Related Documents..............................................................................................................................................................31
Accessing the Command Line............................................................................................................................................32
The do Command................................................................................................................................................................36
Entering and Editing Commands....................................................................................................................................... 38
Filtering show Command Outputs.................................................................................................................................... 39
Multiple Users in Configuration Mode.............................................................................................................................. 40
Configuring alias command................................................................................................................................................ 40
Viewing alias configuration............................................................................................................................................41
Serial Console.................................................................................................................................................................42
Configuring a Host Name................................................................................................................................................... 44
Accessing the System Remotely.......................................................................................................................................44
Configure the Management Port IP Address.............................................................................................................44
Configure a Management Route................................................................................................................................. 45
Configuring a Username and Password..................................................................................................................... 45
Configuring the Enable Password..................................................................................................................................... 45
Copy Files to and from the System.............................................................................................................................46
Mounting an NFS File System......................................................................................................................................47
Save the Running-Configuration................................................................................................................................. 49
Configure the Overload Bit for a Startup Scenario...................................................................................................49
Managing the File System...................................................................................................................................................51
Using HTTP for File Transfers........................................................................................................................................... 52
Verify Software Images Before Installation......................................................................................................................53
Removing a Command from EXEC Mode..................................................................................................................55
Moving a Command from EXEC Privilege Mode to EXEC Mode...........................................................................55
Allowing Access to CONFIGURATION Mode Commands....................................................................................... 55
Allowing Access to Different Modes...........................................................................................................................55
Applying a Privilege Level to a Username...................................................................................................................56
Applying a Privilege Level to a Terminal Line............................................................................................................. 56
Audit and Security Logs................................................................................................................................................57
Configuring Logging Format ................................................................................................................................ 58
Setting Up a Secure Connection to a Syslog Server.......................................................................................59
Log Messages in the Internal Buffer.................................................................................................................................60
Disabling System Logging.................................................................................................................................................. 60
Sending System Messages to a Syslog Server............................................................................................................... 60
Configuring a UNIX System as a Syslog Server........................................................................................................ 60
Enabling the System to Clear Existing Sessions........................................................................................................63
Changing System Logging Settings..................................................................................................................................64
Display the Logging Buffer and the Logging Configuration...........................................................................................65
Configuring a UNIX Logging Facility Level.......................................................................................................................68
Enabling Timestamp on Syslog Messages....................................................................................................................... 69
File Transfer Services..........................................................................................................................................................70
Enabling the FTP Server...............................................................................................................................................70
Configuring FTP Server Parameters............................................................................................................................71
Denying and Permitting Access to a Terminal Line................................................................................................... 72
Configuring Login Authentication for Terminal Lines................................................................................................73
Setting Timeout for EXEC Privilege Mode.......................................................................................................................73
Using Telnet to get to Another Network Device.............................................................................................................74
Reloading the system..........................................................................................................................................................75
Restoring the Factory Default Settings............................................................................................................................76
EAP over RADIUS..........................................................................................................................................................80
Important Points to Remember..........................................................................................................................................81
Configuring the Static MAB and MAB Profile ................................................................................................................ 83
Configuring MAC addresses for a do1x Profile................................................................................................................84
Configuring a Quiet Period after a Failed Authentication.........................................................................................85
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................86
Re-Authenticating a Port................................................................................................................................................... 86
Configuring Dynamic VLAN Assignment with Port Authentication..............................................................................88
Guest and Authentication-Fail VLANs..............................................................................................................................89
Configuring a Guest VLAN...........................................................................................................................................90
Configuring an Authentication-Fail VLAN.................................................................................................................. 90
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)..........................92
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................................................92
Guidelines for Configuring ACL VLAN Groups................................................................................................................ 92
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters................................................... 93
Allocating FP Blocks for VLAN Processes....................................................................................................................... 97
ACL Optimization to Increase Number of Supported IPv4 ACLs..................................................................................97
Optimizing ACL for More Number of IPv4 ACL Rules..............................................................................................97
7 Access Control Lists (ACLs)........................................................................................................99
IP Access Control Lists (ACLs)........................................................................................................................................100
Implementing ACLs on Dell EMC Networking OS.................................................................................................... 101
