Keys....................................................................................................................... |
375 |
Monitoring FIPS Mode Status........................................................................................................... |
376 |
Disabling FIPS Mode......................................................................................................................... |
376 |
20 Fibre Channel Interface................................................................................ |
378 |
Configure Fibre Channel Interfaces................................................................................................. |
378 |
Enabling Fibre Channel Capability................................................................................................... |
378 |
Configuring Fibre Channel Interfaces.............................................................................................. |
378 |
Displaying Fibre Channel Information............................................................................................. |
379 |
Troubleshooting Fibre Channel Operation..................................................................................... |
382 |
Configuring the Fibre Channel Port Group in Passthrough Ethernet Mode.................................. |
384 |
Displaying Fibre Channel Port Group Mode Information............................................................... |
384 |
21 Force10 Resilient Ring Protocol (FRRP)..................................................... |
386 |
Protocol Overview............................................................................................................................ |
386 |
Ring Status................................................................................................................................... |
388 |
Multiple FRRP Rings.................................................................................................................... |
389 |
Important FRRP Points................................................................................................................ |
390 |
Important FRRP Concepts.......................................................................................................... |
391 |
Implementing FRRP.......................................................................................................................... |
392 |
FRRP Configuration.......................................................................................................................... |
392 |
Creating the FRRP Group........................................................................................................... |
393 |
Configuring the Control VLAN................................................................................................... |
393 |
Configuring and Adding the Member VLANs............................................................................ |
394 |
Setting the FRRP Timers............................................................................................................. |
395 |
Clearing the FRRP Counters....................................................................................................... |
396 |
Viewing the FRRP Configuration................................................................................................ |
396 |
Viewing the FRRP Information................................................................................................... |
396 |
Troubleshooting FRRP...................................................................................................................... |
396 |
Configuration Checks................................................................................................................. |
396 |
Sample Configuration and Topology............................................................................................... |
397 |
22 GARP VLAN Registration Protocol (GVRP)................................................ |
399 |
Important Points to Remember....................................................................................................... |
399 |
Configure GVRP................................................................................................................................ |
399 |
Related Configuration Tasks...................................................................................................... |
400 |
Enabling GVRP Globally................................................................................................................... |
400 |
Enabling GVRP on a Layer 2 Interface............................................................................................. |
401 |
Configure GVRP Registration........................................................................................................... |
401 |
Configure a GARP Timer.................................................................................................................. |
402 |
23 High Availability (HA)..................................................................................... |
403 |
High Availability on Stacks................................................................................................................ |
403 |
Hitless Behavior................................................................................................................................ |
403 |
Graceful Restart................................................................................................................................ |
404 |
Software Resiliency.......................................................................................................................... |
404 |
System Health Monitoring.......................................................................................................... |
404 |
Failure and Event Logging.......................................................................................................... |
404 |
Trace Log.................................................................................................................................... |
404 |
Core Dumps................................................................................................................................ |
404 |
System Log.................................................................................................................................. |
405 |
Hot-Lock Behavior........................................................................................................................... |
405 |
Component Redundancy................................................................................................................. |
405 |
Automatic and Manual Stack Unit Failover................................................................................ |
405 |
Synchronization between Management and Standby Units..................................................... |
406 |
Forcing an Stack Unit Failover.................................................................................................... |
406 |
Specifying an Auto-Failover Limit.............................................................................................. |
407 |
Disabling Auto-Reboot............................................................................................................... |
407 |
Manually Synchronizing Management and Standby Units........................................................ |
407 |
24 Internet Group Management Protocol (IGMP)........................................ |
408 |
IGMP Implementation Information................................................................................................. |
408 |
IGMP Protocol Overview.................................................................................................................. |
408 |
IGMP Version 2........................................................................................................................... |
408 |
Join a Multicast Group............................................................................................................... |
409 |
Leaving a Multicast Group.......................................................................................................... |
409 |
IGMP Version 3............................................................................................................................ |
410 |
Configure IGMP................................................................................................................................. |
413 |
Related Configuration Tasks....................................................................................................... |
413 |
Viewing IGMP Enabled Interfaces.................................................................................................... |
414 |
Selecting an IGMP Version................................................................................................................ |
414 |
Viewing IGMP Groups....................................................................................................................... |
415 |
Adjusting Timers................................................................................................................................ |
415 |
Adjusting Query and Response Timers...................................................................................... |
415 |
Enabling IGMP Immediate-Leave..................................................................................................... |
416 |
IGMP Snooping................................................................................................................................. |
416 |
IGMP Snooping Implementation Information........................................................................... |
416 |
Configuring IGMP Snooping....................................................................................................... |
417 |
Removing a Group-Port Association.......................................................................................... |
417 |
Enabling IGMP Immediate-Leave............................................................................................... |
418 |
Disabling Multicast Flooding....................................................................................................... |
418 |
Specifying a Port as Connected to a Multicast Router.............................................................. |
418 |
Configuring the Switch as Querier............................................................................................. |
418 |
Fast Convergence after MSTP Topology Changes.......................................................................... |
419 |
Egress Interface Selection (EIS) for HTTP and IGMP Applications.................................................. |
419 |
Protocol Separation.................................................................................................................... |
420 |
Enabling and Disabling Management Egress Interface Selection............................................. |
421 |
Handling of Management Route Configuration........................................................................ |
422 |
Handling of Switch-Initiated Traffic........................................................................................... |
423 |
Handling of Switch-Destined Traffic.......................................................................................... |
424 |
