Dell PowerSwitch S5048F-ON User Manual

Dell PowerSwitch S5048F-ON User Manual

Dell EMC Networking OS Configuration Guide for the S5048F–ON System

9.14.2.4

Notes, cautions, and warnings

NOTE: A NOTE indicates important information that helps you make better use of your product.

CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.

WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

© 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.

2019 - 11

Rev. A00

Contents

1 About this Guide..........................................................................................................................

31

Audience................................................................................................................................................................................

31

Conventions..........................................................................................................................................................................

31

Related Documents..............................................................................................................................................................

31

2 Configuration Fundamentals.......................................................................................................

32

Accessing the Command Line............................................................................................................................................

32

CLI Modes............................................................................................................................................................................

32

Navigating CLI Modes...................................................................................................................................................

34

The do Command................................................................................................................................................................

36

Undoing Commands............................................................................................................................................................

37

Obtaining Help......................................................................................................................................................................

37

Entering and Editing Commands.......................................................................................................................................

38

Command History................................................................................................................................................................

38

Filtering show Command Outputs....................................................................................................................................

39

Multiple Users in Configuration Mode..............................................................................................................................

40

Configuring alias command................................................................................................................................................

40

Viewing alias configuration............................................................................................................................................

41

3 Getting Started..........................................................................................................................

42

Console Access....................................................................................................................................................................

42

Serial Console.................................................................................................................................................................

42

Micro USB-B Access.....................................................................................................................................................

43

Default Configuration..........................................................................................................................................................

44

Configuring a Host Name...................................................................................................................................................

44

Accessing the System Remotely.......................................................................................................................................

44

Configure the Management Port IP Address.............................................................................................................

44

Configure a Management Route.................................................................................................................................

45

Configuring a Username and Password.....................................................................................................................

45

Configuring the Enable Password.....................................................................................................................................

45

Configuration File Management........................................................................................................................................

46

Copy Files to and from the System.............................................................................................................................

46

Mounting an NFS File System......................................................................................................................................

47

Save the Running-Configuration.................................................................................................................................

49

Configure the Overload Bit for a Startup Scenario...................................................................................................

49

Viewing Files...................................................................................................................................................................

49

Managing the File System...................................................................................................................................................

51

View Command History.......................................................................................................................................................

51

Upgrading Dell EMC Networking OS................................................................................................................................

52

Using HTTP for File Transfers...........................................................................................................................................

52

Verify Software Images Before Installation......................................................................................................................

53

4 Management..............................................................................................................................

54

Configuring Privilege Levels...............................................................................................................................................

54

Contents 3

Removing a Command from EXEC Mode..................................................................................................................

55

Moving a Command from EXEC Privilege Mode to EXEC Mode...........................................................................

55

Allowing Access to CONFIGURATION Mode Commands.......................................................................................

55

Allowing Access to Different Modes...........................................................................................................................

55

Applying a Privilege Level to a Username...................................................................................................................

56

Applying a Privilege Level to a Terminal Line.............................................................................................................

56

Configuring Logging............................................................................................................................................................

57

Audit and Security Logs................................................................................................................................................

57

Configuring Logging Format ................................................................................................................................

58

Setting Up a Secure Connection to a Syslog Server.......................................................................................

59

Log Messages in the Internal Buffer.................................................................................................................................

60

Disabling System Logging..................................................................................................................................................

60

Sending System Messages to a Syslog Server...............................................................................................................

60

Configuring a UNIX System as a Syslog Server........................................................................................................

60

Track Login Activity.............................................................................................................................................................

61

Restrictions for Tracking Login Activity......................................................................................................................

61

Configuring Login Activity Tracking.............................................................................................................................

61

Display Login Statistics..................................................................................................................................................

61

Limit Concurrent Login Sessions.......................................................................................................................................

63

Restrictions for Limiting the Number of Concurrent Sessions................................................................................

63

Configuring Concurrent Session Limit........................................................................................................................

63

Enabling the System to Clear Existing Sessions........................................................................................................

63

Enabling Secured CLI Mode...............................................................................................................................................

64

Changing System Logging Settings..................................................................................................................................

64

Display the Logging Buffer and the Logging Configuration...........................................................................................

65

Configuring a UNIX Logging Facility Level.......................................................................................................................

68

Synchronizing Log Messages............................................................................................................................................

68

Enabling Timestamp on Syslog Messages.......................................................................................................................

69

File Transfer Services..........................................................................................................................................................

70

Enabling the FTP Server...............................................................................................................................................

70

Configuring FTP Server Parameters............................................................................................................................

71

Configuring FTP Client Parameters.............................................................................................................................

71

Terminal Lines......................................................................................................................................................................

72

Denying and Permitting Access to a Terminal Line...................................................................................................

72

Configuring Login Authentication for Terminal Lines................................................................................................

73

Setting Timeout for EXEC Privilege Mode.......................................................................................................................

73

Using Telnet to get to Another Network Device.............................................................................................................

74

Lock CONFIGURATION Mode...........................................................................................................................................

74

Reloading the system..........................................................................................................................................................

75

Restoring the Factory Default Settings............................................................................................................................

76

Restoring Factory Default Environment Variables....................................................................................................

76

5 802.1X.......................................................................................................................................

78

Port-Authentication Process.............................................................................................................................................

79

EAP over RADIUS..........................................................................................................................................................

80

Configuring 802.1X..............................................................................................................................................................

80

Important Points to Remember..........................................................................................................................................

81

Enabling 802.1X....................................................................................................................................................................

81

Configuring dot1x Profile ...................................................................................................................................................

82

Configuring the Static MAB and MAB Profile ................................................................................................................

83

4 Contents

Configuring Critical VLAN .................................................................................................................................................

84

Configuring MAC addresses for a do1x Profile................................................................................................................

84

Configuring Request Identity Re-Transmissions.............................................................................................................

85

Configuring a Quiet Period after a Failed Authentication.........................................................................................

85

Forcibly Authorizing or Unauthorizing a Port...................................................................................................................

86

Re-Authenticating a Port...................................................................................................................................................

86

Configuring Timeouts..........................................................................................................................................................

87

Configuring Dynamic VLAN Assignment with Port Authentication..............................................................................

88

Guest and Authentication-Fail VLANs..............................................................................................................................

89

Configuring a Guest VLAN...........................................................................................................................................

90

Configuring an Authentication-Fail VLAN..................................................................................................................

90

6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)..........................

92

Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................................................

92

Guidelines for Configuring ACL VLAN Groups................................................................................................................

92

Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters...................................................

93

Configuring ACL VLAN Groups...................................................................................................................................

93

Configuring FP Blocks for VLAN Parameters............................................................................................................

94

Viewing CAM Usage...........................................................................................................................................................

94

Allocating FP Blocks for VLAN Processes.......................................................................................................................

97

ACL Optimization to Increase Number of Supported IPv4 ACLs..................................................................................

97

Optimizing ACL for More Number of IPv4 ACL Rules..............................................................................................

97

7 Access Control Lists (ACLs)........................................................................................................

99

IP Access Control Lists (ACLs)........................................................................................................................................

100

CAM Usage...................................................................................................................................................................

100

Implementing ACLs on Dell EMC Networking OS....................................................................................................

101

Configure ACL Range Profiles..........................................................................................................................................

102

Important Points to Remember.......................................................................................................................................

103

Configuration Task List for Route Maps...................................................................................................................

103

Configuring Match Routes..........................................................................................................................................

105

Configuring Set Conditions.........................................................................................................................................

106

Configure a Route Map for Route Redistribution....................................................................................................

107

Configure a Route Map for Route Tagging..............................................................................................................

108

Continue Clause...........................................................................................................................................................

108

IP Fragment Handling........................................................................................................................................................

108

IP Fragments ACL Examples......................................................................................................................................

109

Layer 4 ACL Rules Examples......................................................................................................................................

109

Configure a Standard IP ACL............................................................................................................................................

110

Configuring a Standard IP ACL Filter..........................................................................................................................

111

Configure an Extended IP ACL..........................................................................................................................................

111

Configuring Filters with a Sequence Number............................................................................................................

111

Configuring Filters Without a Sequence Number.....................................................................................................

115

Configure Layer 2 and Layer 3 ACLs...............................................................................................................................

115

Assign an IP ACL to an Interface......................................................................................................................................

116

Applying an IP ACL.............................................................................................................................................................

116

Counting ACL Hits........................................................................................................................................................

117

Configure Ingress ACLs......................................................................................................................................................

117

Configure Egress ACLs......................................................................................................................................................

117

Contents 5

Applying Egress Layer 3 ACLs (Control-Plane)........................................................................................................

118

Configuring UDF ACL.........................................................................................................................................................

119

IP Prefix Lists......................................................................................................................................................................

122

Configuration Task List for Prefix Lists.....................................................................................................................

122

ACL Resequencing.............................................................................................................................................................

125

Resequencing an ACL or Prefix List..........................................................................................................................

126

Route Maps.........................................................................................................................................................................

127

8 Bidirectional Forwarding Detection (BFD)...................................................................................

128

How BFD Works.................................................................................................................................................................

128

BFD Packet Format.....................................................................................................................................................

129

BFD Sessions................................................................................................................................................................

130

BFD Three-Way Handshake........................................................................................................................................

131

Session State Changes................................................................................................................................................

132

Important Points to Remember........................................................................................................................................

132

Configure BFD....................................................................................................................................................................

132

Configure BFD for Physical Ports..............................................................................................................................

133

Configure BFD for Static Routes...............................................................................................................................

134

Configure BFD for OSPF............................................................................................................................................

136

Configure BFD for OSPFv3.........................................................................................................................................

141

Configure BFD for IS-IS...............................................................................................................................................

144

Configure BFD for BGP...............................................................................................................................................

145

Configure BFD for VRRP.............................................................................................................................................

151

Configuring Protocol Liveness....................................................................................................................................