Configure ACL Range Profiles..........................................................................................................................................102
Important Points to Remember....................................................................................................................................... 103
Configuration Task List for Route Maps...................................................................................................................103
Configuring Match Routes..........................................................................................................................................105
Configuring Set Conditions.........................................................................................................................................106
Configure a Route Map for Route Redistribution.................................................................................................... 107
Configure a Route Map for Route Tagging.............................................................................................................. 108
IP Fragment Handling........................................................................................................................................................108
IP Fragments ACL Examples...................................................................................................................................... 109
Configure a Standard IP ACL............................................................................................................................................110
Configuring a Standard IP ACL Filter.......................................................................................................................... 111
Configure an Extended IP ACL..........................................................................................................................................111
Configuring Filters with a Sequence Number............................................................................................................ 111
Configuring Filters Without a Sequence Number.....................................................................................................115
Configure Layer 2 and Layer 3 ACLs............................................................................................................................... 115
Assign an IP ACL to an Interface......................................................................................................................................116
Applying an IP ACL............................................................................................................................................................. 116
IP Prefix Lists......................................................................................................................................................................122
Configuration Task List for Prefix Lists.....................................................................................................................122
Resequencing an ACL or Prefix List.......................................................................................................................... 126
How BFD Works.................................................................................................................................................................128
Session State Changes................................................................................................................................................132
Important Points to Remember........................................................................................................................................132
Configure BFD for Physical Ports.............................................................................................................................. 133
Configure BFD for Static Routes............................................................................................................................... 134
Configure BFD for OSPF............................................................................................................................................ 136
Configure BFD for OSPFv3.........................................................................................................................................141
Configure BFD for IS-IS...............................................................................................................................................144
Configure BFD for BGP...............................................................................................................................................145
Configure BFD for VRRP.............................................................................................................................................151
BGP IP version 4 (BGPv4) Overview............................................................................................................................. 155
AS4 Number Representation......................................................................................................................................157
Four-Byte AS Numbers...............................................................................................................................................159
Sessions and Peers...................................................................................................................................................... 159
Establish a Session.......................................................................................................................................................159
BGP Attributes for selecting Best Path....................................................................................................................160
BGP global and address family configuration........................................................................................................... 166
Implement BGP with Dell EMC Networking OS.......................................................................................................167
Prerequisite for configuring a BGP network.............................................................................................................170
Enabling four-byte autonomous system numbers................................................................................................... 172
Changing a BGP router ID...........................................................................................................................................173
Configuring AS4 Number Representations...............................................................................................................173
Configuring a BGP peer...............................................................................................................................................174
Example-Configuring BGP routing between peers..................................................................................................175
Route-refresh and Soft-reconfiguration...................................................................................................................183
Configuring BGP Fast Fall-Over.................................................................................................................................192
Configuring IP Community Lists.................................................................................................................................196
Configuring an IP Extended Community List............................................................................................................197
Changing BGP keepalive and hold timers................................................................................................................ 205
Setting the extended timer........................................................................................................................................205
Enabling or disabling BGP neighbors........................................................................................................................ 206
MBGP support for IPv6............................................................................................................................................... 211
Configuring IPv6 MBGP between peers....................................................................................................................211
Example-Configuring IPv4 and IPv6 neighbors........................................................................................................212
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor............................................. 214
Test CAM Usage...............................................................................................................................................................220
QoS CAM Region Limitation...................................................................................................................................... 222
Syslog Error When the Table is Full.......................................................................................................................... 222
Syslog Warning Upon 90 Percent Utilization of CAM............................................................................................223
Syslog Warning for Discrepancies Between Configured Extended Prefixes.......................................................223
11 Control Plane Policing (CoPP).................................................................................................. 225
Configure Control Plane Policing.....................................................................................................................................226
Configuring CoPP for Protocols................................................................................................................................ 227
Configuring CoPP for CPU Queues..........................................................................................................................228
Contents
7
Protocol to CPU Queue Mapping............................................................................................................................. 229
Configuring Protocol to CPU Queue Mapping........................................................................................................ 230
12 Data Center Bridging (DCB)..................................................................................................... 233
Ethernet Enhancements in Data Center Bridging.........................................................................................................233
Data Center Bridging Exchange Protocol (DCBx)..................................................................................................236