Handling of Transit Traffic (Traffic Separation).......................................................................... |
424 |
Mapping of Management Applications and Traffic Type.......................................................... |
425 |
Behavior of Various Applications for Switch-Initiated Traffic .................................................. |
426 |
Behavior of Various Applications for Switch-Destined Traffic ................................................. |
427 |
Interworking of EIS With Various Applications.......................................................................... |
428 |
Designating a Multicast Router Interface........................................................................................ |
428 |
25 Interfaces......................................................................................................... |
429 |
Basic Interface Configuration.......................................................................................................... |
429 |
Advanced Interface Configuration................................................................................................... |
429 |
Interface Types................................................................................................................................. |
430 |
View Basic Interface Information..................................................................................................... |
430 |
Enabling a Physical Interface............................................................................................................ |
432 |
Physical Interfaces............................................................................................................................ |
432 |
Configuration Task List for Physical Interfaces.......................................................................... |
433 |
Overview of Layer Modes........................................................................................................... |
433 |
Configuring Layer 2 (Data Link) Mode....................................................................................... |
433 |
Configuring Layer 2 (Interface) Mode........................................................................................ |
434 |
Configuring Layer 3 (Network) Mode........................................................................................ |
434 |
Configuring Layer 3 (Interface) Mode........................................................................................ |
435 |
Egress Interface Selection (EIS)........................................................................................................ |
435 |
Important Points to Remember................................................................................................. |
436 |
Configuring EIS........................................................................................................................... |
436 |
Management Interfaces.................................................................................................................... |
436 |
Configuring Management Interfaces......................................................................................... |
436 |
Configuring Management Interfaces on the S-Series............................................................... |
437 |
VLAN Interfaces................................................................................................................................ |
438 |
Loopback Interfaces......................................................................................................................... |
438 |
Null Interfaces................................................................................................................................... |
439 |
Port Channel Interfaces.................................................................................................................... |
439 |
Port Channel Definition and Standards..................................................................................... |
439 |
Port Channel Benefits................................................................................................................. |
440 |
Port Channel Implementation................................................................................................... |
440 |
10/100/1000 Mbps Interfaces in Port Channels....................................................................... |
440 |
Configuration Tasks for Port Channel Interfaces...................................................................... |
441 |
Creating a Port Channel............................................................................................................. |
441 |
Adding a Physical Interface to a Port Channel.......................................................................... |
442 |
Reassigning an Interface to a New Port Channel...................................................................... |
444 |
Configuring the Minimum Oper Up Links in a Port Channel.................................................... |
444 |
..................................................................................................................................................... |
445 |
Assigning an IP Address to a Port Channel................................................................................ |
445 |
Deleting or Disabling a Port Channel........................................................................................ |
446 |
Load Balancing Through Port Channels.................................................................................... |
446 |
Load-Balancing Method............................................................................................................. |
446 |
Changing the Hash Algorithm.................................................................................................... |
447 |
Bulk Configuration............................................................................................................................ |
448 |
Interface Range........................................................................................................................... |
448 |
Bulk Configuration Examples..................................................................................................... |
449 |
Defining Interface Range Macros.................................................................................................... |
450 |
Define the Interface Range........................................................................................................ |
450 |
Choosing an Interface-Range Macro......................................................................................... |
451 |
Monitoring and Maintaining Interfaces............................................................................................ |
451 |
Maintenance Using TDR............................................................................................................. |
452 |
Splitting QSFP Ports to SFP+ Ports.................................................................................................. |
453 |
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................ |
453 |
Important Points to Remember................................................................................................. |
454 |
Support for LM4 Optics.............................................................................................................. |
454 |
Example Scenarios...................................................................................................................... |
454 |
Link Dampening................................................................................................................................ |
458 |
Important Points to Remember................................................................................................. |
459 |
Enabling Link Dampening........................................................................................................... |
459 |
Link Bundle Monitoring.................................................................................................................... |
460 |
Using Ethernet Pause Frames for Flow Control.............................................................................. |
461 |
Enabling Pause Frames............................................................................................................... |
462 |
Configure the MTU Size on an Interface......................................................................................... |
462 |
Port-Pipes......................................................................................................................................... |
463 |
Auto-Negotiation on Ethernet Interfaces........................................................................................ |
463 |
Setting the Speed and Duplex Mode of Ethernet Interfaces.................................................... |
464 |
Set Auto-Negotiation Options................................................................................................... |
465 |
View Advanced Interface Information............................................................................................. |
466 |
Configuring the Interface Sampling Size................................................................................... |
467 |
Dynamic Counters............................................................................................................................ |
468 |
Clearing Interface Counters....................................................................................................... |
469 |
Enhanced Validation of Interface Ranges....................................................................................... |
469 |
26 Internet Protocol Security (IPSec)............................................................... |
471 |
Configuring IPSec ............................................................................................................................ |
472 |
27 IPv4 Routing.................................................................................................... |
473 |
IP Addresses...................................................................................................................................... |
473 |
Implementation Information...................................................................................................... |
473 |
Configuration Tasks for IP Addresses.............................................................................................. |
473 |
Assigning IP Addresses to an Interface............................................................................................ |
474 |
Configuring Static Routes................................................................................................................. |
475 |
Configure Static Routes for the Management Interface................................................................. |
477 |
IPv4 Path MTU Discovery Overview................................................................................................. |
477 |
Using the Configured Source IP Address in ICMP Messages.......................................................... |
478 |
Configuring the ICMP Source Interface..................................................................................... |
478 |
Configuring the Duration to Establish a TCP Connection.............................................................. |
479 |