154

Troubleshooting BFD...................................................................................................................................................

154

9 Border Gateway Protocol (BGP)................................................................................................

155

BGP IP version 4 (BGPv4) Overview.............................................................................................................................

155

BGP Autonomous Systems........................................................................................................................................

155

AS4 Number Representation......................................................................................................................................

157

Four-Byte AS Numbers...............................................................................................................................................

159

BGP router ID...............................................................................................................................................................

159

Sessions and Peers......................................................................................................................................................

159

Establish a Session.......................................................................................................................................................

159

BGP Attributes for selecting Best Path....................................................................................................................

160

Multiprotocol BGP.......................................................................................................................................................

165

BGP global and address family configuration...........................................................................................................

166

Implement BGP with Dell EMC Networking OS.......................................................................................................

167

Configuration Information...........................................................................................................................................

170

Basic BGP configuration tasks.........................................................................................................................................

170

Prerequisite for configuring a BGP network.............................................................................................................

170

Restrictions...................................................................................................................................................................

170

Enabling BGP................................................................................................................................................................

170

Enabling four-byte autonomous system numbers...................................................................................................

172

Changing a BGP router ID...........................................................................................................................................

173

Configuring AS4 Number Representations...............................................................................................................

173

Configuring a BGP peer...............................................................................................................................................

174

Example-Configuring BGP routing between peers..................................................................................................

175

BGP peer group............................................................................................................................................................

176

6 Contents

Advanced BGP configuration tasks.................................................................................................................................

183

Route-refresh and Soft-reconfiguration...................................................................................................................

183

Aggregating Routes.....................................................................................................................................................

185

Filtering BGP.................................................................................................................................................................

187

Configuring BGP Fast Fall-Over.................................................................................................................................

192

Configuring Passive Peering.......................................................................................................................................

193

Enabling Graceful Restart...........................................................................................................................................

194

Redistributing Routes..................................................................................................................................................

195

Enabling Additional Paths............................................................................................................................................

195

Configuring IP Community Lists.................................................................................................................................

196

Configuring an IP Extended Community List............................................................................................................

197

Configure BGP attributes...........................................................................................................................................

198

Enabling Multipath.......................................................................................................................................................

201

Route Reflectors.........................................................................................................................................................

202

Enabling Route Flap Dampening................................................................................................................................

203

Changing BGP keepalive and hold timers................................................................................................................

205

Setting the extended timer........................................................................................................................................

205

Enabling or disabling BGP neighbors........................................................................................................................

206

Route Map Continue...................................................................................................................................................

207

Configuring BGP Confederations..............................................................................................................................

207

Configuring a BGP VRF address family....................................................................................................................

208

Maintaining Existing AS Numbers During an AS Migration....................................................................................

209

Allowing an AS Number to Appear in its Own AS Path...........................................................................................

210

Enabling MBGP Configurations...................................................................................................................................

211

MBGP support for IPv6...............................................................................................................................................

211

Configuring IPv6 MBGP between peers....................................................................................................................

211

Example-Configuring IPv4 and IPv6 neighbors........................................................................................................

212

Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor.............................................

214

BGP Regular Expression Optimization......................................................................................................................

215

Debugging BGP............................................................................................................................................................

216

10 Content Addressable Memory (CAM)........................................................................................

218

CAM Allocation...................................................................................................................................................................

218

Test CAM Usage...............................................................................................................................................................

220

View CAM-ACL Settings..................................................................................................................................................

220

View CAM Usage...............................................................................................................................................................

221

CAM Optimization.............................................................................................................................................................

222

Troubleshoot CAM Profiling.............................................................................................................................................

222

QoS CAM Region Limitation......................................................................................................................................

222

Syslog Error When the Table is Full..........................................................................................................................

222

Syslog Warning Upon 90 Percent Utilization of CAM............................................................................................

223

Syslog Warning for Discrepancies Between Configured Extended Prefixes.......................................................

223

Unified Forwarding Table (UFT) Modes.........................................................................................................................

223

Configuring UFT Modes.............................................................................................................................................

223

11 Control Plane Policing (CoPP)..................................................................................................

225

Configure Control Plane Policing.....................................................................................................................................

226

Configuring CoPP for Protocols................................................................................................................................

227

Configuring CoPP for CPU Queues..........................................................................................................................

228

Contents 7

Protocol to CPU Queue Mapping.............................................................................................................................

229

Configuring Protocol to CPU Queue Mapping........................................................................................................

230

Displaying CoPP Configuration .................................................................................................................................

230

12 Data Center Bridging (DCB).....................................................................................................

233

Ethernet Enhancements in Data Center Bridging.........................................................................................................

233

Priority-Based Flow Control.......................................................................................................................................

234

Enhanced Transmission Selection.............................................................................................................................

235

Data Center Bridging Exchange Protocol (DCBx)..................................................................................................

236

Data Center Bridging in a Traffic Flow.....................................................................................................................

237

Buffer Organization.....................................................................................................................................................

237

Enabling Data Center Bridging........................................................................................................................................

240

DCB Maps and its Attributes.....................................................................................................................................

240

Data Center Bridging: Default Configuration..................................................................................................................

241

Configuring Priority-Based Flow Control........................................................................................................................

241

Configuring Lossless Queues.....................................................................................................................................

242

Configuring PFC in a DCB Map.......................................................................................................................................

243

Applying a DCB Map on a Port........................................................................................................................................

244

Configuring PFC without a DCB Map............................................................................................................................

245

Priority-Based Flow Control Using Dynamic Buffer Method.......................................................................................

246

Shared headroom for lossless or PFC packets..............................................................................................................

247

Configuring Shared Head Room Buffer....................................................................................................................

249

Viewing Shared Head Room Usage..........................................................................................................................

249

Monitoring Buffer Statistics for Tracking Purposes...............................................................................................

249

Behavior of Tagged Packets...........................................................................................................................................

250

Configuration Example for DSCP and PFC Priorities...................................................................................................

250

SNMP Support for PFC and Buffer Statistics Tracking...............................................................................................

251

Performing PFC Using DSCP Bits Instead of 802.1p Bits............................................................................................

251

PFC and ETS Configuration Examples...........................................................................................................................

253

Using PFC to Manage Converged Ethernet Traffic.....................................................................................................

253

Operations on Untagged Packets...................................................................................................................................

253

Generation of PFC for a Priority for Untagged Packets..............................................................................................

253

Configure Enhanced Transmission Selection................................................................................................................

253

Creating an ETS Priority Group.................................................................................................................................

253

ETS Operation with DCBx..........................................................................................................................................

254

Configuring ETS in a DCB Map.................................................................................................................................

255

Hierarchical Scheduling in ETS Output Policies............................................................................................................

256

Using ETS to Manage Converged Ethernet Traffic.....................................................................................................

256

Applying DCB Policies in a Switch Stack.......................................................................................................................

256

Configure a DCBx Operation...........................................................................................................................................

257

DCBx Operation...........................................................................................................................................................

257

DCBx Port Roles..........................................................................................................................................................

257

DCB Configuration Exchange....................................................................................................................................

258

Configuration Source Election...................................................................................................................................

259

Propagation of DCB Information...............................................................................................................................

259

Auto-Detection and Manual Configuration of the DCBx Version.........................................................................

259

DCBx Example.............................................................................................................................................................

260

DCBx Prerequisites and Restrictions........................................................................................................................

260

Configuring DCBx........................................................................................................................................................

260

Verifying the DCB Configuration.....................................................................................................................................

263

8 Contents

QoS dot1p Traffic Classification and Queue Assignment..............................................................................................

271

Configuring the Dynamic Buffer Method........................................................................................................................

271

Sample DCB Configuration..............................................................................................................................................

272

13 Dynamic Host Configuration Protocol (DHCP)...........................................................................

274

DHCP Packet Format and Options.................................................................................................................................

274

Assign an IP Address using DHCP..................................................................................................................................

275

Implementation Information.............................................................................................................................................

276

Configure the System to be a DHCP Server.................................................................................................................

277

Configuring the Server for Automatic Address Allocation.....................................................................................

277

Specifying a Default Gateway....................................................................................................................................

278

Configure a Method of Hostname Resolution.........................................................................................................

278

Using DNS for Address Resolution............................................................................................................................

278

Using NetBIOS WINS for Address Resolution.........................................................................................................

279

Creating Manual Binding Entries...............................................................................................................................

279

Debugging the DHCP Server.....................................................................................................................................

279

Using DHCP Clear Commands..................................................................................................................................

279

Configure the System to be a DHCP Client..................................................................................................................

280

Configuring the DHCP Client System.......................................................................................................................

280

DHCP Client on a Management Interface................................................................................................................

281

DHCP Client Operation with Other Features..........................................................................................................

282

Configuring DHCP relay source interface......................................................................................................................

282

Global DHCP relay source IPv4 or IPv6 configuration ...........................................................................................

282

Interface level DHCP relay source IPv4 or IPv6 configuration .............................................................................

283

Configure Secure DHCP..................................................................................................................................................

284

Option 82 (DHCPv4 relay options)...........................................................................................................................

284

DHCPv6 relay agent options.....................................................................................................................................

285

DHCP Snooping...........................................................................................................................................................

285

Drop DHCP Packets on Snooped VLANs Only.......................................................................................................

289

Dynamic ARP Inspection............................................................................................................................................

289

Configuring Dynamic ARP Inspection.......................................................................................................................

290

Source Address Validation................................................................................................................................................

291

Enabling IP Source Address Validation......................................................................................................................

291

DHCP MAC Source Address Validation...................................................................................................................

292

Enabling IP+MAC Source Address Validation..........................................................................................................

292

Viewing the Number of SAV Dropped Packets.......................................................................................................

292

Clearing the Number of SAV Dropped Packets......................................................................................................

293

14 Equal Cost Multi-Path (ECMP).................................................................................................

294

ECMP for Flow-Based Affinity........................................................................................................................................

