Dell PowerSwitch S5000 User Manual

Dell 9.7(0.0) Configuration Guide for the S5000 Switch
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2015 - 02
Rev. A00
Contents
1 About this Guide..................................................................................................37
Audience..............................................................................................................................................37
Conventions........................................................................................................................................ 37
Related Documents.............................................................................................................................37
2 Configuration Fundamentals........................................................................... 38
Accessing the Command Line............................................................................................................38
CLI Modes............................................................................................................................................38
Navigating CLI Modes...................................................................................................................40
Port Numbering Convention..............................................................................................................42
The do Command...............................................................................................................................42
The no Command...............................................................................................................................43
Obtaining Help....................................................................................................................................44
Entering and Editing Commands....................................................................................................... 44
Command History...............................................................................................................................45
Filtering show Command Outputs.....................................................................................................45
Multiple Users in Configuration Mode............................................................................................... 47
3 Getting Started................................................................................................... 48
Accessing Ports...................................................................................................................................48
Accessing the RJ-45/RS-232 Console Port.......................................................................................48
Pin Assignments..................................................................................................................................49
Accessing the CLI Interface and Running Scripts Using SSH............................................................49
Entering CLI commands Using an SSH Connection................................................................... 49
Executing Local CLI Scripts Using an SSH Connection...............................................................49
Default Configuration......................................................................................................................... 50
Accessing the USB-B Console Port................................................................................................... 50
Booting Process...................................................................................................................................51
Enter the Initial Configuration Information........................................................................................53
Configuring the Enable Password...................................................................................................... 53
Configuring a Host Name...................................................................................................................54
Navigating CLI Modes.........................................................................................................................54
Default Configuration......................................................................................................................... 54
Configuring Layer 2 (Data Link) Mode................................................................................................54
Accessing the System Remotely.........................................................................................................55
Configure the Management Port IP Address..................................................................................... 55
Configure a Management Route........................................................................................................ 55
Configuring a Username and Password.............................................................................................56
Creating a Port-based VLAN...............................................................................................................56
Assigning Interfaces to a VLAN...........................................................................................................56
Assigning an IP Address to a VLAN..................................................................................................... 57
Connect the S5000 to the Network...................................................................................................57
Configure File Management............................................................................................................... 57
Copying Files to and from the System...............................................................................................58
Important Points to Remember....................................................................................................58
Mounting an NFS File System............................................................................................................. 59
Important Points to Remember....................................................................................................59
Saving the Running-Configuration.................................................................................................... 60
Viewing Files........................................................................................................................................ 61
View Configuration Files.....................................................................................................................62
Compressing Configuration Files.......................................................................................................63
Managing the File System...................................................................................................................66
Enabling Software Features on Devices Using a Command Option................................................ 67
View Command History......................................................................................................................67
Upgrading and Downgrading Dell Networking OS........................................................................... 68
Using Hashes to Validate Software Images....................................................................................... 68
Using HTTP for File Transfers............................................................................................................. 69
4 Switch Management.......................................................................................... 70
Configuring Privilege Levels............................................................................................................... 70
Creating a Custom Privilege Level................................................................................................70
Removing a Command from EXEC Mode......................................................................................... 70
Moving a Command from EXEC Privilege Mode to EXEC Mode......................................................70
Allowing Access to CONFIGURATION Mode Commands.................................................................71
Allowing Access to the Following Modes...........................................................................................71
Applying a Privilege Level to a Username.......................................................................................... 73
Applying a Privilege Level to a Terminal Line.....................................................................................73
Configuring Logging........................................................................................................................... 73
Log Messages in the Internal Buffer................................................................................................... 74
Configuration Task List for System Log Management.................................................................74
Disabling System Logging.............................................................................................................74
Sending System Messages to a Syslog Server..............................................................................74
Configuring a UNIX System as a Syslog Server.................................................................................. 75
Changing System Logging Settings....................................................................................................75
Display the Logging Buffer and the Logging Configuration..............................................................76
Configuring a UNIX Logging Facility Level......................................................................................... 77
Synchronizing Log Messages..............................................................................................................78
Enabling Timestamp on Syslog Messages..........................................................................................78
File Transfer Services...........................................................................................................................79
Configuration Task List for File Transfer Services........................................................................ 79
Enabling the FTP Server................................................................................................................ 79
Configuring FTP Server Parameters..............................................................................................79
Configuring FTP Client Parameters..............................................................................................80
Terminal Lines......................................................................................................................................81
Denying and Permitting Access to a Terminal Line..................................................................... 81
Configuring Login Authentication for Terminal Lines....................................................................... 81
Setting Time Out of EXEC Privilege Mode......................................................................................... 82
Using Telnet to get to Another Network Device............................................................................... 83
Lock CONFIGURATION Mode............................................................................................................84
Viewing the Configuration Lock Status........................................................................................84
View the Configuration Lock Status...................................................................................................85
Recovering from a Forgotten Password............................................................................................ 85
Recovering from a Forgotten Enable Password................................................................................86
Recovering from a Failed Start........................................................................................................... 86
5 802.1ag.................................................................................................................88
Ethernet CFM...................................................................................................................................... 88
Maintenance Domains........................................................................................................................89
Maintenance Points............................................................................................................................ 89
Maintenance End Points.....................................................................................................................90
Implementation Information...............................................................................................................91
Configuring the CFM...........................................................................................................................91
Related Configuration Tasks......................................................................................................... 91
Enabling Ethernet CFM........................................................................................................................91
Creating a Maintenance Domain........................................................................................................91
Creating a Maintenance Association..................................................................................................92
Create Maintenance Points................................................................................................................ 92
Creating a Maintenance End Point...............................................................................................92
Creating a Maintenance Intermediate Point................................................................................ 93
Displaying the MP Databases........................................................................................................94
Setting the MP Database Persistence...........................................................................................94
Continuity Check Messages............................................................................................................... 95
Enabling CCM................................................................................................................................96
Enabling Cross-Checking.............................................................................................................96
Sending Loopback Messages and Responses................................................................................... 96
Sending Linktrace Messages and Responses.....................................................................................97
Caching Link Trace........................................................................................................................97
Enabling CFM SNMP Traps................................................................................................................. 98
Displaying Ethernet CFM Statistics...................................................................................................100
6 802.1X................................................................................................................. 101
The Port-Authentication Process.....................................................................................................102
EAP over RADIUS.............................................................................................................................. 104
RADIUS Attributes for 802.1 Support..........................................................................................104
Configuring 802.1X........................................................................................................................... 104
Related Configuration Tasks.......................................................................................................104
Important Points to Remember..................................................................................................105
Enabling 802.1X.................................................................................................................................105
Configuring Request Identity Re-Transmissions............................................................................. 107
Configuring a Quiet Period after a Failed Authentication............................................................... 107
Forcibly Authorizing or Unauthorizing a Port..................................................................................108
Re-Authenticating a Port..................................................................................................................109
Configuring Timeouts....................................................................................................................... 110
Configuring Dynamic VLAN Assignment with Port Authentication.................................................111
Guest and Authentication-Fail VLANs...............................................................................................112
Configuring a Guest VLAN...........................................................................................................113
Configuring an Authentication-Fail VLAN.................................................................................. 113
7 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)...................................................................................................... 115
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..........................................115
Guidelines for Configuring ACL VLAN groups................................................................................. 116
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.........................117