Enabling Directed Broadcast............................................................................................................ |
479 |
Resolution of Host Names............................................................................................................... |
480 |
Enabling Dynamic Resolution of Host Names................................................................................ |
480 |
Specifying the Local System Domain and a List of Domains.......................................................... |
481 |
Configuring DNS with Traceroute.................................................................................................... |
481 |
ARP.................................................................................................................................................... |
482 |
Configuration Tasks for ARP............................................................................................................ |
482 |
Configuring Static ARP Entries......................................................................................................... |
483 |
Enabling Proxy ARP.......................................................................................................................... |
483 |
Clearing ARP Cache.......................................................................................................................... |
483 |
ARP Learning via Gratuitous ARP..................................................................................................... |
484 |
Enabling ARP Learning via Gratuitous ARP...................................................................................... |
484 |
ARP Learning via ARP Request......................................................................................................... |
485 |
Configuring ARP Retries................................................................................................................... |
485 |
ICMP.................................................................................................................................................. |
486 |
Configuration Tasks for ICMP.......................................................................................................... |
486 |
Enabling ICMP Unreachable Messages........................................................................................... |
486 |
UDP Helper....................................................................................................................................... |
487 |
Configure UDP Helper................................................................................................................ |
487 |
Important Points to Remember................................................................................................. |
487 |
Enabling UDP Helper........................................................................................................................ |
487 |
Configuring a Broadcast Address.................................................................................................... |
488 |
Configurations Using UDP Helper................................................................................................... |
488 |
UDP Helper with Broadcast-All Addresses...................................................................................... |
489 |
UDP Helper with Subnet Broadcast Addresses............................................................................... |
489 |
UDP Helper with Configured Broadcast Addresses........................................................................ |
490 |
UDP Helper with No Configured Broadcast Addresses.................................................................. |
491 |
Troubleshooting UDP Helper........................................................................................................... |
491 |
28 IPv6 Routing................................................................................................... |
492 |
Protocol Overview............................................................................................................................ |
492 |
Extended Address Space............................................................................................................ |
492 |
Stateless Autoconfiguration....................................................................................................... |
492 |
IPv6 Headers............................................................................................................................... |
493 |
IPv6 Header Fields...................................................................................................................... |
493 |
Extension Header Fields............................................................................................................. |
495 |
Addressing................................................................................................................................... |
496 |
Implementing IPv6 with Dell Networking OS.................................................................................. |
497 |
ICMPv6........................................................................................................................................ |
497 |
Path MTU Discovery................................................................................................................... |
498 |
IPv6 Neighbor Discovery............................................................................................................ |
498 |
Secure Shell (SSH) Over an IPv6 Transport................................................................................ |
499 |
Configuration Tasks for IPv6............................................................................................................ |
499 |
Adjusting Your CAM-Profile....................................................................................................... |
500 |
Assigning an IPv6 Address to an Interface................................................................................. |
500 |
Assigning a Static IPv6 Route...................................................................................................... |
501 |
Configuring Telnet with IPv6...................................................................................................... |
501 |
SNMP over IPv6........................................................................................................................... |
502 |
Showing IPv6 Information.......................................................................................................... |
502 |
Showing an IPv6 Interface.......................................................................................................... |
503 |
Showing IPv6 Routes.................................................................................................................. |
503 |
Showing the Running-Configuration for an Interface.............................................................. |
505 |
Clearing IPv6 Routes................................................................................................................... |
505 |
Configuring IPv6 RA Guard.............................................................................................................. |
505 |
Configuring IPv6 RA Guard on an Interface.............................................................................. |
507 |
Monitoring IPv6 RA Guard.......................................................................................................... |
508 |
29 iSCSI Optimization......................................................................................... |
509 |
iSCSI Optimization Overview........................................................................................................... |
509 |
Monitoring iSCSI Traffic Flows.................................................................................................... |
510 |
Application of Quality of Service to iSCSI Traffic Flows............................................................. |
511 |
Information Monitored in iSCSI Traffic Flows............................................................................. |
511 |
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................. |
512 |
Configuring Detection and Ports for Dell Compellent Arrays................................................... |
512 |
Enable and Disable iSCSI Optimization...................................................................................... |
513 |
Default iSCSI Optimization Values.................................................................................................... |
513 |
iSCSI Optimization Prerequisites...................................................................................................... |
514 |
Configuring iSCSI Optimization........................................................................................................ |
514 |
Displaying iSCSI Optimization Information...................................................................................... |
516 |
30 Intermediate System to Intermediate System.......................................... |
518 |
IS-IS Protocol Overview.................................................................................................................... |
518 |
IS-IS Addressing................................................................................................................................ |
518 |
Multi-Topology IS-IS......................................................................................................................... |
519 |
Transition Mode........................................................................................................................... |
519 |
Interface Support........................................................................................................................ |
520 |
Adjacencies................................................................................................................................. |
520 |
Graceful Restart................................................................................................................................ |
520 |
Timers.......................................................................................................................................... |
520 |
Implementation Information............................................................................................................ |
521 |
Configuration Information............................................................................................................... |
522 |
Configuration Tasks for IS-IS...................................................................................................... |
522 |
Configuring the Distance of a Route.......................................................................................... |
531 |
Changing the IS-Type................................................................................................................. |
531 |
IS-IS Metric Styles............................................................................................................................. |
536 |
Configure Metric Values................................................................................................................... |
536 |
Maximum Values in the Routing Table....................................................................................... |
537 |