294

Configuring the Hash Algorithm................................................................................................................................

294

Enabling Deterministic ECMP Next Hop..................................................................................................................

294

Configuring the Hash Algorithm Seed......................................................................................................................

294

Link Bundle Monitoring.....................................................................................................................................................

295

Managing ECMP Group Paths..................................................................................................................................

295

Creating an ECMP Group Bundle.............................................................................................................................

296

Modifying the ECMP Group Threshold....................................................................................................................

296

Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table........................................

297

Support for ECMP in host table................................................................................................................................

297

Contents 9

Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes

............................................................................297

15 FIP Snooping..........................................................................................................................

298

Fibre Channel over Ethernet............................................................................................................................................

298

Ensure Robustness in a Converged Ethernet Network...............................................................................................

298

FIP Snooping on Ethernet Bridges..................................................................................................................................

299

Using FIP Snooping............................................................................................................................................................

301

FIP Snooping Prerequisites.........................................................................................................................................

301

Important Points to Remember..................................................................................................................................

301

Enabling the FCoE Transit Feature...........................................................................................................................

303

Enable FIP Snooping on VLANs.................................................................................................................................

303

Configure the FC-MAP Value....................................................................................................................................

303

Configure a Port for a Bridge-to-Bridge Link..........................................................................................................

303

Configure a Port for a Bridge-to-FCF Link..............................................................................................................

303

Impact on Other Software Features.........................................................................................................................

304

FIP Snooping Restrictions..........................................................................................................................................

304

Configuring FIP Snooping...........................................................................................................................................

304

Displaying FIP Snooping Information..............................................................................................................................

305

FCoE Transit Configuration Example.............................................................................................................................

309

16 Flex Hash and Optimized Boot-Up..............................................................................................

311

Flex Hash Capability Overview..........................................................................................................................................

311

Configuring the Flex Hash Mechanism............................................................................................................................

311

RDMA Over Converged Ethernet (RoCE) Overview....................................................................................................

312

Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.........................................................................................

312

17 Force10 Resilient Ring Protocol (FRRP).....................................................................................

314

Protocol Overview.............................................................................................................................................................

314

Ring Status....................................................................................................................................................................

315

Multiple FRRP Rings....................................................................................................................................................

315

Important FRRP Points...............................................................................................................................................

316

Important FRRP Concepts..........................................................................................................................................

317

Implementing FRRP...........................................................................................................................................................

317

FRRP Configuration...........................................................................................................................................................

318

Creating the FRRP Group...........................................................................................................................................

318

Configuring the Control VLAN...................................................................................................................................

318

Configuring and Adding the Member VLANs...........................................................................................................

319

Setting the FRRP Timers...........................................................................................................................................

320

Clearing the FRRP Counters......................................................................................................................................

320

Viewing the FRRP Configuration..............................................................................................................................

320

Viewing the FRRP Information..................................................................................................................................

320

Troubleshooting FRRP......................................................................................................................................................

321

Sample Configuration and Topology................................................................................................................................

321

FRRP Support on VLT......................................................................................................................................................

322

18 GARP VLAN Registration Protocol (GVRP)................................................................................

325

Configure GVRP................................................................................................................................................................

325

Enabling GVRP Globally....................................................................................................................................................

326

Enabling GVRP on a Layer 2 Interface...........................................................................................................................

327

10 Contents

Configure GVRP Registration..........................................................................................................................................

327

Configure a GARP Timer..................................................................................................................................................

327

19 Internet Group Management Protocol (IGMP)...........................................................................

329

IGMP Protocol Overview.................................................................................................................................................

329

IGMP Version 2............................................................................................................................................................

329

IGMP Version 3............................................................................................................................................................

330

Configure IGMP.................................................................................................................................................................

333

Viewing IGMP Enabled Interfaces...................................................................................................................................

333

Selecting an IGMP Version..............................................................................................................................................

334

Viewing IGMP Groups......................................................................................................................................................

334

Adjusting Timers................................................................................................................................................................

335

Adjusting Query and Response Timers.....................................................................................................................

335

Enabling IGMP Immediate-Leave....................................................................................................................................

335

IGMP Snooping..................................................................................................................................................................

336

Configuring IGMP Snooping......................................................................................................................................

336

Removing a Group-Port Association.........................................................................................................................

337

Disabling Multicast Flooding.......................................................................................................................................

337

Specifying a Port as Connected to a Multicast Router..........................................................................................

337

Configuring the Switch as Querier............................................................................................................................

337

Fast Convergence after MSTP Topology Changes......................................................................................................

338

Egress Interface Selection (EIS) for HTTP and IGMP Applications...........................................................................

338

Designating a Multicast Router Interface......................................................................................................................

344

20 Interfaces..............................................................................................................................

345

Interface Types..................................................................................................................................................................

346

View Basic Interface Information....................................................................................................................................

346

Resetting an Interface to its Factory Default State.....................................................................................................

348

Enabling a Physical Interface...........................................................................................................................................

348

Physical Interfaces............................................................................................................................................................

349

Configuration Task List for Physical Interfaces.......................................................................................................

349

Overview of Layer Modes..........................................................................................................................................

349

Configuring Layer 2 (Data Link) Mode.....................................................................................................................

349

Configuring Layer 2 (Interface) Mode......................................................................................................................

350

Configuring Layer 3 (Network) Mode......................................................................................................................

350

Configuring Layer 3 (Interface) Mode......................................................................................................................

350

Egress Interface Selection (EIS)......................................................................................................................................

351

Configuring EIS.............................................................................................................................................................

351

Management Interfaces...................................................................................................................................................

352

Configuring Management Interfaces........................................................................................................................

352

Configuring a Management Interface on an Ethernet Port...................................................................................

352

VLAN Interfaces................................................................................................................................................................

353

Loopback Interfaces.........................................................................................................................................................

353

Null Interfaces....................................................................................................................................................................

354

Configuring Port Delay.....................................................................................................................................................

354

Port Channel Interfaces...................................................................................................................................................

354

Port Channel Definition and Standards....................................................................................................................

355

Port Channel Benefits................................................................................................................................................

355

Port Channel Implementation....................................................................................................................................

355

Contents 11

Interfaces in Port Channels........................................................................................................................................

355

Configuration Tasks for Port Channel Interfaces...................................................................................................

356

Creating a Port Channel.............................................................................................................................................

356

Adding a Physical Interface to a Port Channel........................................................................................................

356

Reassigning an Interface to a New Port Channel...................................................................................................

358

Configuring the Minimum Oper Up Links in a Port Channel..................................................................................

358

Adding or Removing a Port Channel from a VLAN.................................................................................................

359

Assigning an IP Address to a Port Channel..............................................................................................................

359

Deleting or Disabling a Port Channel.........................................................................................................................

360

Load Balancing Through Port Channels...................................................................................................................

360

Load-Balancing Method.............................................................................................................................................

360

Changing the Hash Algorithm....................................................................................................................................

360

Bulk Configuration..............................................................................................................................................................

361

Interface Range............................................................................................................................................................

361

Bulk Configuration Examples.....................................................................................................................................

362

Defining Interface Range Macros...................................................................................................................................

363

Define the Interface Range........................................................................................................................................

363

Choosing an Interface-Range Macro........................................................................................................................

364

Monitoring and Maintaining Interfaces...........................................................................................................................

364

Maintenance Using TDR.............................................................................................................................................

365

Non Dell-Qualified Transceivers......................................................................................................................................

365

Splitting 100G Ports..........................................................................................................................................................

366

Link Dampening.................................................................................................................................................................

366

Enabling Link Dampening............................................................................................................................................

369

Link Bundle Monitoring.....................................................................................................................................................

370

Using Ethernet Pause Frames for Flow Control............................................................................................................

370

Enabling Pause Frames................................................................................................................................................

371

Configure the MTU Size on an Interface........................................................................................................................

371

Configuring wavelength for 10–Gigabit SFP+ optics...................................................................................................

372

Port-Pipes..........................................................................................................................................................................

372

CR4 Auto-Negotiation......................................................................................................................................................

372

Setting the Speed of Ethernet Interfaces......................................................................................................................

373

Speed Setting on 25G Interfaces....................................................................................................................................

374

Configuring 10G speed on 25G ports.............................................................................................................................

375

FEC Configuration.............................................................................................................................................................

376

View Advanced Interface Information............................................................................................................................

378

Configuring the Interface Sampling Size..................................................................................................................

378

Configuring the Traffic Sampling Size Globally.............................................................................................................

379

Dynamic Counters..............................................................................................................................................................

381

Clearing Interface Counters........................................................................................................................................

381

Enhanced Validation of Interface Ranges......................................................................................................................

382

Compressing Configuration Files.....................................................................................................................................

382

OUI on 25G and 50G Interfaces......................................................................................................................................

384

Configuring OUI on 25G and 50G Interfaces..........................................................................................................

384

21 IPv4 Routing...........................................................................................................................

385

IP Addresses......................................................................................................................................................................

386

Configuration Tasks for IP Addresses............................................................................................................................

386

Assigning IP Addresses to an Interface..........................................................................................................................

386

Configuring Static Routes................................................................................................................................................

387

12 Contents

Adding description for IPv4 and IPv6 static routes................................................................................................

388

Configure Static Routes for the Management Interface.............................................................................................

388

Using the Configured Source IP Address in ICMP Messages.....................................................................................

389

Configuring the Duration to Establish a TCP Connection...........................................................................................

389

Enabling Directed Broadcast...........................................................................................................................................

390

Resolution of Host Names...............................................................................................................................................

390

Enabling Dynamic Resolution of Host Names...............................................................................................................

390

Specifying the Local System Domain and a List of Domains.......................................................................................

391

Configuring DNS with Traceroute...................................................................................................................................

391

ARP.....................................................................................................................................................................................

392

Configuration Tasks for ARP...........................................................................................................................................

392

Configuring Static ARP Entries.......................................................................................................................................