Configuring ACL VLAN Groups................................................................................................... 117
Configuring FP Blocks for VLAN Parameters..............................................................................118
Viewing CAM Usage.......................................................................................................................... 119
Allocating FP Blocks for VLAN Processes........................................................................................ 120
8 Access Control Lists (ACLs).............................................................................122
IP Access Control Lists (ACLs).......................................................................................................... 122
CAM Allocation and CAM Optimization...........................................................................................123
User Configurable CAM Allocation.............................................................................................123
CAM Optimization.......................................................................................................................124
Test CAM Usage.......................................................................................................................... 124
View CAM-ACL Settings..............................................................................................................124
View CAM Usage......................................................................................................................... 126
QoS CAM Region Limitation....................................................................................................... 126
Implementing ACLs on Dell Networking OS....................................................................................127
ACLs and VLANs...........................................................................................................................127
ACL Optimization........................................................................................................................ 127
Determine the Order in which ACLs are Used to Classify Traffic..............................................127
IP Fragment Handling....................................................................................................................... 128
IP Fragments ACL Examples....................................................................................................... 129
Layer 4 ACL Rules Examples.......................................................................................................129
Configure a Standard IP ACL............................................................................................................ 130
Configuring a Standard IP ACL Filter...........................................................................................131
Configure an Extended IP ACL......................................................................................................... 132
Configuring Filters with a Sequence Number............................................................................ 132
Configuring Filters Without a Sequence Number......................................................................133
Established Flag.................................................................................................................................134
Configure Layer 2 and Layer 3 ACLs................................................................................................ 134
Assign an IP ACL to an Interface.......................................................................................................135
Applying an IP ACL...................................................................................................................... 135
Counting ACL Hits.......................................................................................................................136
Configure Ingress ACLs.....................................................................................................................136
Configure Egress ACLs......................................................................................................................137
Applying Egress Layer 3 ACLs (Control-Plane)...........................................................................137
Configure ACLs to Loopback........................................................................................................... 138
Applying an ACL on Loopback Interfaces........................................................................................138
IP Prefix Lists......................................................................................................................................139
Implementation Information...................................................................................................... 140
Configuration Task List for Prefix Lists....................................................................................... 140
Creating a Prefix List......................................................................................................................... 140
Creating a Prefix List Without a Sequence Number...................................................................141
Viewing Prefix Lists......................................................................................................................142
Applying a Prefix List for Route Redistribution...........................................................................143
Applying a Filter to a Prefix List (OSPF).......................................................................................143
ACL Resequencing............................................................................................................................144
Resequencing an ACL or Prefix List............................................................................................145
Route Maps........................................................................................................................................146
Implementation Information...................................................................................................... 146
Important Points to Remember..................................................................................................146
Configuration Task List for Route Maps..................................................................................... 147
Creating a Route Map..................................................................................................................147
Configure Route Map Filters.......................................................................................................148
Configuring Match Routes..........................................................................................................149
Configuring Set Conditions.........................................................................................................151
Configure a Route Map for Route Redistribution...................................................................... 152
Configure a Route Map for Route Tagging................................................................................ 152
Continue Clause..........................................................................................................................153
9 Bidirectional Forwarding Detection (BFD)...................................................154
How BFD Works................................................................................................................................ 154
BFD Packet Format............................................................................................................................155
BFD Sessions..................................................................................................................................... 156
BFD Three-Way Handshake..............................................................................................................157
Session State Changes......................................................................................................................158
Important Points to Remember..................................................................................................159
Configure BFD...................................................................................................................................159
Configure BFD for Physical Ports............................................................................................... 160
Configure BFD for Static Routes.................................................................................................163
Configure BFD for OSPF............................................................................................................. 165
Configure BFD for IS-IS...............................................................................................................168
Configure BFD for BGP................................................................................................................171
Configuring Protocol Liveness....................................................................................................178
Troubleshooting BFD........................................................................................................................ 178
10 Border Gateway Protocol IPv4 (BGPv4).................................................... 180
Autonomous Systems (AS)................................................................................................................180
Sessions and Peers............................................................................................................................182
Establish a Session.......................................................................................................................183
Route Reflectors................................................................................................................................184
Communities.....................................................................................................................................185
BGP Attributes................................................................................................................................... 185
Best Path Selection Criteria.........................................................................................................185
Weight................................................................................................................................................187
Local Preference............................................................................................................................... 187
Multi-Exit Discriminators (MEDs)................................................................................................188
Origin.................................................................................................................................................189
AS Path.............................................................................................................................................. 190
Next Hop........................................................................................................................................... 190
Multiprotocol BGP............................................................................................................................ 190
Implement BGP with Dell Networking OS....................................................................................... 191
Additional Path (Add-Path) Support............................................................................................191
Advertise IGP Cost as MED for Redistributed Routes.................................................................191
Ignore Router-ID for Some Best-Path Calculations..................................................................192
Four-Byte AS Numbers............................................................................................................... 192
AS4 Number Representation...................................................................................................... 193
AS Number Migration........................................................................................................................194
BGP4 Management Information Base (MIB).................................................................................... 196
Important Points to Remember..................................................................................................196
Configuration Information................................................................................................................197
BGP Configuration...................................................................................................................... 197
Enabling BGP.....................................................................................................................................198
Configuring AS4 Number Representations..................................................................................... 202
Configuring Peer Groups................................................................................................................. 203
Configuring BGP Fast Fall-Over.......................................................................................................206
Configuring Passive Peering............................................................................................................ 208
Maintaining Existing AS Numbers During an AS Migration............................................................. 209
Allowing an AS Number to Appear in its Own AS Path................................................................... 210
Enabling Graceful Restart..................................................................................................................211
Enabling Neighbor Graceful Restart.................................................................................................212
Filtering on an AS-Path Attribute......................................................................................................212
Regular Expressions as Filters..................................................................................................... 214
Filtering BGP Routes Using AS-PATH Information.......................................................................... 215
Redistributing Routes........................................................................................................................216
Enabling Additional Paths..................................................................................................................217
Configuring IP Community Lists.......................................................................................................217
Filtering Routes with Community Lists.............................................................................................219
Manipulating the COMMUNITY Attribute.........................................................................................219
Changing MED Attributes..................................................................................................................221
Changing the LOCAL_PREFERENCE Attribute.................................................................................221
Changing the NEXT_HOP Attribute................................................................................................. 222
Changing the WEIGHT Attribute...................................................................................................... 223
Enabling Multipath............................................................................................................................ 223
Filtering BGP Routes Using Route Maps.......................................................................................... 223
Filtering BGP Routes Using AS-PATH Information..........................................................................224
Filtering BGP Routes......................................................................................................................... 225
Filtering BGP Routes Using Route Maps.................................................................................... 226
Filtering BGP Routes Using AS-PATH Information.................................................................... 227
Configuring BGP Route Reflectors.................................................................................................. 228
Aggregating Routes.......................................................................................................................... 228
Configuring BGP Confederations.................................................................................................... 229
Enabling Route Flap Dampening..................................................................................................... 230
Changing BGP Timers.......................................................................................................................232
Enabling BGP Neighbor Soft-Reconfiguration................................................................................233
Route Map Continue........................................................................................................................ 234
Match a Clause with a Continue Clause....................................................................................234
Set a Clause with a Continue Clause......................................................................................... 235
Enabling MBGP Configurations........................................................................................................235
BGP Regular Expression Optimization.............................................................................................236
Debugging BGP................................................................................................................................ 236