Change the IS-IS Metric Style in One Level Only...................................................................... |
537 |
Leaks from One Level to Another.............................................................................................. |
539 |
Sample Configurations..................................................................................................................... |
539 |
31 Link Aggregation Control Protocol (LACP)............................................... |
542 |
Introduction to Dynamic LAGs and LACP....................................................................................... |
542 |
Important Points to Remember................................................................................................. |
542 |
LACP Modes................................................................................................................................ |
543 |
Configuring LACP Commands................................................................................................... |
543 |
LACP Configuration Tasks................................................................................................................ |
544 |
Creating a LAG............................................................................................................................ |
544 |
Configuring the LAG Interfaces as Dynamic............................................................................. |
544 |
Setting the LACP Long Timeout................................................................................................. |
545 |
Monitoring and Debugging LACP.............................................................................................. |
546 |
Shared LAG State Tracking............................................................................................................... |
546 |
Configuring Shared LAG State Tracking..................................................................................... |
547 |
Important Points about Shared LAG State Tracking.................................................................. |
548 |
LACP Basic Configuration Example................................................................................................. |
549 |
Configure a LAG on ALPHA........................................................................................................ |
549 |
32 Layer 2.............................................................................................................. |
557 |
Manage the MAC Address Table....................................................................................................... |
557 |
Clearing the MAC Address Table................................................................................................ |
557 |
Setting the Aging Time for Dynamic Entries.............................................................................. |
557 |
Configuring a Static MAC Address............................................................................................. |
558 |
Displaying the MAC Address Table............................................................................................. |
558 |
MAC Learning Limit........................................................................................................................... |
558 |
mac learning-limit Dynamic....................................................................................................... |
559 |
mac learning-limit mac-address-sticky..................................................................................... |
559 |
mac learning-limit station-move............................................................................................... |
559 |
Learning Limit Violation Actions................................................................................................. |
559 |
Setting Station Move Violation Actions...................................................................................... |
560 |
Recovering from Learning Limit and Station Move Violations.................................................. |
560 |
NIC Teaming...................................................................................................................................... |
561 |
Configure Redundant Pairs.............................................................................................................. |
562 |
Important Points about Configuring Redundant Pairs.............................................................. |
564 |
Far-End Failure Detection................................................................................................................ |
565 |
FEFD State Changes.................................................................................................................... |
566 |
Configuring FEFD........................................................................................................................ |
567 |
Enabling FEFD on an Interface................................................................................................... |
568 |
Debugging FEFD......................................................................................................................... |
569 |
33 Link Layer Discovery Protocol (LLDP)......................................................... |
571 |
802.1AB (LLDP) Overview.................................................................................................................. |
571 |
Protocol Data Units..................................................................................................................... |
571 |
Optional TLVs.................................................................................................................................... |
572 |
Management TLVs....................................................................................................................... |
572 |
TIA-1057 (LLDP-MED) Overview................................................................................................ |
574 |
Configure LLDP................................................................................................................................. |
579 |
Related Configuration Tasks....................................................................................................... |
579 |
Important Points to Remember................................................................................................. |
580 |
LLDP Compatibility..................................................................................................................... |
580 |
CONFIGURATION versus INTERFACE Configurations.............................................................. |
580 |
Enabling LLDP.............................................................................................................................. |
581 |
Disabling and Undoing LLDP...................................................................................................... |
581 |
Enabling LLDP on Management Ports.............................................................................................. |
581 |
Disabling and Undoing LLDP on Management Ports................................................................ |
581 |
Advertising TLVs................................................................................................................................ |
582 |
Viewing the LLDP Configuration...................................................................................................... |
583 |
Viewing Information Advertised by Adjacent LLDP Agents............................................................ |
584 |
Configuring LLDPDU Intervals......................................................................................................... |
585 |
Configuring Transmit and Receive Mode........................................................................................ |
585 |
Configuring a Time to Live............................................................................................................... |
586 |
Debugging LLDP............................................................................................................................... |
587 |
Relevant Management Objects........................................................................................................ |
588 |
34 Microsoft Network Load Balancing............................................................ |
594 |
NLB Unicast Mode Scenario............................................................................................................. |
594 |
NLB Multicast Mode Scenario.......................................................................................................... |
595 |
Limitations With Enabling NLB on Switches.................................................................................... |
595 |
Benefits and Working of Microsoft Clustering................................................................................. |
595 |
Enable and Disable VLAN Flooding ................................................................................................. |
596 |
Configuring a Switch for NLB .......................................................................................................... |
596 |
..................................................................................................................................................... |
596 |
35 Multicast Source Discovery Protocol (MSDP)........................................... |
597 |
Protocol Overview............................................................................................................................ |
597 |
Anycast RP........................................................................................................................................ |
599 |
Implementation Information............................................................................................................ |
599 |
Configure Multicast Source Discovery Protocol............................................................................. |
599 |
Related Configuration Tasks............................................................................................................ |
599 |
Enable MSDP..................................................................................................................................... |
603 |
Manage the Source-Active Cache................................................................................................... |
604 |
Viewing the Source-Active Cache............................................................................................. |
604 |
Limiting the Source-Active Cache............................................................................................. |
604 |
Clearing the Source-Active Cache............................................................................................ |
605 |
Enabling the Rejected Source-Active Cache............................................................................ |
605 |
Accept Source-Active Messages that Fail the RFP Check.............................................................. |
605 |
Specifying Source-Active Messages................................................................................................ |
609 |
Limiting the Source-Active Messages from a Peer.......................................................................... |
610 |
Preventing MSDP from Caching a Local Source............................................................................. |