392

Enabling Proxy ARP..........................................................................................................................................................

392

Clearing ARP Cache..........................................................................................................................................................

393

ARP Learning via Gratuitous ARP...................................................................................................................................

393

Enabling ARP Learning via Gratuitous ARP...................................................................................................................

393

ARP Learning via ARP Request.......................................................................................................................................

393

Configuring ARP Retries..................................................................................................................................................

394

ICMP...................................................................................................................................................................................

395

Configuration Tasks for ICMP.........................................................................................................................................

395

Enabling ICMP Unreachable Messages..........................................................................................................................

395

ICMP Redirects.................................................................................................................................................................

395

UDP Helper........................................................................................................................................................................

396

Enabling UDP Helper.........................................................................................................................................................

397

Configuring a Broadcast Address....................................................................................................................................

397

Configurations Using UDP Helper...................................................................................................................................

398

UDP Helper with Broadcast-All Addresses....................................................................................................................

398

UDP Helper with Subnet Broadcast Addresses............................................................................................................

399

UDP Helper with Configured Broadcast Addresses.....................................................................................................

399

UDP Helper with No Configured Broadcast Addresses...............................................................................................

400

Troubleshooting UDP Helper...........................................................................................................................................

400

22 IPv6 Routing...........................................................................................................................

401

Protocol Overview.............................................................................................................................................................

401

Extended Address Space............................................................................................................................................

401

Path MTU discovery....................................................................................................................................................

401

Stateless Autoconfiguration.......................................................................................................................................

402

IPv6 Headers................................................................................................................................................................

403

Longest Prefix Match (LPM) Table and IPv6 /65 – /128 support......................................................................

403

IPv6 Header Fields......................................................................................................................................................

403

Extension Header Fields.............................................................................................................................................

404

Addressing....................................................................................................................................................................

405

Implementing IPv6 with Dell EMC Networking OS......................................................................................................

406

ICMPv6..............................................................................................................................................................................

406

Path MTU discovery.........................................................................................................................................................

406

IPv6 Neighbor Discovery..................................................................................................................................................

407

IPv6 Neighbor Discovery of MTU Packets..............................................................................................................

408

Configuring the IPv6 Recursive DNS Server...........................................................................................................

408

Debugging IPv6 RDNSS Information Sent to the Host ........................................................................................

409

Displaying IPv6 RDNSS Information.........................................................................................................................

409

Contents 13

Secure Shell (SSH) Over an IPv6 Transport..................................................................................................................

410

Configuration Tasks for IPv6............................................................................................................................................

410

Adjusting Your CAM-Profile........................................................................................................................................

410

Assigning an IPv6 Address to an Interface................................................................................................................

411

Assigning a Static IPv6 Route.....................................................................................................................................

411

Configuring Telnet with IPv6......................................................................................................................................

412

SNMP over IPv6..........................................................................................................................................................

412

Displaying IPv6 Information.........................................................................................................................................

412

Displaying an IPv6 Interface Information..................................................................................................................

412

Showing IPv6 Routes..................................................................................................................................................

413

Showing the Running-Configuration for an Interface.............................................................................................

414

Clearing IPv6 Routes...................................................................................................................................................

415

Configuring IPv6 RA Guard..............................................................................................................................................

415

23 iSCSI Optimization..................................................................................................................

417

iSCSI Optimization Overview............................................................................................................................................

417

Monitoring iSCSI Traffic Flows...................................................................................................................................

418

Application of Quality of Service to iSCSI Traffic Flows.........................................................................................

418

Information Monitored in iSCSI Traffic Flows..........................................................................................................

419

Detection and Auto-Configuration for Dell EqualLogic Arrays...............................................................................

419

Configuring Detection and Ports for Dell Compellent Arrays................................................................................

420

Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer..................................................................

420

Enable and Disable iSCSI Optimization......................................................................................................................

421

Default iSCSI Optimization Values...................................................................................................................................

421

iSCSI Optimization Prerequisites.....................................................................................................................................

421

Configuring iSCSI Optimization.......................................................................................................................................

422

Displaying iSCSI Optimization Information.....................................................................................................................

423

24 Intermediate System to Intermediate System...........................................................................

425

IS-IS Protocol Overview...................................................................................................................................................

425

IS-IS Addressing................................................................................................................................................................

425

Multi-Topology IS-IS.........................................................................................................................................................

426

Transition Mode...........................................................................................................................................................

426

Interface Support........................................................................................................................................................

426

Adjacencies...................................................................................................................................................................

426

Graceful Restart................................................................................................................................................................

427

Timers............................................................................................................................................................................

427

Implementation Information.............................................................................................................................................

427

Configuration Information................................................................................................................................................

428

Configuration Tasks for IS-IS.....................................................................................................................................

428

Configuring the Distance of a Route........................................................................................................................

435

Changing the IS-Type.................................................................................................................................................

435

Redistributing IPv4 Routes.........................................................................................................................................

437

Redistributing IPv6 Routes.........................................................................................................................................

438

Configuring Authentication Passwords....................................................................................................................

438

Setting the Overload Bit.............................................................................................................................................

439

Debugging IS-IS...........................................................................................................................................................

439

IS-IS Metric Styles............................................................................................................................................................

440

Configure Metric Values...................................................................................................................................................

440

14 Contents

Maximum Values in the Routing Table.....................................................................................................................

440

Change the IS-IS Metric Style in One Level Only...................................................................................................

440

Leaks from One Level to Another.............................................................................................................................

442

Sample Configurations......................................................................................................................................................

442

25 Link Aggregation Control Protocol (LACP)................................................................................

445

Introduction to Dynamic LAGs and LACP......................................................................................................................

445

Important Points to Remember.................................................................................................................................

445

LACP Modes................................................................................................................................................................

445

Configuring LACP Commands...................................................................................................................................

446

LACP Configuration Tasks...............................................................................................................................................

446

Creating a LAG............................................................................................................................................................

446

Configuring the LAG Interfaces as Dynamic............................................................................................................

447

Setting the LACP Long Timeout...............................................................................................................................

447

Monitoring and Debugging LACP..............................................................................................................................

448

Shared LAG State Tracking.............................................................................................................................................

448

Configuring Shared LAG State Tracking..................................................................................................................

449

Important Points about Shared LAG State Tracking..............................................................................................

450

LACP Basic Configuration Example................................................................................................................................

450

Configure a LAG on ALPHA.......................................................................................................................................

450

26 Layer 2..................................................................................................................................

458

Manage the MAC Address Table....................................................................................................................................

458

Clearing the MAC Address Table..............................................................................................................................

458

Setting the Aging Time for Dynamic Entries...........................................................................................................

458

Configuring a Static MAC Address...........................................................................................................................

458

Displaying the MAC Address Table...........................................................................................................................

459

MAC Learning Limit..........................................................................................................................................................

459

Setting the MAC Learning Limit................................................................................................................................

459

mac learning-limit Dynamic........................................................................................................................................

460

mac learning-limit mac-address-sticky.....................................................................................................................

460

mac learning-limit station-move................................................................................................................................

460

mac learning-limit no-station-move..........................................................................................................................

460

Learning Limit Violation Actions.................................................................................................................................

461

Setting Station Move Violation Actions....................................................................................................................

461

Recovering from Learning Limit and Station Move Violations...............................................................................

461

Disabling MAC Address Learning on the System..........................................................................................................

462

Enabling port security.......................................................................................................................................................

462

NIC Teaming......................................................................................................................................................................

462

Configure Redundant Pairs..............................................................................................................................................

463

Far-End Failure Detection................................................................................................................................................

466

FEFD State Changes..................................................................................................................................................

466

Configuring FEFD........................................................................................................................................................

467

Enabling FEFD on an Interface..................................................................................................................................

468

Debugging FEFD..........................................................................................................................................................

468

27 Link Layer Discovery Protocol (LLDP).......................................................................................

470

802.1AB (LLDP) Overview...............................................................................................................................................

470

Protocol Data Units.....................................................................................................................................................

470

Contents 15

Optional TLVs.....................................................................................................................................................................

471

Management TLVs.......................................................................................................................................................

471

TIA-1057 (LLDP-MED) Overview...................................................................................................................................

472

TIA Organizationally Specific TLVs............................................................................................................................

473

Configure LLDP.................................................................................................................................................................

475

CONFIGURATION versus INTERFACE Configurations...............................................................................................

476

Enabling LLDP....................................................................................................................................................................

477

Disabling and Undoing LLDP......................................................................................................................................

477

Enabling LLDP on Management Ports............................................................................................................................

477

Disabling and Undoing LLDP on Management Ports..............................................................................................

477

Advertising TLVs...............................................................................................................................................................

478

Viewing the LLDP Configuration.....................................................................................................................................

478

Viewing Information Advertised by Adjacent LLDP Neighbors...................................................................................

479

Examples of Viewing Information Advertised by Neighbors..................................................................................

479

Configuring LLDPDU Intervals.........................................................................................................................................

481

Configuring Transmit and Receive Mode.......................................................................................................................

481

Configuring the Time to Live Value.................................................................................................................................

482

Debugging LLDP................................................................................................................................................................

483

Relevant Management Objects.......................................................................................................................................

484

28 Microsoft Network Load Balancing...........................................................................................

488

Configuring a Switch for NLB ........................................................................................................................................

489

Enabling a Switch for Multicast NLB........................................................................................................................

489

29 Multicast Source Discovery Protocol (MSDP)............................................................................

491

Anycast RP.........................................................................................................................................................................

492

Implementation Information.............................................................................................................................................

493

Configure Multicast Source Discovery Protocol...........................................................................................................

493

Related Configuration Tasks......................................................................................................................................

493

Enable MSDP.....................................................................................................................................................................

497

Manage the Source-Active Cache..................................................................................................................................

498

Viewing the Source-Active Cache............................................................................................................................

498

Limiting the Source-Active Cache............................................................................................................................