Storing Last and Bad PDUs......................................................................................................... 237
Capturing PDUs...........................................................................................................................238
PDU Counters............................................................................................................................. 239
Sample Configurations..................................................................................................................... 239
11 Bare Metal Provisioning (BMP).....................................................................249
Prerequisites......................................................................................................................................249
Restrictions....................................................................................................................................... 249
Reconfiguring Jumpstart and Normal Modes.................................................................................249
Jumpstart Mode................................................................................................................................ 251
DHCP Server/Configuration........................................................................................................251
MAC-Based IP Assignment......................................................................................................... 253
DHCP Retry Mechanism............................................................................................................. 253
File Server..........................................................................................................................................254
Domain Name Server....................................................................................................................... 254
Switch Boot and Set-up Behavior in Jumpstart Mode....................................................................255
12 Content Addressable Memory (CAM)......................................................... 257
CAM Allocation..................................................................................................................................257
Re-Allocating CAM for Ingress ACLs and QoS................................................................................258
Re-Allocating CAM for Egress ACLs.................................................................................................259
Testing CAM Usage for QoS Policies...............................................................................................260
Displaying CAM-ACL Settings..........................................................................................................260
Displaying CAM-ACL-Egress Settings.............................................................................................. 261
CAM Optimization.............................................................................................................................261
Troubleshoot CAM Profiling.......................................................................................................262
13 Control Plane Policing (CoPP)..................................................................... 263
Configure Control Plane Policing....................................................................................................264
Configuring CoPP for Protocols...................................................................................................... 265
Configuring CoPP for CPU Queues.................................................................................................267
Show Commands............................................................................................................................. 268
14 Data Center Bridging (DCB)......................................................................... 270
Ethernet Enhancements in Data Center Bridging........................................................................... 270
Priority-Based Flow Control........................................................................................................271
Enhanced Transmission Selection..............................................................................................272
Data Center Bridging Exchange Protocol (DCBx)......................................................................273
Data Center Bridging in a Traffic Flow....................................................................................... 274
Enabling Data Center Bridging.........................................................................................................274
QoS dot1p Traffic Classification and Queue Assignment............................................................... 275
DCB Maps and its Attributes.............................................................................................................276
DCB Map: Configuration Procedure.......................................................................................... 276
Important Points to Remember..................................................................................................276
Applying a DCB Map on a Port................................................................................................... 277
Configuring PFC without a DCB Map.........................................................................................277
Configuring Lossless Queues..................................................................................................... 278
Data Center Bridging: Default Configuration.................................................................................. 279
Configuring PFC and ETS in a DCB Map......................................................................................... 280
PFC Configuration Notes........................................................................................................... 280
PFC Prerequisites and Restrictions.............................................................................................281
ETS Configuration Notes............................................................................................................ 281
ETS Prerequisites and Restrictions............................................................................................. 282
Configuring Priority-Based Flow Control........................................................................................283
Configuring Lossless Queues.....................................................................................................284
Configure Enhanced Transmission Selection................................................................................. 284
ETS Prerequisites and Restrictions............................................................................................. 285
Creating an ETS Priority Group.................................................................................................. 285
ETS Operation with DCBx.......................................................................................................... 286
Configuring Bandwidth Allocation for DCBx CIN......................................................................287
Applying DCB Policies in a Switch Stack..........................................................................................287
Configure a DCBx Operation...........................................................................................................288
DCBx Operation..........................................................................................................................288
DCBx Port Roles..........................................................................................................................288
DCB Configuration Exchange.................................................................................................... 290
Configuration Source Election...................................................................................................290
Propagation of DCB Information................................................................................................291
Auto-Detection and Manual Configuration of the DCBx Version.............................................291
Behavior of Tagged Packets....................................................................................................... 292
Configuration Example for DSCP and PFC Priorities.................................................................292
DCBx Example.............................................................................................................................293
DCBx Prerequisites and Restrictions..........................................................................................294
Configuring DCBx.......................................................................................................................294
Verifying the DCB Configuration..................................................................................................... 298
Using PFC and ETS to Manage Data Center Traffic........................................................................ 309
PFC and ETS Configuration Command Examples..................................................................... 311
Using PFC and ETS to Manage Converged Ethernet Traffic......................................................311
Hierarchical Scheduling in ETS Output Policies......................................................................... 311
Priority-Based Flow Control Using Dynamic Buffer Method.......................................................... 312
Pause and Resume of Traffic...................................................................................................... 312
Buffer Sizes for Lossless or PFC Packets.................................................................................... 313
Configuring the Dynamic Buffer Method.........................................................................................313
Sample Configurations......................................................................................................................315
......................................................................................................................................................315
15 Dynamic Host Configuration Protocol (DHCP)........................................ 319
DHCP Packet Format and Options...................................................................................................319
Assign an IP Address using DHCP.....................................................................................................321
Implementation Information............................................................................................................322
Configuration Tasks..........................................................................................................................322
Configure the System to be a DHCP Server.................................................................................... 323
Configuration Tasks.................................................................................................................... 323
Configuring the Server for Automatic Address Allocation........................................................ 324
Specifying a Default Gateway.....................................................................................................325
Enabling the DHCP Server..........................................................................................................325
Configure a Method of Hostname Resolution.......................................................................... 326
Creating Manual Binding Entries................................................................................................ 326
Debugging the DHCP Server...................................................................................................... 327
Using DHCP Clear Commands...................................................................................................327
Configure the System to be a Relay Agent...................................................................................... 327
Configure the System for User Port Stacking..................................................................................329
Configure Secure DHCP...................................................................................................................329
Option 82.................................................................................................................................... 329
DHCP Snooping..........................................................................................................................330
Drop DHCP Packets on Snooped VLANs Only..........................................................................332
Dynamic ARP Inspection............................................................................................................ 332
Source Address Validation..........................................................................................................334
Viewing the Number of SAV Dropped Packets................................................................................336
Clearing the Number of SAV Dropped Packets...............................................................................336
16 Equal Cost Multi-Path (ECMP)..................................................................... 338
ECMP for Flow-Based Affinity.......................................................................................................... 338
Configuring the Hash Algorithm...................................................................................................... 338
Enabling Deterministic ECMP Next Hop..........................................................................................338
Configuring the Hash Algorithm Seed.............................................................................................339
Link Bundle Monitoring.................................................................................................................... 339
Managing ECMP Group Paths..........................................................................................................340
Creating an ECMP Group Bundle.................................................................................................... 340
Modifying the ECMP Group Threshold............................................................................................ 341
17 Fabric Services................................................................................................ 342
Configuring Switch Mode to Fabric Services...................................................................................343
Name Server......................................................................................................................................343
Link State Database.......................................................................................................................... 344
Inter Switch Link (ISL)..................................................................................................................345
Principal Switch Selection and Domain ID Assignment............................................................ 345
Route Table................................................................................................................................. 345
Zoning............................................................................................................................................... 345
Creating Zone and Adding Members.........................................................................................345
Creating Zone Alias and Adding Members................................................................................ 346
Creating Zonesets.......................................................................................................................346
Activating a Zoneset....................................................................................................................347
Zone Merge (within ISL).............................................................................................................. 347
Configuring Fabric Parameters...................................................................................................347
Displaying the Fabric Parameters...............................................................................................348
18 FCoE Transit.................................................................................................... 354
Fibre Channel over Ethernet............................................................................................................ 354
Ensure Robustness in a Converged Ethernet Network...................................................................354
FIP Snooping on Ethernet Bridges................................................................................................... 356
FIP Snooping in a Switch Stack........................................................................................................ 359
Using FIP Snooping...........................................................................................................................359
Enable the FCoE Transit Feature................................................................................................ 359
FIP Snooping Prerequisites.........................................................................................................360
Important Points to Remember................................................................................................. 360
Enabling the FCoE Transit Feature............................................................................................. 361
Enable FIP Snooping on VLANs.................................................................................................. 361
Configure the FC-MAP Value..................................................................................................... 362