610 |
Preventing MSDP from Caching a Remote Source.......................................................................... |
611 |
Preventing MSDP from Advertising a Local Source......................................................................... |
612 |
Logging Changes in Peership States................................................................................................ |
613 |
Terminating a Peership..................................................................................................................... |
613 |
Clearing Peer Statistics...................................................................................................................... |
613 |
Debugging MSDP.............................................................................................................................. |
614 |
Configuring Anycast RP.................................................................................................................... |
614 |
Reducing Source-Active Message Flooding.............................................................................. |
615 |
Specifying the RP Address Used in SA Messages....................................................................... |
615 |
MSDP Sample Configurations.......................................................................................................... |
618 |
36 Multiple Spanning Tree Protocol (MSTP).................................................. |
622 |
Protocol Overview............................................................................................................................ |
622 |
Configure Multiple Spanning Tree Protocol.................................................................................... |
623 |
Related Configuration Tasks....................................................................................................... |
623 |
Enable Multiple Spanning Tree Globally.......................................................................................... |
623 |
Adding and Removing Interfaces..................................................................................................... |
624 |
Creating Multiple Spanning Tree Instances..................................................................................... |
624 |
Influencing MSTP Root Selection..................................................................................................... |
625 |
Interoperate with Non-Dell Networking OS Bridges...................................................................... |
626 |
Modifying Global Parameters........................................................................................................... |
626 |
Modifying the Interface Parameters................................................................................................. |
627 |
Configuring an EdgePort.................................................................................................................. |
628 |
Configuring Fast Hellos for Link State Detection............................................................................ |
629 |
Flush MAC Addresses after a Topology Change............................................................................. |
630 |
MSTP Sample Configurations.......................................................................................................... |
630 |
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running- |
|
ConfigurationSFTOS Example Running-Configuration............................................................. |
631 |
Debugging and Verifying MSTP Configurations.............................................................................. |
633 |
37 Multicast Features.......................................................................................... |
636 |
Enabling IP Multicast........................................................................................................................ |
636 |
Implementation Information............................................................................................................ |
636 |
First Packet Forwarding for Lossless Multicast................................................................................ |
637 |
IPv4 Multicast Policies...................................................................................................................... |
637 |
Limiting the Number of Multicast Routes.................................................................................. |
637 |
Preventing a Host from Joining a Group................................................................................... |
638 |
Preventing a PIM Router from Forming an Adjacency.............................................................. |
641 |
Preventing a Source from Registering with the RP.................................................................... |
641 |
Preventing a PIM Router from Processing a Join...................................................................... |
644 |
38 NPIV Proxy Gateway...................................................................................... |
645 |
Benefits of an NPIV Proxy Gateway................................................................................................. |
645 |
NPIV Proxy Gateway Operation....................................................................................................... |
645 |
NPIV Proxy Gateway: Protocol Services.................................................................................... |
647 |
NPIV Proxy Gateway Functionality............................................................................................. |
647 |
NPIV Proxy Gateway: Terms and Definitions............................................................................. |
647 |
DCB Maps.................................................................................................................................... |
649 |
FCoE Maps.................................................................................................................................. |
649 |
Configure an NPIV Proxy Gateway.................................................................................................. |
650 |
Enabling Fibre Channel Capability on the Switch..................................................................... |
650 |
Creating a DCB Map................................................................................................................... |
650 |
Applying a DCB Map on Server-Facing Ethernet Ports............................................................. |
651 |
Creating an FCoE VLAN.............................................................................................................. |
652 |
FCoE Maps................................................................................................................................... |
652 |
Applying an FCoE Map on Server-Facing Ethernet Ports.......................................................... |
653 |
Applying an FCoE Map on Fabric-Facing FC Ports................................................................... |
654 |
Sample Configuration................................................................................................................. |
654 |
Display NPIV Proxy Gateway Information....................................................................................... |
656 |
39 Object Tracking.............................................................................................. |
662 |
Object Tracking Overview................................................................................................................ |
662 |
Track Layer 2 Interfaces.............................................................................................................. |
663 |
Track Layer 3 Interfaces.............................................................................................................. |
663 |
Track IPv4 and IPv6 Routes........................................................................................................ |
664 |
Set Tracking Delays..................................................................................................................... |
665 |
VRRP Object Tracking................................................................................................................. |
665 |
Object Tracking Configuration........................................................................................................ |
665 |
Tracking a Layer 2 Interface....................................................................................................... |
665 |
Tracking a Layer 3 Interface....................................................................................................... |
667 |
Track an IPv4/IPv6 Route........................................................................................................... |
668 |
Displaying Tracked Objects.............................................................................................................. |
672 |
40 Open Shortest Path First (OSPFv2)............................................................. |
674 |
Protocol Overview............................................................................................................................ |
674 |
Autonomous System (AS) Areas................................................................................................. |
674 |
Designated and Backup Designated Routers............................................................................ |
678 |
Link-State Advertisements (LSAs)............................................................................................... |
678 |
Virtual Links................................................................................................................................. |
679 |
Router Priority and Cost............................................................................................................. |
680 |
Implementing OSPF with Dell Networking OS............................................................................... |
680 |
Fast Convergence (OSPFv2, IPv4 Only)...................................................................................... |
681 |
Multi-Process OSPFv2 (IPv4 only).............................................................................................. |
681 |
RFC-2328 Compliant OSPF Flooding........................................................................................ |
681 |
OSPF ACK Packing...................................................................................................................... |
682 |
OSPF Adjacency with Cisco Routers.......................................................................................... |
682 |
Configuration Information............................................................................................................... |
683 |
Configuration Task List for OSPFv2 (OSPF for IPv4).................................................................. |
683 |
Sample Configurations for OSPFv2........................................................................................... |
698 |
41 Policy-based Routing (PBR).......................................................................... |
701 |
Overview............................................................................................................................................ |
701 |
Implementing Policy-based Routing with Dell Networking OS..................................................... |