498

Clearing the Source-Active Cache............................................................................................................................

498

Enabling the Rejected Source-Active Cache...........................................................................................................

499

Accept Source-Active Messages that Fail the RFP Check.........................................................................................

499

Specifying Source-Active Messages...............................................................................................................................

501

Limiting the Source-Active Messages from a Peer......................................................................................................

502

Preventing MSDP from Caching a Local Source..........................................................................................................

502

Preventing MSDP from Caching a Remote Source.....................................................................................................

502

Preventing MSDP from Advertising a Local Source....................................................................................................

503

Logging Changes in Peership States..............................................................................................................................

504

Terminating a Peership.....................................................................................................................................................

504

Clearing Peer Statistics....................................................................................................................................................

504

Debugging MSDP..............................................................................................................................................................

505

MSDP with Anycast RP...................................................................................................................................................

505

Configuring Anycast RP...................................................................................................................................................

506

Reducing Source-Active Message Flooding............................................................................................................

507

Specifying the RP Address Used in SA Messages..................................................................................................

507

16 Contents

MSDP Sample Configurations.........................................................................................................................................

509

30 Multicast Listener Discovery Protocol.......................................................................................

512

MLD timers.........................................................................................................................................................................

515

Reducing Host Response Burstiness.........................................................................................................................

515

Configuring MLD Version..................................................................................................................................................

516

Clearing MLD groups.........................................................................................................................................................

516

Debugging MLD.................................................................................................................................................................

516

Explicit Tracking.................................................................................................................................................................

516

Reducing Leave Latency...................................................................................................................................................

516

Displaying MLD groups table............................................................................................................................................

516

Displaying MLD Interfaces................................................................................................................................................

517

MLD Snooping....................................................................................................................................................................

517

Enable MLD Snooping.................................................................................................................................................

517

Disable MLD Snooping.................................................................................................................................................

517

Configure the switch as a querier..............................................................................................................................

518

Specify port as connected to multicast router........................................................................................................

518

Enable Snooping Explicit Tracking.............................................................................................................................

518

Display the MLD Snooping Table...............................................................................................................................

518

31 Multiple Spanning Tree Protocol (MSTP)..................................................................................

519

Spanning Tree Variations.................................................................................................................................................

520

Implementation Information.......................................................................................................................................

520

Configure Multiple Spanning Tree Protocol...................................................................................................................

520

Related Configuration Tasks......................................................................................................................................

520

Enable Multiple Spanning Tree Globally..........................................................................................................................

521

Adding and Removing Interfaces.....................................................................................................................................

521

Creating Multiple Spanning Tree Instances....................................................................................................................

521

Influencing MSTP Root Selection...................................................................................................................................

523

Interoperate with Non-Dell Bridges................................................................................................................................

523

Changing the Region Name or Revision.........................................................................................................................

523

Modifying Global Parameters..........................................................................................................................................

524

Modifying the Interface Parameters...............................................................................................................................

525

Setting STP path cost as constant................................................................................................................................

525

Configuring an EdgePort..................................................................................................................................................

526

Flush MAC Addresses after a Topology Change..........................................................................................................

526

MSTP Sample Configurations..........................................................................................................................................

527

Debugging and Verifying MSTP Configurations............................................................................................................

531

32 Multicast Features..................................................................................................................

533

Enabling IP Multicast........................................................................................................................................................

533

Implementation Information.............................................................................................................................................

533

Multicast Policies...............................................................................................................................................................

534

IPv4 Multicast Policies................................................................................................................................................

534

Understanding Multicast Traceroute (mtrace)..............................................................................................................

541

Printing Multicast Traceroute (mtrace) Paths...............................................................................................................

541

Supported Error Codes....................................................................................................................................................

543

mtrace Scenarios..............................................................................................................................................................

543

Contents 17

33 Object Tracking......................................................................................................................

549

Object Tracking Overview...............................................................................................................................................

549

Track Layer 2 Interfaces............................................................................................................................................

550

Track Layer 3 Interfaces............................................................................................................................................

550

Track IPv4 and IPv6 Routes......................................................................................................................................

550

Set Tracking Delays.....................................................................................................................................................

551

VRRP Object Tracking................................................................................................................................................

552

Object Tracking Configuration........................................................................................................................................

552

Tracking a Layer 2 Interface......................................................................................................................................

552

Tracking a Layer 3 Interface......................................................................................................................................

553

Track an IPv4/IPv6 Route.........................................................................................................................................

554

Displaying Tracked Objects..............................................................................................................................................

557

34 Open Shortest Path First (OSPFv2 and OSPFv3)......................................................................

559

Protocol Overview............................................................................................................................................................

559

Autonomous System (AS) Areas..............................................................................................................................

559

Area Types...................................................................................................................................................................

560

Networks and Neighbors............................................................................................................................................

561

Router Types................................................................................................................................................................

561

Designated and Backup Designated Routers..........................................................................................................

562

Link-State Advertisements (LSAs)...........................................................................................................................

562

Router Priority and Cost.............................................................................................................................................

563

OSPF with Dell EMC Networking OS.............................................................................................................................

564

Graceful Restart..........................................................................................................................................................

564

Fast Convergence (OSPFv2, IPv4 Only).................................................................................................................

565

Multi-Process OSPFv2 with VRF.............................................................................................................................

565

OSPF ACK Packing.....................................................................................................................................................

566

Setting OSPF Adjacency with Cisco Routers..........................................................................................................

566

Configuration Information................................................................................................................................................

566

Configuration Task List for OSPFv2 (OSPF for IPv4)...........................................................................................

567

Configuration Task List for OSPFv3 (OSPF for IPv6).................................................................................................

578

Enabling IPv6 Unicast Routing...................................................................................................................................

579

Assigning IPv6 Addresses on an Interface...............................................................................................................

579

Assigning Area ID on an Interface.............................................................................................................................

579

Assigning OSPFv3 Process ID and Router ID Globally...........................................................................................

580

Assigning OSPFv3 Process ID and Router ID to a VRF.........................................................................................

580

Configuring Stub Areas..............................................................................................................................................

580

Configuring Passive-Interface....................................................................................................................................

581

Redistributing Routes..................................................................................................................................................

581

Configuring a Default Route.......................................................................................................................................

581

Applying cost for OSPFv3..........................................................................................................................................

582

Enabling OSPFv3 Graceful Restart...........................................................................................................................

582

OSPFv3 Authentication Using IPsec........................................................................................................................

584

Troubleshooting OSPFv3...........................................................................................................................................

589

MIB Support for OSPFv3.................................................................................................................................................

590

Viewing the OSPFv3 MIB...........................................................................................................................................

591

35 Policy-based Routing (PBR)....................................................................................................

592

18 Contents

Overview............................................................................................................................................................................

592

Implementing PBR............................................................................................................................................................

593

Configuration Task List for Policy-based Routing........................................................................................................

593

Create a Redirect List.................................................................................................................................................

594

Create a Rule for a Redirect-list................................................................................................................................

594

Apply a Redirect-list to an Interface using a Redirect-group................................................................................

595

Sample Configuration.......................................................................................................................................................

597

36 PIM Sparse-Mode (PIM-SM)...................................................................................................

602

Implementation Information.............................................................................................................................................

602

Protocol Overview............................................................................................................................................................

602

Requesting Multicast Traffic.....................................................................................................................................

602

Refuse Multicast Traffic.............................................................................................................................................

602

Send Multicast Traffic................................................................................................................................................

603

Configuring PIM-SM.........................................................................................................................................................

603

Related Configuration Tasks......................................................................................................................................

603

Enable PIM-SM.................................................................................................................................................................

603

Configuring S,G Expiry Timers........................................................................................................................................

604

Configuring a Static Rendezvous Point.........................................................................................................................

605

Overriding Bootstrap Router Updates.....................................................................................................................

605

Configuring a Designated Router....................................................................................................................................

605

Creating Multicast Boundaries and Domains.................................................................................................................

606

Electing an RP using the BSR Mechanism....................................................................................................................

606

37 PIM Source-Specific Mode (PIM-SSM)....................................................................................

608

Implementation Information.............................................................................................................................................

608

Configure PIM-SSM.........................................................................................................................................................

608

Enabling PIM-SSM............................................................................................................................................................

609

Use PIM-SSM with IGMP Version 2 Hosts...................................................................................................................

609

Electing an RP using the BSR Mechanism.....................................................................................................................

610

Enabling RP to Server Specific Multicast Groups....................................................................................................

611

38 Port Monitoring......................................................................................................................

613

Important Points to Remember.......................................................................................................................................

613

Port Monitoring..................................................................................................................................................................

613

Configuring Port Monitoring.............................................................................................................................................

615

Configuring Monitor Multicast Queue.............................................................................................................................

616

Flow-Based Monitoring.....................................................................................................................................................

617

Enabling Flow-Based Monitoring...............................................................................................................................

618

Remote Port Mirroring.....................................................................................................................................................

620

Remote Port Mirroring Example................................................................................................................................

620

Configuring Remote Port Mirroring...........................................................................................................................

621

Displaying Remote-Port Mirroring Configurations..................................................................................................

622

Configuration procedure for Remote Port Mirroring..............................................................................................

622

Encapsulated Remote Port Monitoring..........................................................................................................................

626

ERPM Behavior on a typical Dell EMC Networking OS ..............................................................................................

628

Port Monitoring on VLT...................................................................................................................................................

629

39 Private VLANs (PVLAN)..........................................................................................................

632

Contents 19

Private VLAN Concepts...................................................................................................................................................

632

Using the Private VLAN Commands...............................................................................................................................

633

Configuration Task List.....................................................................................................................................................

634

Creating PVLAN ports................................................................................................................................................

634

Creating a Primary VLAN...........................................................................................................................................

634

Creating a Community VLAN....................................................................................................................................

635

Creating an Isolated VLAN.........................................................................................................................................

636

Private VLAN Configuration Example.............................................................................................................................