Configure a Port for a Bridge-to-Bridge Link............................................................................362
Configure a Port for a Bridge-to-FCF Link................................................................................ 362
Impact on Other Software Features...........................................................................................362
FIP Snooping on an NPIV Proxy Gateway..................................................................................363
FIP Snooping in an S5000 Stack.................................................................................................363
Impact on Other Software Features...........................................................................................363
FIP Snooping Restrictions...........................................................................................................364
Configuring FIP Snooping.......................................................................................................... 365
Displaying FIP Snooping Information........................................................................................ 366
FCoE Transit Configuration Example............................................................................................... 372
19 Enabling FIPS Cryptography........................................................................ 374
Configuration Tasks..........................................................................................................................374
Preparing the System........................................................................................................................374
Enabling FIPS Mode...........................................................................................................................375
Generating Host-Keys.......................................................................................................................375
Monitoring FIPS Mode Status........................................................................................................... 376
Disabling FIPS Mode......................................................................................................................... 376
20 Fibre Channel Interface................................................................................ 378
Configure Fibre Channel Interfaces.................................................................................................378
Enabling Fibre Channel Capability................................................................................................... 378
Configuring Fibre Channel Interfaces..............................................................................................378
Displaying Fibre Channel Information............................................................................................. 379
Troubleshooting Fibre Channel Operation..................................................................................... 382
Configuring the Fibre Channel Port Group in Passthrough Ethernet Mode..................................384
Displaying Fibre Channel Port Group Mode Information............................................................... 384
21 Force10 Resilient Ring Protocol (FRRP).....................................................386
Protocol Overview............................................................................................................................386
Ring Status...................................................................................................................................388
Multiple FRRP Rings.................................................................................................................... 389
Important FRRP Points................................................................................................................390
Important FRRP Concepts.......................................................................................................... 391
Implementing FRRP.......................................................................................................................... 392
FRRP Configuration.......................................................................................................................... 392
Creating the FRRP Group........................................................................................................... 393
Configuring the Control VLAN................................................................................................... 393
Configuring and Adding the Member VLANs............................................................................ 394
Setting the FRRP Timers............................................................................................................. 395
Clearing the FRRP Counters.......................................................................................................396
Viewing the FRRP Configuration................................................................................................396
Viewing the FRRP Information................................................................................................... 396
Troubleshooting FRRP......................................................................................................................396
Configuration Checks.................................................................................................................396
Sample Configuration and Topology...............................................................................................397
22 GARP VLAN Registration Protocol (GVRP)................................................399
Important Points to Remember....................................................................................................... 399
Configure GVRP................................................................................................................................399
Related Configuration Tasks...................................................................................................... 400
Enabling GVRP Globally................................................................................................................... 400
Enabling GVRP on a Layer 2 Interface............................................................................................. 401
Configure GVRP Registration........................................................................................................... 401
Configure a GARP Timer.................................................................................................................. 402
23 High Availability (HA).....................................................................................403
High Availability on Stacks................................................................................................................403
Hitless Behavior................................................................................................................................ 403
Graceful Restart................................................................................................................................404
Software Resiliency.......................................................................................................................... 404
System Health Monitoring..........................................................................................................404
Failure and Event Logging..........................................................................................................404
Trace Log.................................................................................................................................... 404
Core Dumps................................................................................................................................404
System Log..................................................................................................................................405
Hot-Lock Behavior........................................................................................................................... 405
Component Redundancy.................................................................................................................405
Automatic and Manual Stack Unit Failover................................................................................405
Synchronization between Management and Standby Units.....................................................406
Forcing an Stack Unit Failover....................................................................................................406
Specifying an Auto-Failover Limit.............................................................................................. 407
Disabling Auto-Reboot...............................................................................................................407
Manually Synchronizing Management and Standby Units........................................................407
24 Internet Group Management Protocol (IGMP)........................................ 408
IGMP Implementation Information................................................................................................. 408
IGMP Protocol Overview..................................................................................................................408
IGMP Version 2........................................................................................................................... 408
Join a Multicast Group............................................................................................................... 409
Leaving a Multicast Group..........................................................................................................409
IGMP Version 3............................................................................................................................410
Configure IGMP.................................................................................................................................413
Related Configuration Tasks.......................................................................................................413
Viewing IGMP Enabled Interfaces.................................................................................................... 414
Selecting an IGMP Version................................................................................................................414
Viewing IGMP Groups.......................................................................................................................415
Adjusting Timers................................................................................................................................415
Adjusting Query and Response Timers...................................................................................... 415
Enabling IGMP Immediate-Leave.....................................................................................................416
IGMP Snooping................................................................................................................................. 416
IGMP Snooping Implementation Information........................................................................... 416
Configuring IGMP Snooping.......................................................................................................417
Removing a Group-Port Association..........................................................................................417
Enabling IGMP Immediate-Leave...............................................................................................418
Disabling Multicast Flooding.......................................................................................................418
Specifying a Port as Connected to a Multicast Router..............................................................418
Configuring the Switch as Querier.............................................................................................418
Fast Convergence after MSTP Topology Changes..........................................................................419
Egress Interface Selection (EIS) for HTTP and IGMP Applications..................................................419
Protocol Separation....................................................................................................................420
Enabling and Disabling Management Egress Interface Selection............................................. 421
Handling of Management Route Configuration........................................................................422
Handling of Switch-Initiated Traffic........................................................................................... 423
Handling of Switch-Destined Traffic..........................................................................................424
Handling of Transit Traffic (Traffic Separation)..........................................................................424
Mapping of Management Applications and Traffic Type.......................................................... 425
Behavior of Various Applications for Switch-Initiated Traffic .................................................. 426
Behavior of Various Applications for Switch-Destined Traffic .................................................427
Interworking of EIS With Various Applications.......................................................................... 428
Designating a Multicast Router Interface........................................................................................ 428
25 Interfaces.........................................................................................................429
Basic Interface Configuration.......................................................................................................... 429
Advanced Interface Configuration...................................................................................................429
Interface Types................................................................................................................................. 430
View Basic Interface Information.....................................................................................................430
Enabling a Physical Interface............................................................................................................432
Physical Interfaces............................................................................................................................ 432
Configuration Task List for Physical Interfaces..........................................................................433
Overview of Layer Modes........................................................................................................... 433
Configuring Layer 2 (Data Link) Mode....................................................................................... 433
Configuring Layer 2 (Interface) Mode........................................................................................434
Configuring Layer 3 (Network) Mode........................................................................................ 434
Configuring Layer 3 (Interface) Mode........................................................................................ 435
Egress Interface Selection (EIS)........................................................................................................435
Important Points to Remember................................................................................................. 436
Configuring EIS........................................................................................................................... 436
Management Interfaces....................................................................................................................436
Configuring Management Interfaces.........................................................................................436
Configuring Management Interfaces on the S-Series...............................................................437
VLAN Interfaces................................................................................................................................ 438
Loopback Interfaces.........................................................................................................................438
Null Interfaces...................................................................................................................................439
Port Channel Interfaces....................................................................................................................439
Port Channel Definition and Standards..................................................................................... 439
Port Channel Benefits.................................................................................................................440
Port Channel Implementation................................................................................................... 440
10/100/1000 Mbps Interfaces in Port Channels....................................................................... 440
Configuration Tasks for Port Channel Interfaces...................................................................... 441
Creating a Port Channel............................................................................................................. 441
Adding a Physical Interface to a Port Channel.......................................................................... 442
Reassigning an Interface to a New Port Channel......................................................................444
Configuring the Minimum Oper Up Links in a Port Channel....................................................444
.....................................................................................................................................................445
Assigning an IP Address to a Port Channel................................................................................445
Deleting or Disabling a Port Channel........................................................................................ 446