703 |
Configuration Task List for Policy-based Routing........................................................................... |
703 |
PBR Exceptions (Permit)............................................................................................................. |
706 |
Sample Configuration....................................................................................................................... |
709 |
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View |
|
Redirect-List GOLD..................................................................................................................... |
710 |
42 PIM Sparse-Mode (PIM-SM)......................................................................... |
714 |
Implementation Information............................................................................................................ |
714 |
Protocol Overview............................................................................................................................. |
714 |
Requesting Multicast Traffic........................................................................................................ |
714 |
Refuse Multicast Traffic............................................................................................................... |
715 |
Send Multicast Traffic.................................................................................................................. |
715 |
Configuring PIM-SM.......................................................................................................................... |
716 |
Configuring S,G Expiry Timers.......................................................................................................... |
717 |
Configuring a Static Rendezvous Point............................................................................................ |
718 |
Overriding Bootstrap Router Updates........................................................................................ |
718 |
Configuring a Designated Router..................................................................................................... |
719 |
Creating Multicast Boundaries and Domains................................................................................... |
719 |
43 PIM Source-Specific Mode (PIM-SSM)....................................................... |
721 |
Implementation Information............................................................................................................. |
721 |
Important Points to Remember.................................................................................................. |
721 |
Configure PIM-SMM......................................................................................................................... |
722 |
Related Configuration Tasks....................................................................................................... |
722 |
Enabling PIM-SSM............................................................................................................................. |
722 |
Use PIM-SSM with IGMP Version 2 Hosts........................................................................................ |
722 |
Configuring PIM-SSM with IGMPv2............................................................................................ |
723 |
44 Port Monitoring.............................................................................................. |
725 |
Important Points to Remember........................................................................................................ |
725 |
Port Monitoring................................................................................................................................. |
726 |
Configuring Port Monitoring............................................................................................................ |
727 |
Enabling Flow-Based Monitoring..................................................................................................... |
729 |
Remote Port Mirroring...................................................................................................................... |
730 |
Remote Port Mirroring Example................................................................................................. |
730 |
Configuring Remote Port Mirroring............................................................................................ |
731 |
Displaying Remote-Port Mirroring Configurations.................................................................... |
733 |
Configuring the Sample Remote Port Mirroring........................................................................ |
733 |
Configuring the Encapsulated Remote Port Mirroring.................................................................... |
737 |
Changes to Default BehaviorConfiguration steps for ERPM .................................................... |
737 |
ERPM Behavior on a typical Dell Networking OS ........................................................................... |
739 |
Decapsulation of ERPM packets at the Destination IP/ Analyzer.............................................. |
739 |
45 Private VLANs (PVLAN).................................................................................. |
741 |
Private VLAN Concepts..................................................................................................................... |
741 |
Using the Private VLAN Commands................................................................................................. |
742 |
Configuration Task List..................................................................................................................... |
743 |
Creating PVLAN Ports................................................................................................................. |
743 |
Creating a Primary VLAN............................................................................................................ |
744 |
Creating a Community VLAN..................................................................................................... |
745 |
Creating an Isolated VLAN.......................................................................................................... |
746 |
Private VLAN Configuration Example............................................................................................... |
747 |
Inspecting the Private VLAN Configuration............................................................................... |
748 |
46 Per-VLAN Spanning Tree Plus (PVST+)....................................................... |
751 |
Protocol Overview............................................................................................................................. |
751 |
Implementation Information............................................................................................................ |
752 |
Configure Per-VLAN Spanning Tree Plus......................................................................................... |
752 |
Related Configuration Tasks....................................................................................................... |
752 |
Enabling PVST+................................................................................................................................. |
752 |
Disabling PVST+................................................................................................................................ |
753 |
Influencing PVST+ Root Selection............................................................................................. |
753 |
Modifying Global PVST+ Parameters............................................................................................... |
755 |
Modifying Interface PVST+ Parameters........................................................................................... |
756 |
Configuring an EdgePort.................................................................................................................. |
757 |
PVST+ in Multi-Vendor Networks.................................................................................................... |
758 |
Enabling PVST+ Extend System ID................................................................................................... |
758 |
PVST+ Sample Configurations......................................................................................................... |
759 |
47 Quality of Service (QoS)................................................................................ |
761 |
Implementation Information............................................................................................................ |
763 |
Port-Based QoS Configurations....................................................................................................... |
763 |
Setting dot1p Priorities for Incoming Traffic.............................................................................. |
764 |
Honoring dot1p Priorities on Ingress Traffic.............................................................................. |
764 |
Configuring Port-Based Rate Policing....................................................................................... |
765 |
Configuring Port-Based Rate Shaping....................................................................................... |
765 |
Policy-Based QoS Configurations................................................................................................... |
766 |
Classify Traffic............................................................................................................................. |
766 |
Create a QoS Policy.................................................................................................................... |
770 |
Create Policy Maps...................................................................................................................... |
772 |
DSCP Color Maps.............................................................................................................................. |
776 |
Creating a DSCP Color Map....................................................................................................... |
776 |
Displaying DSCP Color Maps...................................................................................................... |
777 |
Displaying a DSCP Color Policy Configuration ......................................................................... |
777 |
Enabling QoS Rate Adjustment........................................................................................................ |
778 |
Enabling Strict-Priority Queueing.................................................................................................... |
778 |
Weighted Random Early Detection.................................................................................................. |
779 |
Creating WRED Profiles.............................................................................................................. |
780 |
Applying a WRED Profile to Traffic............................................................................................. |
780 |
Displaying Default and Configured WRED Profiles................................................................... |
780 |
Displaying WRED Drop Statistics................................................................................................ |
780 |
Pre-Calculating Available QoS CAM Space..................................................................................... |