637

Inspecting the Private VLAN Configuration..................................................................................................................

638

40 Per-VLAN Spanning Tree Plus (PVST+)....................................................................................

640

Protocol Overview............................................................................................................................................................

640

Implementation Information..............................................................................................................................................

641

Configure Per-VLAN Spanning Tree Plus.......................................................................................................................

641

Enabling PVST+.................................................................................................................................................................

641

Disabling PVST+.................................................................................................................................................................

641

Influencing PVST+ Root Selection..................................................................................................................................

642

Modifying Global PVST+ Parameters.............................................................................................................................

643

Modifying Interface PVST+ Parameters........................................................................................................................

644

Configuring an EdgePort..................................................................................................................................................

644

PVST+ in Multi-Vendor Networks..................................................................................................................................

645

Enabling PVST+ Extend System ID................................................................................................................................

645

PVST+ Sample Configurations........................................................................................................................................

646

41 Quality of Service (QoS)..........................................................................................................

648

Implementation Information.............................................................................................................................................

650

Port-Based QoS Configurations.....................................................................................................................................

650

Setting dot1p Priorities for Incoming Traffic............................................................................................................

650

Honoring dot1p Priorities on Ingress Traffic.............................................................................................................

651

Configuring Port-Based Rate Policing.......................................................................................................................

651

Configuring Port-Based Rate Shaping......................................................................................................................

651

Policy-Based QoS Configurations...................................................................................................................................

652

Classify Traffic.............................................................................................................................................................

652

Dot1p to Queue Mapping Requirement....................................................................................................................

655

Create a QoS Policy....................................................................................................................................................

656

DSCP Color Maps.......................................................................................................................................................

658

Create Policy Maps.....................................................................................................................................................

659

Enabling QoS Rate Adjustment.......................................................................................................................................

662

Enabling Strict-Priority Queueing....................................................................................................................................

662

Queue Classification Requirements for PFC Functionality..........................................................................................

663

Support for marking dot1p value in L3 Input Qos Policy..............................................................................................

663

Weighted Random Early Detection.................................................................................................................................

664

Enabling and Disabling WRED Globally.....................................................................................................................

664

Creating WRED Profiles.............................................................................................................................................

665

Applying a WRED Profile to Traffic...........................................................................................................................

665

Displaying Default and Configured WRED Profiles.................................................................................................

665

Displaying WRED Drop Statistics..............................................................................................................................

665

Displaying egress–queue Statistics...........................................................................................................................

666

Pre-Calculating Available QoS CAM Space...................................................................................................................

666

20 Contents

Specifying Policy-Based Rate Shaping in Packets Per Second..................................................................................

667

Configuring Policy-Based Rate Shaping.........................................................................................................................

667

Configuring Weights and ECN for WRED .....................................................................................................................

668

Configuring WRED and ECN Attributes.........................................................................................................................

669

Guidelines for Configuring ECN for Classifying and Color-Marking Packets............................................................

670

Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class....................................

670

Classifying Incoming Packets Using ECN and Color-Marking................................................................................

671

Sample configuration to mark non-ecn packets as “yellow” with single traffic class.........................................

672

Applying Layer 2 Match Criteria on a Layer 3 Interface...............................................................................................

673

Managing Hardware Buffer Statistics......................................................................................................................

673

Enabling Buffer Statistics Tracking ................................................................................................................................

674

42 Routing Information Protocol (RIP)..........................................................................................

676

Protocol Overview............................................................................................................................................................

676

RIPv1.............................................................................................................................................................................

676

RIPv2.............................................................................................................................................................................

676

Implementation Information.............................................................................................................................................

676

Configuration Information.................................................................................................................................................

677

Configuration Task List...............................................................................................................................................

677

RIP Configuration Example........................................................................................................................................

682

43 Remote Monitoring (RMON)....................................................................................................

687

Implementation Information.............................................................................................................................................

687

Fault Recovery...................................................................................................................................................................

687

Setting the RMON Alarm...........................................................................................................................................

687

Configuring an RMON Event.....................................................................................................................................

688

Configuring RMON Collection Statistics..................................................................................................................

689

Configuring the RMON Collection History...............................................................................................................

689

44 Rapid Spanning Tree Protocol (RSTP)......................................................................................

690

Protocol Overview............................................................................................................................................................

690

Configuring Rapid Spanning Tree...................................................................................................................................

690

Important Points to Remember.......................................................................................................................................

690

RSTP and VLT..............................................................................................................................................................

691

Configuring Interfaces for Layer 2 Mode.......................................................................................................................

691

Enabling Rapid Spanning Tree Protocol Globally...........................................................................................................

691

Adding and Removing Interfaces....................................................................................................................................

693

Modifying Global Parameters..........................................................................................................................................

693

Enabling SNMP Traps for Root Elections and Topology Changes.......................................................................

695

Modifying Interface Parameters.....................................................................................................................................

695

Enabling SNMP Traps for Root Elections and Topology Changes.............................................................................

695

Influencing RSTP Root Selection....................................................................................................................................

695

Configuring an EdgePort..................................................................................................................................................

696

Configuring Fast Hellos for Link State Detection.........................................................................................................

696

45 Software-Defined Networking (SDN).......................................................................................

698

46 Security.................................................................................................................................

699

AAA Accounting................................................................................................................................................................

699

Contents 21

Configuration Task List for AAA Accounting...........................................................................................................

699

RADIUS Accounting.....................................................................................................................................................

701

AAA Authentication...........................................................................................................................................................

706

Configuration Task List for AAA Authentication.....................................................................................................

706

Obscuring Passwords and Keys......................................................................................................................................

708

AAA Authorization.............................................................................................................................................................

709

Privilege Levels Overview..........................................................................................................................................

709

Configuration Task List for Privilege Levels.............................................................................................................

709

RADIUS................................................................................................................................................................................

712

RADIUS Authentication...............................................................................................................................................

713

Configuration Task List for RADIUS..........................................................................................................................

714

TACACS+............................................................................................................................................................................

716

Configuration Task List for TACACS+.......................................................................................................................

716

TACACS+ Remote Authentication.............................................................................................................................

718

Command Authorization..............................................................................................................................................

719

Protection from TCP Tiny and Overlapping Fragment Attacks...................................................................................

719

Enabling SCP and SSH......................................................................................................................................................

719

Using SCP with SSH to Copy a Software Image....................................................................................................

720

Removing the RSA Host Keys and Zeroizing Storage ............................................................................................

721

Configuring When to Re-generate an SSH Key ......................................................................................................

721

Configuring the SSH Server Key Exchange Algorithm............................................................................................

721

Configuring the HMAC Algorithm for the SSH Server...........................................................................................

722

Configuring the HMAC Algorithm for the SSH Client............................................................................................

722

Configuring the SSH Server Cipher List...................................................................................................................

723

Configuring the SSH Client Cipher List....................................................................................................................

723

Secure Shell Authentication.......................................................................................................................................

723

Troubleshooting SSH..................................................................................................................................................

725

Telnet..................................................................................................................................................................................

726

VTY Line and Access-Class Configuration.....................................................................................................................

726

VTY Line Local Authentication and Authorization...................................................................................................

726

VTY Line Remote Authentication and Authorization...............................................................................................

727

VTY MAC-SA Filter Support......................................................................................................................................

727

Role-Based Access Control..............................................................................................................................................

728

Overview of RBAC......................................................................................................................................................

728

User Roles....................................................................................................................................................................

730

AAA Authentication and Authorization for Roles.....................................................................................................

733

Role Accounting...........................................................................................................................................................

735

Display Information About User Roles.......................................................................................................................

736

Two Factor Authentication (2FA)...................................................................................................................................

737

Handling Access-Challenge Message.......................................................................................................................

737

Configuring Challenge Response Authentication for SSHv2.................................................................................

737

SMS-OTP Mechanism................................................................................................................................................

738

Configuring the System to Drop Certain ICMP Reply Messages...............................................................................

738

SSH Lockout Settings......................................................................................................................................................

740

47 Service Provider Bridging.........................................................................................................

741

VLAN Stacking...................................................................................................................................................................

741

Configure VLAN Stacking...........................................................................................................................................

742

Creating Access and Trunk Ports..............................................................................................................................

743

Enable VLAN-Stacking for a VLAN...........................................................................................................................

743

22 Contents

Configuring the Protocol Type Value for the Outer VLAN Tag.............................................................................

744

Configuring Dell EMC Networking OS Options for Trunk Ports...........................................................................

744

Debugging VLAN Stacking.........................................................................................................................................

745

VLAN Stacking in Multi-Vendor Networks..............................................................................................................

745

VLAN Stacking Packet Drop Precedence......................................................................................................................

748

Enabling Drop Eligibility...............................................................................................................................................

748

Honoring the Incoming DEI Value..............................................................................................................................

749

Marking Egress Packets with a DEI Value................................................................................................................

749

Dynamic Mode CoS for VLAN Stacking.........................................................................................................................

750

Mapping C-Tag to S-Tag dot1p Values.....................................................................................................................

751

Layer 2 Protocol Tunneling...............................................................................................................................................

751

Enabling Layer 2 Protocol Tunneling.........................................................................................................................

753

Specifying a Destination MAC Address for BPDUs................................................................................................

754

Setting Rate-Limit BPDUs..........................................................................................................................................

754

Debugging Layer 2 Protocol Tunneling.....................................................................................................................

754

Provider Backbone Bridging.............................................................................................................................................

754

48 sFlow.....................................................................................................................................

756

Overview............................................................................................................................................................................

756

Implementation Information.............................................................................................................................................

756

Enabling Extended sFlow..................................................................................................................................................

757

Important Points to Remember.................................................................................................................................

758

Enabling and Disabling sFlow on an Interface................................................................................................................

758

Enabling sFlow Max-Header Size Extended..................................................................................................................

759

sFlow Show Commands...................................................................................................................................................

759

Displaying Show sFlow Global....................................................................................................................................