Load Balancing Through Port Channels....................................................................................446
Load-Balancing Method.............................................................................................................446
Changing the Hash Algorithm....................................................................................................447
Bulk Configuration............................................................................................................................448
Interface Range...........................................................................................................................448
Bulk Configuration Examples.....................................................................................................449
Defining Interface Range Macros.................................................................................................... 450
Define the Interface Range........................................................................................................ 450
Choosing an Interface-Range Macro.........................................................................................451
Monitoring and Maintaining Interfaces............................................................................................ 451
Maintenance Using TDR............................................................................................................. 452
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 453
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................ 453
Important Points to Remember................................................................................................. 454
Support for LM4 Optics.............................................................................................................. 454
Example Scenarios......................................................................................................................454
Link Dampening................................................................................................................................458
Important Points to Remember................................................................................................. 459
Enabling Link Dampening...........................................................................................................459
Link Bundle Monitoring....................................................................................................................460
Using Ethernet Pause Frames for Flow Control.............................................................................. 461
Enabling Pause Frames...............................................................................................................462
Configure the MTU Size on an Interface......................................................................................... 462
Port-Pipes......................................................................................................................................... 463
Auto-Negotiation on Ethernet Interfaces........................................................................................463
Setting the Speed and Duplex Mode of Ethernet Interfaces.................................................... 464
Set Auto-Negotiation Options................................................................................................... 465
View Advanced Interface Information.............................................................................................466
Configuring the Interface Sampling Size................................................................................... 467
Dynamic Counters............................................................................................................................468
Clearing Interface Counters.......................................................................................................469
Enhanced Validation of Interface Ranges....................................................................................... 469
26 Internet Protocol Security (IPSec)...............................................................471
Configuring IPSec ............................................................................................................................ 472
27 IPv4 Routing....................................................................................................473
IP Addresses...................................................................................................................................... 473
Implementation Information...................................................................................................... 473
Configuration Tasks for IP Addresses.............................................................................................. 473
Assigning IP Addresses to an Interface............................................................................................ 474
Configuring Static Routes.................................................................................................................475
Configure Static Routes for the Management Interface................................................................. 477
IPv4 Path MTU Discovery Overview.................................................................................................477
Using the Configured Source IP Address in ICMP Messages..........................................................478
Configuring the ICMP Source Interface.....................................................................................478
Configuring the Duration to Establish a TCP Connection..............................................................479
Enabling Directed Broadcast............................................................................................................479
Resolution of Host Names...............................................................................................................480
Enabling Dynamic Resolution of Host Names................................................................................480
Specifying the Local System Domain and a List of Domains..........................................................481
Configuring DNS with Traceroute....................................................................................................481
ARP.................................................................................................................................................... 482
Configuration Tasks for ARP............................................................................................................ 482
Configuring Static ARP Entries.........................................................................................................483
Enabling Proxy ARP.......................................................................................................................... 483
Clearing ARP Cache..........................................................................................................................483
ARP Learning via Gratuitous ARP.....................................................................................................484
Enabling ARP Learning via Gratuitous ARP......................................................................................484
ARP Learning via ARP Request......................................................................................................... 485
Configuring ARP Retries................................................................................................................... 485
ICMP..................................................................................................................................................486
Configuration Tasks for ICMP..........................................................................................................486
Enabling ICMP Unreachable Messages........................................................................................... 486
UDP Helper....................................................................................................................................... 487
Configure UDP Helper................................................................................................................487
Important Points to Remember................................................................................................. 487
Enabling UDP Helper........................................................................................................................ 487
Configuring a Broadcast Address.................................................................................................... 488
Configurations Using UDP Helper................................................................................................... 488
UDP Helper with Broadcast-All Addresses......................................................................................489
UDP Helper with Subnet Broadcast Addresses............................................................................... 489
UDP Helper with Configured Broadcast Addresses........................................................................490
UDP Helper with No Configured Broadcast Addresses.................................................................. 491
Troubleshooting UDP Helper........................................................................................................... 491
28 IPv6 Routing................................................................................................... 492
Protocol Overview............................................................................................................................492
Extended Address Space............................................................................................................ 492
Stateless Autoconfiguration....................................................................................................... 492
IPv6 Headers............................................................................................................................... 493
IPv6 Header Fields...................................................................................................................... 493
Extension Header Fields............................................................................................................. 495
Addressing...................................................................................................................................496
Implementing IPv6 with Dell Networking OS..................................................................................497
ICMPv6........................................................................................................................................ 497
Path MTU Discovery................................................................................................................... 498
IPv6 Neighbor Discovery............................................................................................................498
Secure Shell (SSH) Over an IPv6 Transport................................................................................499
Configuration Tasks for IPv6............................................................................................................499
Adjusting Your CAM-Profile....................................................................................................... 500
Assigning an IPv6 Address to an Interface.................................................................................500
Assigning a Static IPv6 Route......................................................................................................501
Configuring Telnet with IPv6......................................................................................................501
SNMP over IPv6...........................................................................................................................502
Showing IPv6 Information..........................................................................................................502
Showing an IPv6 Interface..........................................................................................................503
Showing IPv6 Routes..................................................................................................................503
Showing the Running-Configuration for an Interface.............................................................. 505
Clearing IPv6 Routes...................................................................................................................505
Configuring IPv6 RA Guard.............................................................................................................. 505
Configuring IPv6 RA Guard on an Interface.............................................................................. 507
Monitoring IPv6 RA Guard..........................................................................................................508
29 iSCSI Optimization.........................................................................................509
iSCSI Optimization Overview........................................................................................................... 509
Monitoring iSCSI Traffic Flows....................................................................................................510
Application of Quality of Service to iSCSI Traffic Flows.............................................................511
Information Monitored in iSCSI Traffic Flows.............................................................................511
Detection and Auto-Configuration for Dell EqualLogic Arrays.................................................512
Configuring Detection and Ports for Dell Compellent Arrays...................................................512
Enable and Disable iSCSI Optimization...................................................................................... 513
Default iSCSI Optimization Values....................................................................................................513
iSCSI Optimization Prerequisites...................................................................................................... 514
Configuring iSCSI Optimization........................................................................................................514
Displaying iSCSI Optimization Information......................................................................................516
30 Intermediate System to Intermediate System.......................................... 518
IS-IS Protocol Overview....................................................................................................................518
IS-IS Addressing................................................................................................................................ 518
Multi-Topology IS-IS.........................................................................................................................519
Transition Mode...........................................................................................................................519
Interface Support........................................................................................................................ 520
Adjacencies................................................................................................................................. 520
Graceful Restart................................................................................................................................ 520
Timers..........................................................................................................................................520
Implementation Information............................................................................................................ 521
Configuration Information............................................................................................................... 522
Configuration Tasks for IS-IS......................................................................................................522
Configuring the Distance of a Route..........................................................................................531
Changing the IS-Type................................................................................................................. 531
IS-IS Metric Styles............................................................................................................................. 536
Configure Metric Values................................................................................................................... 536
Maximum Values in the Routing Table.......................................................................................537
Change the IS-IS Metric Style in One Level Only...................................................................... 537
Leaks from One Level to Another.............................................................................................. 539
Sample Configurations..................................................................................................................... 539
31 Link Aggregation Control Protocol (LACP)............................................... 542
Introduction to Dynamic LAGs and LACP....................................................................................... 542
Important Points to Remember................................................................................................. 542
LACP Modes................................................................................................................................ 543
Configuring LACP Commands................................................................................................... 543
LACP Configuration Tasks................................................................................................................544