780 |
Configuring Weights and ECN for WRED ....................................................................................... |
782 |
Global Service Pools With WRED and ECN Settings.................................................................. |
782 |
Configuring WRED and ECN Attributes........................................................................................... |
784 |
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................ |
785 |
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class.......... |
785 |
Classifying Incoming Packets Using ECN and Color-Marking.................................................. |
786 |
Sample configuration to mark non-ecn packets as “yellow” with single traffic class............. |
788 |
Applying Layer 2 Match Criteria on a Layer 3 Interface.................................................................. |
789 |
Applying DSCP and VLAN Match Criteria on a Service Queue....................................................... |
790 |
Classifying Incoming Packets Using ECN and Color-Marking........................................................ |
791 |
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................ |
793 |
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class................ |
794 |
Sample configuration to mark non-ecn packets as “yellow” with single traffic class................... |
794 |
48 Routing Information Protocol (RIP)........................................................... |
796 |
Protocol Overview............................................................................................................................ |
796 |
RIPv1............................................................................................................................................ |
796 |
RIPv2............................................................................................................................................ |
796 |
Implementation Information............................................................................................................ |
797 |
Configuration Information................................................................................................................ |
797 |
Configuration Task List............................................................................................................... |
797 |
RIP Configuration Example.............................................................................................................. |
803 |
RIP Configuration on Core2....................................................................................................... |
803 |
Core 2 RIP Output...................................................................................................................... |
804 |
RIP Configuration on Core3....................................................................................................... |
805 |
Core 3 RIP Output...................................................................................................................... |
805 |
RIP Configuration Summary....................................................................................................... |
807 |
49 Remote Monitoring (RMON)....................................................................... |
809 |
Implementation Information........................................................................................................... |
809 |
Fault Recovery.................................................................................................................................. |
809 |
Setting the rmon Alarm............................................................................................................... |
810 |
Configuring an RMON Event....................................................................................................... |
811 |
Configuring RMON Collection Statistics.................................................................................... |
811 |
Configuring the RMON Collection History................................................................................ |
812 |
50 Rapid Spanning Tree Protocol (RSTP)........................................................ |
813 |
Protocol Overview............................................................................................................................ |
813 |
Configuring Rapid Spanning Tree.................................................................................................... |
813 |
Related Configuration Tasks....................................................................................................... |
813 |
Important Points to Remember.................................................................................................. |
813 |
RSTP and VLT.............................................................................................................................. |
814 |
Configuring Interfaces for Layer 2 Mode......................................................................................... |
814 |
Enabling Rapid Spanning Tree Protocol Globally............................................................................ |
816 |
Adding and Removing Interfaces............................................................................................... |
818 |
Modifying Global Parameters..................................................................................................... |
819 |
Modifying Interface Parameters................................................................................................. |
820 |
Configuring an EdgePort............................................................................................................ |
820 |
Influencing RSTP Root Selection................................................................................................ |
821 |
Enabling SNMP Traps for Root Elections and Topology Changes........................................... |
822 |
51 Software-Defined Networking (SDN)......................................................... |
823 |
52 Security............................................................................................................ |
824 |
AAA Accounting................................................................................................................................ |
824 |
Configuration Task List for AAA Accounting............................................................................. |
824 |
AAA Authentication........................................................................................................................... |
826 |
Configuration Task List for AAA Authentication........................................................................ |
827 |
Obscuring Passwords and Keys....................................................................................................... |
829 |
AAA Authorization............................................................................................................................. |
830 |
Privilege Levels Overview........................................................................................................... |
830 |
Configuration Task List for Privilege Levels............................................................................... |
830 |
RADIUS.............................................................................................................................................. |
834 |
RADIUS Authentication and Authorization................................................................................ |
835 |
Configuration Task List for RADIUS........................................................................................... |
836 |
TACACS+.......................................................................................................................................... |
839 |
Configuration Task List for TACACS+........................................................................................ |
839 |
Command Authorization............................................................................................................ |
841 |
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... |
842 |
Enabling SCP and SSH...................................................................................................................... |
842 |
Using SCP with SSH to Copy a Software Image........................................................................ |
843 |
Secure Shell Authentication....................................................................................................... |
844 |
Enabling SSH Authentication by Password................................................................................ |
844 |
Using RSA Authentication of SSH............................................................................................... |
845 |
Configuring Host-Based SSH Authentication............................................................................ |
845 |
Using Client-Based SSH Authentication.................................................................................... |
846 |
Troubleshooting SSH.................................................................................................................. |
847 |
Telnet................................................................................................................................................. |
847 |
VTY Line and Access-Class Configuration...................................................................................... |
847 |
VTY Line Local Authentication and Authorization..................................................................... |
848 |
VTY Line Remote Authentication and Authorization................................................................ |
848 |
VTY MAC-SA Filter Support........................................................................................................ |
849 |
53 Service Provider Bridging............................................................................. |
850 |
VLAN Stacking................................................................................................................................... |
850 |
Important Points to Remember.................................................................................................. |
851 |
Configure VLAN Stacking................................................................................................................. |
852 |
Related Configuration Tasks....................................................................................................... |
852 |
Creating Access and Trunk Ports............................................................................................... |
852 |
Enable VLAN-Stacking for a VLAN............................................................................................. |
853 |
Configuring the Protocol Type Value for the Outer VLAN Tag................................................ |
853 |
Dell Networking OS Options for Trunk Ports............................................................................ |
853 |
Debugging VLAN Stacking.......................................................................................................... |
854 |
VLAN Stacking in Multi-Vendor Networks................................................................................. |
855 |
VLAN Stacking Packet Drop Precedence........................................................................................ |
859 |