Data Center Bridging in a Traffic Flow..................................................................................................................... 237
Enabling Data Center Bridging........................................................................................................................................ 240
DCB Maps and its Attributes..................................................................................................................................... 240
Data Center Bridging: Default Configuration..................................................................................................................241
Configuring PFC in a DCB Map.......................................................................................................................................243
Applying a DCB Map on a Port........................................................................................................................................244
Configuring PFC without a DCB Map............................................................................................................................ 245
Priority-Based Flow Control Using Dynamic Buffer Method.......................................................................................246
Shared headroom for lossless or PFC packets..............................................................................................................247
Configuring Shared Head Room Buffer....................................................................................................................249
Viewing Shared Head Room Usage.......................................................................................................................... 249
Monitoring Buffer Statistics for Tracking Purposes............................................................................................... 249
Behavior of Tagged Packets........................................................................................................................................... 250
Configuration Example for DSCP and PFC Priorities...................................................................................................250
SNMP Support for PFC and Buffer Statistics Tracking...............................................................................................251
Performing PFC Using DSCP Bits Instead of 802.1p Bits............................................................................................ 251
PFC and ETS Configuration Examples...........................................................................................................................253
Using PFC to Manage Converged Ethernet Traffic.....................................................................................................253
Operations on Untagged Packets...................................................................................................................................253
Generation of PFC for a Priority for Untagged Packets..............................................................................................253
Creating an ETS Priority Group.................................................................................................................................253
ETS Operation with DCBx..........................................................................................................................................254
Configuring ETS in a DCB Map................................................................................................................................. 255
Hierarchical Scheduling in ETS Output Policies............................................................................................................ 256
Using ETS to Manage Converged Ethernet Traffic..................................................................................................... 256
Applying DCB Policies in a Switch Stack....................................................................................................................... 256
Configure a DCBx Operation........................................................................................................................................... 257
DCBx Port Roles..........................................................................................................................................................257
Propagation of DCB Information...............................................................................................................................259
Auto-Detection and Manual Configuration of the DCBx Version......................................................................... 259
DCBx Prerequisites and Restrictions........................................................................................................................260
Verifying the DCB Configuration.....................................................................................................................................263
8
Contents
QoS dot1p Traffic Classification and Queue Assignment..............................................................................................271
Configuring the Dynamic Buffer Method........................................................................................................................271
DHCP Packet Format and Options.................................................................................................................................274
Assign an IP Address using DHCP.................................................................................................................................. 275
Configure the System to be a DHCP Server................................................................................................................. 277
Configuring the Server for Automatic Address Allocation..................................................................................... 277
Specifying a Default Gateway....................................................................................................................................278
Configure a Method of Hostname Resolution......................................................................................................... 278
Using DNS for Address Resolution............................................................................................................................278
Using NetBIOS WINS for Address Resolution......................................................................................................... 279
Debugging the DHCP Server.....................................................................................................................................279
Using DHCP Clear Commands.................................................................................................................................. 279
Configure the System to be a DHCP Client.................................................................................................................. 280
Configuring the DHCP Client System.......................................................................................................................280
DHCP Client on a Management Interface................................................................................................................ 281
DHCP Client Operation with Other Features.......................................................................................................... 282
Enabling IP Source Address Validation......................................................................................................................291
DHCP MAC Source Address Validation................................................................................................................... 292
ECMP for Flow-Based Affinity........................................................................................................................................294
Configuring the Hash Algorithm................................................................................................................................ 294
Enabling Deterministic ECMP Next Hop..................................................................................................................294
Configuring the Hash Algorithm Seed...................................................................................................................... 294
Link Bundle Monitoring.....................................................................................................................................................295
Managing ECMP Group Paths.................................................................................................................................. 295
Creating an ECMP Group Bundle............................................................................................................................. 296
Modifying the ECMP Group Threshold.................................................................................................................... 296
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table........................................ 297
Support for ECMP in host table................................................................................................................................ 297
Contents
9
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ............................................................................297
Fibre Channel over Ethernet............................................................................................................................................298
Ensure Robustness in a Converged Ethernet Network............................................................................................... 298
FIP Snooping on Ethernet Bridges..................................................................................................................................299
Using FIP Snooping............................................................................................................................................................301
Important Points to Remember..................................................................................................................................301
Enabling the FCoE Transit Feature...........................................................................................................................303
Enable FIP Snooping on VLANs.................................................................................................................................303
Configure the FC-MAP Value....................................................................................................................................303
Configure a Port for a Bridge-to-Bridge Link.......................................................................................................... 303