Creating a LAG............................................................................................................................ 544
Configuring the LAG Interfaces as Dynamic............................................................................. 544
Setting the LACP Long Timeout.................................................................................................545
Monitoring and Debugging LACP.............................................................................................. 546
Shared LAG State Tracking...............................................................................................................546
Configuring Shared LAG State Tracking.....................................................................................547
Important Points about Shared LAG State Tracking..................................................................548
LACP Basic Configuration Example................................................................................................. 549
Configure a LAG on ALPHA........................................................................................................549
32 Layer 2.............................................................................................................. 557
Manage the MAC Address Table.......................................................................................................557
Clearing the MAC Address Table................................................................................................ 557
Setting the Aging Time for Dynamic Entries.............................................................................. 557
Configuring a Static MAC Address............................................................................................. 558
Displaying the MAC Address Table.............................................................................................558
MAC Learning Limit...........................................................................................................................558
mac learning-limit Dynamic.......................................................................................................559
mac learning-limit mac-address-sticky.....................................................................................559
mac learning-limit station-move............................................................................................... 559
Learning Limit Violation Actions.................................................................................................559
Setting Station Move Violation Actions......................................................................................560
Recovering from Learning Limit and Station Move Violations..................................................560
NIC Teaming......................................................................................................................................561
Configure Redundant Pairs.............................................................................................................. 562
Important Points about Configuring Redundant Pairs..............................................................564
Far-End Failure Detection................................................................................................................ 565
FEFD State Changes....................................................................................................................566
Configuring FEFD........................................................................................................................ 567
Enabling FEFD on an Interface...................................................................................................568
Debugging FEFD......................................................................................................................... 569
33 Link Layer Discovery Protocol (LLDP).........................................................571
802.1AB (LLDP) Overview..................................................................................................................571
Protocol Data Units..................................................................................................................... 571
Optional TLVs....................................................................................................................................572
Management TLVs.......................................................................................................................572
TIA-1057 (LLDP-MED) Overview................................................................................................ 574
Configure LLDP.................................................................................................................................579
Related Configuration Tasks.......................................................................................................579
Important Points to Remember................................................................................................. 580
LLDP Compatibility..................................................................................................................... 580
CONFIGURATION versus INTERFACE Configurations..............................................................580
Enabling LLDP..............................................................................................................................581
Disabling and Undoing LLDP...................................................................................................... 581
Enabling LLDP on Management Ports..............................................................................................581
Disabling and Undoing LLDP on Management Ports................................................................ 581
Advertising TLVs................................................................................................................................582
Viewing the LLDP Configuration......................................................................................................583
Viewing Information Advertised by Adjacent LLDP Agents............................................................ 584
Configuring LLDPDU Intervals......................................................................................................... 585
Configuring Transmit and Receive Mode........................................................................................ 585
Configuring a Time to Live...............................................................................................................586
Debugging LLDP............................................................................................................................... 587
Relevant Management Objects........................................................................................................588
34 Microsoft Network Load Balancing............................................................594
NLB Unicast Mode Scenario.............................................................................................................594
NLB Multicast Mode Scenario.......................................................................................................... 595
Limitations With Enabling NLB on Switches....................................................................................595
Benefits and Working of Microsoft Clustering.................................................................................595
Enable and Disable VLAN Flooding .................................................................................................596
Configuring a Switch for NLB ..........................................................................................................596
..................................................................................................................................................... 596
35 Multicast Source Discovery Protocol (MSDP)...........................................597
Protocol Overview............................................................................................................................ 597
Anycast RP........................................................................................................................................ 599
Implementation Information............................................................................................................599
Configure Multicast Source Discovery Protocol.............................................................................599
Related Configuration Tasks............................................................................................................ 599
Enable MSDP.....................................................................................................................................603
Manage the Source-Active Cache...................................................................................................604
Viewing the Source-Active Cache.............................................................................................604
Limiting the Source-Active Cache.............................................................................................604
Clearing the Source-Active Cache............................................................................................ 605
Enabling the Rejected Source-Active Cache............................................................................ 605
Accept Source-Active Messages that Fail the RFP Check.............................................................. 605
Specifying Source-Active Messages................................................................................................609
Limiting the Source-Active Messages from a Peer..........................................................................610
Preventing MSDP from Caching a Local Source............................................................................. 610
Preventing MSDP from Caching a Remote Source..........................................................................611
Preventing MSDP from Advertising a Local Source.........................................................................612
Logging Changes in Peership States................................................................................................ 613
Terminating a Peership..................................................................................................................... 613
Clearing Peer Statistics......................................................................................................................613
Debugging MSDP..............................................................................................................................614
Configuring Anycast RP.................................................................................................................... 614
Reducing Source-Active Message Flooding.............................................................................. 615
Specifying the RP Address Used in SA Messages....................................................................... 615
MSDP Sample Configurations.......................................................................................................... 618
36 Multiple Spanning Tree Protocol (MSTP).................................................. 622
Protocol Overview............................................................................................................................622
Configure Multiple Spanning Tree Protocol....................................................................................623
Related Configuration Tasks.......................................................................................................623
Enable Multiple Spanning Tree Globally.......................................................................................... 623
Adding and Removing Interfaces.....................................................................................................624
Creating Multiple Spanning Tree Instances.....................................................................................624
Influencing MSTP Root Selection.....................................................................................................625
Interoperate with Non-Dell Networking OS Bridges...................................................................... 626
Modifying Global Parameters...........................................................................................................626
Modifying the Interface Parameters.................................................................................................627
Configuring an EdgePort..................................................................................................................628
Configuring Fast Hellos for Link State Detection............................................................................629
Flush MAC Addresses after a Topology Change.............................................................................630
MSTP Sample Configurations.......................................................................................................... 630
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration.............................................................631
Debugging and Verifying MSTP Configurations..............................................................................633
37 Multicast Features..........................................................................................636
Enabling IP Multicast........................................................................................................................ 636
Implementation Information............................................................................................................636
First Packet Forwarding for Lossless Multicast................................................................................ 637
IPv4 Multicast Policies...................................................................................................................... 637
Limiting the Number of Multicast Routes.................................................................................. 637
Preventing a Host from Joining a Group...................................................................................638
Preventing a PIM Router from Forming an Adjacency.............................................................. 641
Preventing a Source from Registering with the RP....................................................................641
Preventing a PIM Router from Processing a Join......................................................................644
38 NPIV Proxy Gateway......................................................................................645
Benefits of an NPIV Proxy Gateway................................................................................................. 645
NPIV Proxy Gateway Operation.......................................................................................................645
NPIV Proxy Gateway: Protocol Services.................................................................................... 647
NPIV Proxy Gateway Functionality.............................................................................................647
NPIV Proxy Gateway: Terms and Definitions.............................................................................647
DCB Maps....................................................................................................................................649
FCoE Maps.................................................................................................................................. 649
Configure an NPIV Proxy Gateway.................................................................................................. 650
Enabling Fibre Channel Capability on the Switch..................................................................... 650
Creating a DCB Map................................................................................................................... 650
Applying a DCB Map on Server-Facing Ethernet Ports............................................................. 651
Creating an FCoE VLAN..............................................................................................................652
FCoE Maps...................................................................................................................................652
Applying an FCoE Map on Server-Facing Ethernet Ports..........................................................653
Applying an FCoE Map on Fabric-Facing FC Ports................................................................... 654
Sample Configuration.................................................................................................................654
Display NPIV Proxy Gateway Information....................................................................................... 656
39 Object Tracking..............................................................................................662
Object Tracking Overview................................................................................................................662
Track Layer 2 Interfaces..............................................................................................................663
Track Layer 3 Interfaces..............................................................................................................663
Track IPv4 and IPv6 Routes........................................................................................................664
Set Tracking Delays.....................................................................................................................665
VRRP Object Tracking.................................................................................................................665
Object Tracking Configuration........................................................................................................ 665
Tracking a Layer 2 Interface....................................................................................................... 665