Enabling Drop Eligibility.............................................................................................................. |
859 |
Honoring the Incoming DEI Value............................................................................................. |
860 |
Marking Egress Packets with a DEI Value.................................................................................. |
860 |
Dynamic Mode CoS for VLAN Stacking........................................................................................... |
861 |
Mapping C-Tag to S-Tag dot1p Values..................................................................................... |
862 |
Layer 2 Protocol Tunneling.............................................................................................................. |
863 |
Implementation Information...................................................................................................... |
865 |
Enabling Layer 2 Protocol Tunneling......................................................................................... |
865 |
Specifying a Destination MAC Address for BPDUs.................................................................... |
866 |
Setting Rate-Limit BPDUs........................................................................................................... |
866 |
Debugging Layer 2 Protocol Tunneling..................................................................................... |
867 |
Provider Backbone Bridging............................................................................................................. |
867 |
54 sFlow................................................................................................................ |
868 |
Overview........................................................................................................................................... |
868 |
Implementation Information............................................................................................................ |
869 |
Important Points to Remember................................................................................................. |
869 |
Enabling and Disabling sFlow........................................................................................................... |
870 |
Enabling and Disabling sFlow on an Interface................................................................................ |
870 |
Enabling sFlow Max-Header Size Extended.................................................................................... |
870 |
sFlow Show Commands................................................................................................................... |
871 |
Displaying Show sFlow Global.................................................................................................... |
872 |
Displaying Show sFlow on an Interface..................................................................................... |
872 |
Displaying Show sFlow on a Stack-unit..................................................................................... |
873 |
Configuring Specify Collectors........................................................................................................ |
873 |
Changing the Polling Intervals......................................................................................................... |
873 |
Back-Off Mechanism........................................................................................................................ |
873 |
sFlow on LAG ports........................................................................................................................... |
874 |
55 Simple Network Management Protocol (SNMP)...................................... |
875 |
Protocol Overview............................................................................................................................ |
875 |
Implementation Information............................................................................................................ |
875 |
Configuration Task List for SNMP.................................................................................................... |
875 |
Related Configuration Tasks....................................................................................................... |
876 |
Important Points to Remember................................................................................................. |
876 |
Set up SNMP...................................................................................................................................... |
876 |
Creating a Community............................................................................................................... |
876 |
Setting Up User-Based Security (SNMPv3)................................................................................. |
877 |
Reading Managed Object Values..................................................................................................... |
878 |
Writing Managed Object Values....................................................................................................... |
879 |
Configuring Contact and Location Information using SNMP......................................................... |
879 |
Subscribing to Managed Object Value Updates using SNMP......................................................... |
880 |
Enabling a Subset of SNMP Traps.................................................................................................... |
881 |
Copy Configuration Files Using SNMP............................................................................................ |
883 |
Copying a Configuration File..................................................................................................... |
885 |
Copying Configuration Files via SNMP...................................................................................... |
886 |
Copying the Startup-Config Files to the Running-Config........................................................ |
886 |
Copying the Startup-Config Files to the Server via FTP............................................................ |
887 |
Copying the Startup-Config Files to the Server via TFTP.......................................................... |
887 |
Copy a Binary File to the Startup-Configuration....................................................................... |
888 |
Additional MIB Objects to View Copy Statistics........................................................................ |
888 |
Obtaining a Value for MIB Objects.................................................................................................. |
889 |
MIB Support to Display the Available Memory Size on Flash......................................................... |
890 |
Viewing the Available Flash Memory Size.................................................................................. |
890 |
MIB Support to Display the Software Core Files Generated by the System.................................. |
890 |
Viewing the Software Core Files Generated by the System...................................................... |
891 |
Manage VLANs using SNMP............................................................................................................. |
891 |
Creating a VLAN.......................................................................................................................... |
891 |
Assigning a VLAN Alias................................................................................................................ |
892 |
Displaying the Ports in a VLAN................................................................................................... |
892 |
Add Tagged and Untagged Ports to a VLAN.............................................................................. |
893 |
Managing Overload on Startup........................................................................................................ |
894 |
Enabling and Disabling a Port using SNMP...................................................................................... |
895 |
Fetch Dynamic MAC Entries using SNMP........................................................................................ |
896 |
Deriving Interface Indices................................................................................................................. |
897 |
Monitor Port-Channels.................................................................................................................... |
898 |
Troubleshooting SNMP Operation.................................................................................................. |
899 |
56 Stacking........................................................................................................... |
900 |
Stacking S5000 Switches................................................................................................................. |
900 |
Stack Management Roles........................................................................................................... |
901 |
Stack Master Election................................................................................................................. |
902 |
Virtual IP...................................................................................................................................... |
903 |
Failover Roles.............................................................................................................................. |
903 |
MAC Addressing.......................................................................................................................... |
903 |
Stacking LAG............................................................................................................................... |
903 |
High Availability on S5000 Stacks.............................................................................................. |
903 |
Management Access on S-Series Stacks................................................................................... |
904 |
S-Series Stacking Installation Tasks........................................................................................... |
905 |
Stack Unit and Stack Group Numbering.................................................................................... |
910 |
Supported Stacking Topologies.................................................................................................. |
911 |
Configuring an S5000 Switch Stack................................................................................................. |
912 |
Stack and Cable Requirements................................................................................................... |
912 |
Cables for Stacked Switches....................................................................................................... |
913 |
Accessing the Stack CLI.............................................................................................................. |
914 |
Assigning a Priority to Stacked Switches.................................................................................... |
914 |
Renumbering a Stack Unit.......................................................................................................... |
914 |
Configuring Stacking Ports and Bringing Up a Stack....................................................................... |
915 |
Provisioning a Stack Unit.................................................................................................................. |
920 |