760

Displaying Show sFlow on an Interface....................................................................................................................

760

Displaying Show sFlow on a .......................................................................................................................................

761

Configuring Specify Collectors.........................................................................................................................................

761

Changing the Polling Intervals..........................................................................................................................................

761

Back-Off Mechanism.........................................................................................................................................................

761

sFlow on LAG ports...........................................................................................................................................................

762

49 Simple Network Management Protocol (SNMP)........................................................................

763

Protocol Overview............................................................................................................................................................

764

Implementation Information.............................................................................................................................................

764

SNMPv3 Compliance With FIPS.....................................................................................................................................

764

Configuration Task List for SNMP..................................................................................................................................

765

Important Points to Remember.......................................................................................................................................

765

Set up SNMP.....................................................................................................................................................................

765

Creating a Community................................................................................................................................................

766

Setting Up User-Based Security (SNMPv3)...........................................................................................................

766

Enable SNMPv3 traps.................................................................................................................................................

767

Reading Managed Object Values.....................................................................................................................................

767

Writing Managed Object Values......................................................................................................................................

768

Configuring Contact and Location Information using SNMP......................................................................................

768

Subscribing to Managed Object Value Updates using SNMP.....................................................................................

769

Enabling a Subset of SNMP Traps..................................................................................................................................

769

Enabling an SNMP Agent to Notify Syslog Server Failure...........................................................................................

770

Contents 23

Copy Configuration Files Using SNMP............................................................................................................................

771

Copying a Configuration File......................................................................................................................................

772

Copying Configuration Files via SNMP.....................................................................................................................

773

Copying the Startup-Config Files to the Running-Config......................................................................................

773

Copying the Startup-Config Files to the Server via FTP........................................................................................

773

Copying the Startup-Config Files to the Server via TFTP.....................................................................................

774

Copy a Binary File to the Startup-Configuration.....................................................................................................

774

Additional MIB Objects to View Copy Statistics......................................................................................................

774

Obtaining a Value for MIB Objects............................................................................................................................

775

MIB Support for Power Monitoring................................................................................................................................

775

MIB Support for 25G, 40G, 50G, 100G Optical Transceiver or DAC cable IDPROM user info..............................

776

MIB Support to Display the Available Memory Size on Flash......................................................................................

777

Viewing the Available Flash Memory Size.................................................................................................................

777

MIB Support to Display the Software Core Files Generated by the System.............................................................

778

Viewing the Software Core Files Generated by the System.................................................................................

778

MIB Support for PFC Storm Control..............................................................................................................................

779

MIB Support for PFC no-drop-priority L2Dlf Drop.......................................................................................................

780

MIB Support for Monitoring the overall buffer usage for lossy and lossless traffic per XPE..................................

781

SNMP Support for WRED Green/Yellow/Red Drop Counters...................................................................................

782

MIB Support to Display the Available Partitions on Flash............................................................................................

783

Viewing the Available Partitions on Flash.................................................................................................................

783

MIB Support to Display the ECN Marked Packets ......................................................................................................

784

MIB Support to Display Egress Queue Statistics..........................................................................................................

784

MIB Support to ECMP Group Count..............................................................................................................................

784

Viewing the ECMP Group Count Information.........................................................................................................

785

.............................................................................................................................................................................................

787

Viewing the FEC BER Details.....................................................................................................................................

788

MIB Support for entAliasMappingTable ........................................................................................................................

790

Viewing the entAliasMappingTable MIB...................................................................................................................

790

MIB Support for LAG.........................................................................................................................................................

791

Viewing the LAG MIB..................................................................................................................................................

792

MIB Support for CAM.......................................................................................................................................................

792

Viewing the CAM MIB................................................................................................................................................

793

MIB support for MAC notification traps.........................................................................................................................

793

MIB support for Port Security.........................................................................................................................................

794

Global MIB objects for port security.........................................................................................................................

794

MIB support for interface level port security...........................................................................................................

794

MIB objects for configuring MAC addresses...........................................................................................................

795

MIB objects for configuring MAC addresses...........................................................................................................

796

Configuring SNMP traps for new MAC learning or station–move.............................................................................

796

Manage VLANs using SNMP...........................................................................................................................................

797

Creating a VLAN..........................................................................................................................................................

797

Assigning a VLAN Alias................................................................................................................................................

797

Displaying the Ports in a VLAN..................................................................................................................................

797

Add Tagged and Untagged Ports to a VLAN...........................................................................................................

797

Managing Overload on Startup.......................................................................................................................................

798

Enabling and Disabling a Port using SNMP....................................................................................................................

799

Fetch Dynamic MAC Entries using SNMP.....................................................................................................................

799

Example of Deriving the Interface Index Number.........................................................................................................

800

MIB Objects for Viewing the System Image on Flash Partitions..........................................................................

800

24 Contents

Monitor Port-Channels.....................................................................................................................................................

801

Troubleshooting SNMP Operation..................................................................................................................................

802

Transceiver Monitoring....................................................................................................................................................

802

Configuring SNMP context name...................................................................................................................................

803

50 Storm Control........................................................................................................................

804

Configure Storm Control..................................................................................................................................................

804

Configuring Storm Control from INTERFACE Mode..............................................................................................

804

Configuring Storm Control from CONFIGURATION Mode...................................................................................

805

PFC Storm.........................................................................................................................................................................

805

Detect PFC Storm......................................................................................................................................................

805

Restore Queue Drop State........................................................................................................................................

806

View Details of Storm Control PFC..........................................................................................................................

806

51 Spanning Tree Protocol (STP).................................................................................................

808

Protocol Overview............................................................................................................................................................

808

Configure Spanning Tree.................................................................................................................................................

808

Important Points to Remember.......................................................................................................................................

809

Configuring Interfaces for Layer 2 Mode.......................................................................................................................

809

Enabling Spanning Tree Protocol Globally......................................................................................................................

810

Adding an Interface to the Spanning Tree Group..........................................................................................................

812

Modifying Global Parameters...........................................................................................................................................

812

Modifying Interface STP Parameters..............................................................................................................................

813

Enabling PortFast...............................................................................................................................................................

813

Prevent Network Disruptions with BPDU Guard.....................................................................................................

814

Selecting STP Root...........................................................................................................................................................

816

STP Root Guard.................................................................................................................................................................

816

Root Guard Scenario...................................................................................................................................................

816

Configuring Root Guard...............................................................................................................................................

817

Enabling SNMP Traps for Root Elections and Topology Changes..............................................................................

818

Configuring Spanning Trees as Hitless............................................................................................................................

818

STP Loop Guard.................................................................................................................................................................

818

Configuring Loop Guard..............................................................................................................................................

819

Displaying STP Guard Configuration..............................................................................................................................

820

52 SupportAssist.........................................................................................................................

821

Configuring SupportAssist Using a Configuration Wizard............................................................................................

821

Configuring SupportAssist Manually...............................................................................................................................

822

Configuring SupportAssist Activity.................................................................................................................................

823

Configuring SupportAssist Company..............................................................................................................................

825

Configuring SupportAssist Person..................................................................................................................................

825

Configuring SupportAssist Server...................................................................................................................................

826

Viewing SupportAssist Configuration.............................................................................................................................

827

53 System Time and Date............................................................................................................

829

Network Time Protocol....................................................................................................................................................

829

Protocol Overview......................................................................................................................................................

830

Configure the Network Time Protocol.....................................................................................................................

830

Enabling NTP...............................................................................................................................................................

830

Contents 25

Configuring NTP Broadcasts......................................................................................................................................

831

Disabling NTP on an Interface....................................................................................................................................

831

Configuring a Source IP Address for NTP Packets.................................................................................................

831

Configuring NTP Authentication...............................................................................................................................

832

Configuring NTP control key password....................................................................................................................

834

Configuring the NTP Step-Threshold.......................................................................................................................

834

Configuring a Custom-defined Period for NTP time Synchronization.................................................................

834

Dell EMC Networking OS Time and Date......................................................................................................................

835

Configuration Task List ..............................................................................................................................................

835

Setting the Time and Date for the Switch Software Clock...................................................................................

835

Setting the Timezone.................................................................................................................................................

835

Set Daylight Saving Time...........................................................................................................................................

836

Setting Daylight Saving Time Once..........................................................................................................................

836

Setting Recurring Daylight Saving Time...................................................................................................................

836

54 Tunneling...............................................................................................................................

838

Configuring a Tunnel.........................................................................................................................................................

838

Configuring Tunnel Keepalive Settings...........................................................................................................................

839

Configuring a Tunnel Interface........................................................................................................................................

839

Configuring Tunnel Allow-Remote Decapsulation.........................................................................................................

840

Configuring Tunnel source anylocal Decapsulation.......................................................................................................

840

Guidelines for Configuring Multipoint Receive-Only Tunnels.......................................................................................

841

Multipoint Receive-Only Tunnels.....................................................................................................................................

841

55 Uplink Failure Detection (UFD)................................................................................................

842

Feature Description...........................................................................................................................................................

842

How Uplink Failure Detection Works..............................................................................................................................

843

UFD and NIC Teaming......................................................................................................................................................

844

Important Points to Remember.......................................................................................................................................

844

Configuring Uplink Failure Detection..............................................................................................................................

845

Clearing a UFD-Disabled Interface..................................................................................................................................

846

Displaying Uplink Failure Detection.................................................................................................................................

847

Sample Configuration: Uplink Failure Detection............................................................................................................

848

56 Upgrade Procedures...............................................................................................................

850

57 Virtual LANs (VLANs)..............................................................................................................

851

Default VLAN......................................................................................................................................................................

851

Port-Based VLANs............................................................................................................................................................

852

VLANs and Port Tagging.................................................................................................................................................

852

Configuration Task List.....................................................................................................................................................

853

Creating a Port-Based VLAN.....................................................................................................................................

853

Assigning Interfaces to a VLAN.................................................................................................................................