Tracking a Layer 3 Interface....................................................................................................... 667
Track an IPv4/IPv6 Route........................................................................................................... 668
Displaying Tracked Objects..............................................................................................................672
40 Open Shortest Path First (OSPFv2).............................................................674
Protocol Overview............................................................................................................................674
Autonomous System (AS) Areas................................................................................................. 674
Designated and Backup Designated Routers............................................................................ 678
Link-State Advertisements (LSAs)............................................................................................... 678
Virtual Links................................................................................................................................. 679
Router Priority and Cost.............................................................................................................680
Implementing OSPF with Dell Networking OS............................................................................... 680
Fast Convergence (OSPFv2, IPv4 Only)......................................................................................681
Multi-Process OSPFv2 (IPv4 only).............................................................................................. 681
RFC-2328 Compliant OSPF Flooding........................................................................................ 681
OSPF ACK Packing......................................................................................................................682
OSPF Adjacency with Cisco Routers..........................................................................................682
Configuration Information............................................................................................................... 683
Configuration Task List for OSPFv2 (OSPF for IPv4)..................................................................683
Sample Configurations for OSPFv2........................................................................................... 698
41 Policy-based Routing (PBR)..........................................................................701
Overview............................................................................................................................................701
Implementing Policy-based Routing with Dell Networking OS..................................................... 703
Configuration Task List for Policy-based Routing...........................................................................703
PBR Exceptions (Permit)............................................................................................................. 706
Sample Configuration.......................................................................................................................709
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View
Redirect-List GOLD..................................................................................................................... 710
42 PIM Sparse-Mode (PIM-SM)......................................................................... 714
Implementation Information............................................................................................................ 714
Protocol Overview.............................................................................................................................714
Requesting Multicast Traffic........................................................................................................714
Refuse Multicast Traffic............................................................................................................... 715
Send Multicast Traffic.................................................................................................................. 715
Configuring PIM-SM..........................................................................................................................716
Configuring S,G Expiry Timers.......................................................................................................... 717
Configuring a Static Rendezvous Point............................................................................................718
Overriding Bootstrap Router Updates........................................................................................ 718
Configuring a Designated Router.....................................................................................................719
Creating Multicast Boundaries and Domains...................................................................................719
43 PIM Source-Specific Mode (PIM-SSM)....................................................... 721
Implementation Information.............................................................................................................721
Important Points to Remember.................................................................................................. 721
Configure PIM-SMM......................................................................................................................... 722
Related Configuration Tasks.......................................................................................................722
Enabling PIM-SSM.............................................................................................................................722
Use PIM-SSM with IGMP Version 2 Hosts........................................................................................722
Configuring PIM-SSM with IGMPv2............................................................................................723
44 Port Monitoring..............................................................................................725
Important Points to Remember........................................................................................................725
Port Monitoring.................................................................................................................................726
Configuring Port Monitoring............................................................................................................ 727
Enabling Flow-Based Monitoring.....................................................................................................729
Remote Port Mirroring......................................................................................................................730
Remote Port Mirroring Example.................................................................................................730
Configuring Remote Port Mirroring............................................................................................731
Displaying Remote-Port Mirroring Configurations....................................................................733
Configuring the Sample Remote Port Mirroring........................................................................733
Configuring the Encapsulated Remote Port Mirroring....................................................................737
Changes to Default BehaviorConfiguration steps for ERPM .................................................... 737
ERPM Behavior on a typical Dell Networking OS ........................................................................... 739
Decapsulation of ERPM packets at the Destination IP/ Analyzer..............................................739
45 Private VLANs (PVLAN).................................................................................. 741
Private VLAN Concepts..................................................................................................................... 741
Using the Private VLAN Commands.................................................................................................742
Configuration Task List..................................................................................................................... 743
Creating PVLAN Ports................................................................................................................. 743
Creating a Primary VLAN............................................................................................................ 744
Creating a Community VLAN..................................................................................................... 745
Creating an Isolated VLAN..........................................................................................................746
Private VLAN Configuration Example...............................................................................................747
Inspecting the Private VLAN Configuration............................................................................... 748
46 Per-VLAN Spanning Tree Plus (PVST+).......................................................751
Protocol Overview.............................................................................................................................751
Implementation Information............................................................................................................ 752
Configure Per-VLAN Spanning Tree Plus.........................................................................................752
Related Configuration Tasks.......................................................................................................752
Enabling PVST+.................................................................................................................................752
Disabling PVST+................................................................................................................................ 753
Influencing PVST+ Root Selection............................................................................................. 753
Modifying Global PVST+ Parameters............................................................................................... 755
Modifying Interface PVST+ Parameters........................................................................................... 756
Configuring an EdgePort.................................................................................................................. 757
PVST+ in Multi-Vendor Networks.................................................................................................... 758
Enabling PVST+ Extend System ID...................................................................................................758
PVST+ Sample Configurations......................................................................................................... 759
47 Quality of Service (QoS)................................................................................ 761
Implementation Information............................................................................................................ 763
Port-Based QoS Configurations.......................................................................................................763
Setting dot1p Priorities for Incoming Traffic..............................................................................764
Honoring dot1p Priorities on Ingress Traffic..............................................................................764
Configuring Port-Based Rate Policing....................................................................................... 765
Configuring Port-Based Rate Shaping....................................................................................... 765
Policy-Based QoS Configurations................................................................................................... 766
Classify Traffic............................................................................................................................. 766
Create a QoS Policy.................................................................................................................... 770
Create Policy Maps......................................................................................................................772
DSCP Color Maps..............................................................................................................................776
Creating a DSCP Color Map....................................................................................................... 776
Displaying DSCP Color Maps...................................................................................................... 777
Displaying a DSCP Color Policy Configuration ......................................................................... 777
Enabling QoS Rate Adjustment........................................................................................................ 778
Enabling Strict-Priority Queueing.................................................................................................... 778
Weighted Random Early Detection..................................................................................................779
Creating WRED Profiles.............................................................................................................. 780
Applying a WRED Profile to Traffic.............................................................................................780
Displaying Default and Configured WRED Profiles................................................................... 780
Displaying WRED Drop Statistics................................................................................................780
Pre-Calculating Available QoS CAM Space.....................................................................................780
Configuring Weights and ECN for WRED ....................................................................................... 782
Global Service Pools With WRED and ECN Settings..................................................................782
Configuring WRED and ECN Attributes........................................................................................... 784
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................ 785
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class..........785
Classifying Incoming Packets Using ECN and Color-Marking..................................................786
Sample configuration to mark non-ecn packets as “yellow” with single traffic class............. 788
Applying Layer 2 Match Criteria on a Layer 3 Interface.................................................................. 789
Applying DSCP and VLAN Match Criteria on a Service Queue.......................................................790
Classifying Incoming Packets Using ECN and Color-Marking........................................................791
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................ 793
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class................794
Sample configuration to mark non-ecn packets as “yellow” with single traffic class................... 794
48 Routing Information Protocol (RIP)........................................................... 796
Protocol Overview............................................................................................................................796
RIPv1............................................................................................................................................ 796
RIPv2............................................................................................................................................796
Implementation Information............................................................................................................ 797
Configuration Information................................................................................................................797
Configuration Task List............................................................................................................... 797
RIP Configuration Example.............................................................................................................. 803
RIP Configuration on Core2.......................................................................................................803
Core 2 RIP Output...................................................................................................................... 804
RIP Configuration on Core3.......................................................................................................805
Core 3 RIP Output...................................................................................................................... 805
RIP Configuration Summary.......................................................................................................807
49 Remote Monitoring (RMON)....................................................................... 809
Implementation Information........................................................................................................... 809
Fault Recovery.................................................................................................................................. 809
Setting the rmon Alarm...............................................................................................................810
Configuring an RMON Event.......................................................................................................811
Configuring RMON Collection Statistics.................................................................................... 811
Configuring the RMON Collection History................................................................................ 812
50 Rapid Spanning Tree Protocol (RSTP)........................................................813
Protocol Overview............................................................................................................................ 813
Configuring Rapid Spanning Tree.................................................................................................... 813
Related Configuration Tasks.......................................................................................................813
Important Points to Remember..................................................................................................813
RSTP and VLT.............................................................................................................................. 814
Configuring Interfaces for Layer 2 Mode.........................................................................................814
Enabling Rapid Spanning Tree Protocol Globally............................................................................816
Adding and Removing Interfaces............................................................................................... 818
Modifying Global Parameters..................................................................................................... 819
Modifying Interface Parameters.................................................................................................820
Configuring an EdgePort............................................................................................................820
Influencing RSTP Root Selection................................................................................................821
Enabling SNMP Traps for Root Elections and Topology Changes........................................... 822
51 Software-Defined Networking (SDN).........................................................823
52 Security............................................................................................................ 824
AAA Accounting................................................................................................................................824
Configuration Task List for AAA Accounting............................................................................. 824
AAA Authentication...........................................................................................................................826
Configuration Task List for AAA Authentication........................................................................ 827
Obscuring Passwords and Keys....................................................................................................... 829
AAA Authorization.............................................................................................................................830
Privilege Levels Overview........................................................................................................... 830
Configuration Task List for Privilege Levels...............................................................................830
RADIUS..............................................................................................................................................834
RADIUS Authentication and Authorization................................................................................ 835
Configuration Task List for RADIUS........................................................................................... 836
TACACS+.......................................................................................................................................... 839
Configuration Task List for TACACS+........................................................................................839
Command Authorization............................................................................................................ 841
Protection from TCP Tiny and Overlapping Fragment Attacks......................................................842
Enabling SCP and SSH......................................................................................................................842
Using SCP with SSH to Copy a Software Image........................................................................843
Secure Shell Authentication....................................................................................................... 844
Enabling SSH Authentication by Password................................................................................844
Using RSA Authentication of SSH...............................................................................................845
Configuring Host-Based SSH Authentication............................................................................845
Using Client-Based SSH Authentication....................................................................................846
Troubleshooting SSH..................................................................................................................847
Telnet.................................................................................................................................................847
VTY Line and Access-Class Configuration...................................................................................... 847
VTY Line Local Authentication and Authorization.....................................................................848
VTY Line Remote Authentication and Authorization................................................................ 848
VTY MAC-SA Filter Support........................................................................................................ 849
53 Service Provider Bridging.............................................................................850
VLAN Stacking...................................................................................................................................850
Important Points to Remember..................................................................................................851
Configure VLAN Stacking................................................................................................................. 852
Related Configuration Tasks.......................................................................................................852
Creating Access and Trunk Ports............................................................................................... 852
Enable VLAN-Stacking for a VLAN............................................................................................. 853
Configuring the Protocol Type Value for the Outer VLAN Tag................................................ 853
Dell Networking OS Options for Trunk Ports............................................................................ 853
Debugging VLAN Stacking..........................................................................................................854
VLAN Stacking in Multi-Vendor Networks.................................................................................855
VLAN Stacking Packet Drop Precedence........................................................................................ 859
Enabling Drop Eligibility..............................................................................................................859
Honoring the Incoming DEI Value.............................................................................................860
Marking Egress Packets with a DEI Value.................................................................................. 860
Dynamic Mode CoS for VLAN Stacking........................................................................................... 861
Mapping C-Tag to S-Tag dot1p Values..................................................................................... 862
Layer 2 Protocol Tunneling..............................................................................................................863
Implementation Information......................................................................................................865
Enabling Layer 2 Protocol Tunneling.........................................................................................865
Specifying a Destination MAC Address for BPDUs....................................................................866
Setting Rate-Limit BPDUs...........................................................................................................866
Debugging Layer 2 Protocol Tunneling.....................................................................................867
Provider Backbone Bridging.............................................................................................................867
54 sFlow................................................................................................................ 868
Overview...........................................................................................................................................868
Implementation Information............................................................................................................869
Important Points to Remember................................................................................................. 869
Enabling and Disabling sFlow...........................................................................................................870
Enabling and Disabling sFlow on an Interface................................................................................ 870
Enabling sFlow Max-Header Size Extended.................................................................................... 870
sFlow Show Commands................................................................................................................... 871
Displaying Show sFlow Global....................................................................................................872
Displaying Show sFlow on an Interface..................................................................................... 872
Displaying Show sFlow on a Stack-unit..................................................................................... 873
Configuring Specify Collectors........................................................................................................ 873
Changing the Polling Intervals......................................................................................................... 873
Back-Off Mechanism........................................................................................................................873
sFlow on LAG ports...........................................................................................................................874
55 Simple Network Management Protocol (SNMP)...................................... 875
Protocol Overview............................................................................................................................ 875
Implementation Information............................................................................................................ 875
Configuration Task List for SNMP.................................................................................................... 875
Related Configuration Tasks.......................................................................................................876
Important Points to Remember................................................................................................. 876
Set up SNMP......................................................................................................................................876
Creating a Community............................................................................................................... 876
Setting Up User-Based Security (SNMPv3).................................................................................877
Reading Managed Object Values..................................................................................................... 878
Writing Managed Object Values.......................................................................................................879
Configuring Contact and Location Information using SNMP.........................................................879
Subscribing to Managed Object Value Updates using SNMP.........................................................880
Enabling a Subset of SNMP Traps.................................................................................................... 881
Copy Configuration Files Using SNMP............................................................................................ 883
Copying a Configuration File..................................................................................................... 885
Copying Configuration Files via SNMP...................................................................................... 886
Copying the Startup-Config Files to the Running-Config........................................................886
Copying the Startup-Config Files to the Server via FTP............................................................887
Copying the Startup-Config Files to the Server via TFTP..........................................................887
Copy a Binary File to the Startup-Configuration.......................................................................888
Additional MIB Objects to View Copy Statistics........................................................................ 888
Obtaining a Value for MIB Objects.................................................................................................. 889
MIB Support to Display the Available Memory Size on Flash......................................................... 890
Viewing the Available Flash Memory Size..................................................................................890
MIB Support to Display the Software Core Files Generated by the System.................................. 890
Viewing the Software Core Files Generated by the System......................................................891
Manage VLANs using SNMP............................................................................................................. 891
Creating a VLAN.......................................................................................................................... 891
Assigning a VLAN Alias................................................................................................................892
Displaying the Ports in a VLAN................................................................................................... 892
Add Tagged and Untagged Ports to a VLAN..............................................................................893
Managing Overload on Startup........................................................................................................894
Enabling and Disabling a Port using SNMP......................................................................................895
Fetch Dynamic MAC Entries using SNMP........................................................................................896
Deriving Interface Indices.................................................................................................................897
Monitor Port-Channels.................................................................................................................... 898
Troubleshooting SNMP Operation.................................................................................................. 899
56 Stacking...........................................................................................................900
Stacking S5000 Switches.................................................................................................................900
Stack Management Roles........................................................................................................... 901
Stack Master Election................................................................................................................. 902
Virtual IP...................................................................................................................................... 903
Failover Roles..............................................................................................................................903
MAC Addressing..........................................................................................................................903
Stacking LAG...............................................................................................................................903
High Availability on S5000 Stacks..............................................................................................903
Management Access on S-Series Stacks...................................................................................904
S-Series Stacking Installation Tasks........................................................................................... 905
Stack Unit and Stack Group Numbering.................................................................................... 910
Supported Stacking Topologies..................................................................................................911
Configuring an S5000 Switch Stack.................................................................................................912
Stack and Cable Requirements...................................................................................................912
Cables for Stacked Switches.......................................................................................................913
Accessing the Stack CLI..............................................................................................................914
Assigning a Priority to Stacked Switches....................................................................................914
Renumbering a Stack Unit.......................................................................................................... 914
Configuring Stacking Ports and Bringing Up a Stack.......................................................................915
Provisioning a Stack Unit..................................................................................................................920
Loading...
+ 1096 hidden pages