853

Moving Untagged Interfaces.....................................................................................................................................

854

Assigning an IP Address to a VLAN..........................................................................................................................

855

Configuring Native VLANs...............................................................................................................................................

856

Enabling Null VLAN as the Default VLAN......................................................................................................................

856

58 Virtual Link Trunking (VLT).....................................................................................................

857

26 Contents

Overview............................................................................................................................................................................

857

VLT Terminology.........................................................................................................................................................

859

Layer-2 Traffic in VLT Domains.................................................................................................................................

859

Interspersed VLANs....................................................................................................................................................

860

VLT on Core Switches.................................................................................................................................................

861

Enhanced VLT..............................................................................................................................................................

861

Configure Virtual Link Trunking.......................................................................................................................................

862

Important Points to Remember.................................................................................................................................

862

Configuration Notes....................................................................................................................................................

863

Primary and Secondary VLT Peers...........................................................................................................................

866

RSTP and VLT.............................................................................................................................................................

866

VLT Bandwidth Monitoring........................................................................................................................................

867

VLT and Stacking........................................................................................................................................................

867

VLT and IGMP Snooping............................................................................................................................................

867

VLT IPv6.......................................................................................................................................................................

867

VLT Port Delayed Restoration...................................................................................................................................

867

PIM-Sparse Mode Support on VLT..........................................................................................................................

868

VLT Routing ................................................................................................................................................................

869

Non-VLT ARP Sync.....................................................................................................................................................

872

RSTP Configuration..........................................................................................................................................................

872

Preventing Forwarding Loops in a VLT Domain......................................................................................................

872

Sample RSTP configuration.......................................................................................................................................

873

Configuring VLT...........................................................................................................................................................

873

PVST+ Configuration........................................................................................................................................................

881

Peer Routing Configuration Example..............................................................................................................................

882

Dell-1 Switch Configuration........................................................................................................................................

883

Dell-2 Switch Configuration.......................................................................................................................................

887

R1 Configuration..........................................................................................................................................................

890

Access Switch A1 Configurations and Verification..................................................................................................

891

eVLT Configuration Example............................................................................................................................................

891

PIM-Sparse Mode Configuration Example....................................................................................................................

894

Verifying a VLT Configuration.........................................................................................................................................

894

Additional VLT Sample Configurations...........................................................................................................................

897

Troubleshooting VLT........................................................................................................................................................

899

Reconfiguring Stacked Switches as VLT.......................................................................................................................

900

Specifying VLT Nodes in a PVLAN.................................................................................................................................

900

Configuring a VLT VLAN or LAG in a PVLAN...............................................................................................................

903

Creating a VLT LAG or a VLT VLAN.........................................................................................................................

903

Associating the VLT LAG or VLT VLAN in a PVLAN..............................................................................................

904

Proxy ARP Capability on VLT Peer Nodes....................................................................................................................

905

VLT Nodes as Rendezvous Points for Multicast Resiliency........................................................................................

906

Configuring VLAN-Stack over VLT................................................................................................................................

906

IPv6 Peer Routing in VLT Domains Overview...............................................................................................................

909

Configure BFD in VLT Domain.........................................................................................................................................

913

Sample BFD configuration in VLT domain................................................................................................................

913

59 VLT Proxy Gateway.................................................................................................................

918

Proxy Gateway in VLT Domains.......................................................................................................................................

918

LLDP VLT Proxy Gateway in a Square VLT Topology............................................................................................

921

Configuring a Static VLT Proxy Gateway......................................................................................................................

922

Contents 27

Configuring an LLDP VLT Proxy Gateway.....................................................................................................................

922

VLT Proxy Gateway Sample Topology...........................................................................................................................

922

VLT Domain Configuration.........................................................................................................................................

923

Dell-1 VLT Configuration.............................................................................................................................................

923

Dell-2 VLT Configuration............................................................................................................................................

924

Dell-3 VLT Configuration............................................................................................................................................

925

Dell-4 VLT Configuration............................................................................................................................................

926

60 Virtual Extensible LAN (VXLAN)...............................................................................................

927

Components of VXLAN network....................................................................................................................................

928

Functional Overview of VXLAN Gateway......................................................................................................................

928

VXLAN Frame Format......................................................................................................................................................

929

Configuring and Controlling VXLAN from the NSX Controller GUI............................................................................

930

Configuring VxLAN Gateway...........................................................................................................................................

934

Connecting to an NVP Controller.............................................................................................................................

934

Advertising VXLAN Access Ports to Controller......................................................................................................

935

Displaying VXLAN Configurations...................................................................................................................................

935

Static Virtual Extensible LAN (VXLAN).........................................................................................................................

936

Configuring Static VXLAN.........................................................................................................................................

936

Limitations on VXLAN ................................................................................................................................................

937

Displaying Static VXLAN Configurations..................................................................................................................

937

Disabling MAC Address Learning on Static VXLAN Tunnels.................................................................................

938

Preserving 802.1 p value across VXLAN tunnels..........................................................................................................

939

RIOT....................................................................................................................................................................................

939

61 Virtual Routing and Forwarding (VRF)......................................................................................

940

VRF Overview...................................................................................................................................................................

940

VRF Configuration Notes..................................................................................................................................................

941

DHCP............................................................................................................................................................................

942

VRF Configuration.............................................................................................................................................................

942

Loading VRF CAM.......................................................................................................................................................

942

Creating a Non-Default VRF Instance......................................................................................................................

942

Assigning an Interface to a VRF................................................................................................................................

943

Assigning a Front-end Port to a Management VRF...............................................................................................

943

View VRF Instance Information.................................................................................................................................

943

Assigning an OSPF Process to a VRF Instance.......................................................................................................

943

Configuring VRRP on a VRF Instance......................................................................................................................

944

Configuring Management VRF..................................................................................................................................

944

Configuring a Static Route.........................................................................................................................................

945

Sample VRF Configuration...............................................................................................................................................

945

Route Leaking VRFs.........................................................................................................................................................

950

Dynamic Route Leaking....................................................................................................................................................

950

Configuring Route Leaking without Filtering Criteria..............................................................................................

951

Configuring Route Leaking with Filtering.................................................................................................................

953

62 Virtual Router Redundancy Protocol (VRRP)............................................................................

956

VRRP Overview................................................................................................................................................................

956

VRRP Benefits...................................................................................................................................................................

957

VRRP Implementation......................................................................................................................................................

957

28 Contents

VRRP Configuration.........................................................................................................................................................

958

Configuration Task List...............................................................................................................................................

958

Setting VRRP Initialization Delay...............................................................................................................................

965

Sample Configurations.....................................................................................................................................................

966

VRRP in a VRF Configuration....................................................................................................................................

970

VRRP for IPv6 Configuration.....................................................................................................................................

975

63 Debugging and Diagnostics......................................................................................................

979

Offline Diagnostics............................................................................................................................................................

979

Important Points to Remember.................................................................................................................................

979

Running Offline Diagnostics.......................................................................................................................................

979

Trace Logs.........................................................................................................................................................................

980

Auto Save on Crash or Rollover......................................................................................................................................

980

Hardware Watchdog Timer.............................................................................................................................................

980

Enabling Environmental Monitoring................................................................................................................................

980

Recognize an Overtemperature Condition..............................................................................................................

982

Troubleshoot an Over-temperature Condition........................................................................................................

982

Recognize an Under-Voltage Condition...................................................................................................................

982

Troubleshoot an Under-Voltage Condition..............................................................................................................

983

Buffer Tuning.....................................................................................................................................................................

983

Troubleshooting Packet Loss..........................................................................................................................................

984

Displaying Drop Counters...........................................................................................................................................

984

Dataplane Statistics....................................................................................................................................................

985

Display Stack Member Counters...............................................................................................................................

986

Enabling Application Core Dumps...................................................................................................................................

988

Mini Core Dumps...............................................................................................................................................................

988

Enabling TCP Dumps........................................................................................................................................................

989

64 Standards Compliance.............................................................................................................

991

IEEE Compliance................................................................................................................................................................

991

RFC and I-D Compliance..................................................................................................................................................

992

General Internet Protocols.........................................................................................................................................

992

General IPv4 Protocols...............................................................................................................................................

993

General IPv6 Protocols...............................................................................................................................................

994

Border Gateway Protocol (BGP)..............................................................................................................................

995

Open Shortest Path First (OSPF)............................................................................................................................

996

Intermediate System to Intermediate System (IS-IS)............................................................................................

996

Routing Information Protocol (RIP)..........................................................................................................................

997

Multicast.......................................................................................................................................................................

997

Network Management................................................................................................................................................

998

MIB Location....................................................................................................................................................................

1002

65 X.509v3................................................................................................................................

1004

Introduction to X.509v3 certificates.............................................................................................................................

1004

X.509v3 support in .........................................................................................................................................................

1005

Information about installing CA certificates.................................................................................................................

1006

Installing CA certificate.............................................................................................................................................

1007

Information about Creating Certificate Signing Requests (CSR).............................................................................

1007

Creating Certificate Signing Requests (CSR)........................................................................................................

1007

Contents 29

Information about installing trusted certificates..........................................................................................................

1008

Installing trusted certificates....................................................................................................................................

1008

Transport layer security (TLS).......................................................................................................................................

1008

Syslog over TLS.........................................................................................................................................................

1009

Online Certificate Status Protocol (OSCP).................................................................................................................

1009

Configuring OCSP setting on CA............................................................................................................................

1009

Configuring OCSP behavior.....................................................................................................................................

1009

Configuring Revocation Behavior.............................................................................................................................

1010

Configuring OSCP responder preference...............................................................................................................

1010

Verifying certificates........................................................................................................................................................

1010

Verifying Server certificates......................................................................................................................................

1010

Verifying Client Certificates......................................................................................................................................

1010

Event logging....................................................................................................................................................................

1010

30 Contents

Loading...
+ 981 hidden pages