Configure a Port for a Bridge-to-FCF Link.............................................................................................................. 303
Impact on Other Software Features.........................................................................................................................304
Ring Status....................................................................................................................................................................315
Important FRRP Points............................................................................................................................................... 316
Important FRRP Concepts..........................................................................................................................................317
Creating the FRRP Group...........................................................................................................................................318
Configuring the Control VLAN................................................................................................................................... 318
Configuring and Adding the Member VLANs........................................................................................................... 319
Setting the FRRP Timers........................................................................................................................................... 320
Clearing the FRRP Counters......................................................................................................................................320
Viewing the FRRP Configuration.............................................................................................................................. 320
Viewing the FRRP Information.................................................................................................................................. 320
Sample Configuration and Topology................................................................................................................................321
FRRP Support on VLT......................................................................................................................................................322
Enabling GVRP on a Layer 2 Interface........................................................................................................................... 327
Configure a GARP Timer.................................................................................................................................................. 327
19 Internet Group Management Protocol (IGMP)........................................................................... 329
IGMP Version 2............................................................................................................................................................329
IGMP Version 3............................................................................................................................................................330
Selecting an IGMP Version.............................................................................................................................................. 334
Adjusting Query and Response Timers.....................................................................................................................335
Removing a Group-Port Association.........................................................................................................................337
Specifying a Port as Connected to a Multicast Router..........................................................................................337
Configuring the Switch as Querier............................................................................................................................ 337
Fast Convergence after MSTP Topology Changes......................................................................................................338
Egress Interface Selection (EIS) for HTTP and IGMP Applications...........................................................................338
Designating a Multicast Router Interface...................................................................................................................... 344
Resetting an Interface to its Factory Default State..................................................................................................... 348
Enabling a Physical Interface........................................................................................................................................... 348
Configuration Task List for Physical Interfaces.......................................................................................................349
Overview of Layer Modes..........................................................................................................................................349
Configuring Port Delay..................................................................................................................................................... 354
Port Channel Interfaces................................................................................................................................................... 354
Port Channel Definition and Standards.................................................................................................................... 355
Port Channel Benefits................................................................................................................................................ 355
Port Channel Implementation.................................................................................................................................... 355
Contents
11
Interfaces in Port Channels........................................................................................................................................355
Configuration Tasks for Port Channel Interfaces................................................................................................... 356
Creating a Port Channel.............................................................................................................................................356
Adding a Physical Interface to a Port Channel........................................................................................................356
Reassigning an Interface to a New Port Channel................................................................................................... 358
Configuring the Minimum Oper Up Links in a Port Channel..................................................................................358
Adding or Removing a Port Channel from a VLAN.................................................................................................359
Assigning an IP Address to a Port Channel..............................................................................................................359
Deleting or Disabling a Port Channel.........................................................................................................................360
Load Balancing Through Port Channels...................................................................................................................360
Changing the Hash Algorithm....................................................................................................................................360
Defining Interface Range Macros................................................................................................................................... 363
Define the Interface Range........................................................................................................................................363
Choosing an Interface-Range Macro........................................................................................................................364
Monitoring and Maintaining Interfaces...........................................................................................................................364
Maintenance Using TDR.............................................................................................................................................365
Non Dell-Qualified Transceivers...................................................................................................................................... 365
Link Dampening................................................................................................................................................................. 366
Enabling Link Dampening............................................................................................................................................369
Link Bundle Monitoring.....................................................................................................................................................370
Using Ethernet Pause Frames for Flow Control............................................................................................................370
Configure the MTU Size on an Interface........................................................................................................................ 371
Configuring wavelength for 10–Gigabit SFP+ optics................................................................................................... 372
Setting the Speed of Ethernet Interfaces......................................................................................................................373
Speed Setting on 25G Interfaces....................................................................................................................................374
Configuring 10G speed on 25G ports............................................................................................................................. 375
OUI on 25G and 50G Interfaces......................................................................................................................................384
Configuring OUI on 25G and 50G Interfaces.......................................................................................................... 384
IP Addresses...................................................................................................................................................................... 386
Configuration Tasks for IP Addresses............................................................................................................................ 386
Assigning IP Addresses to an Interface..........................................................................................................................386
Resolution of Host Names............................................................................................................................................... 390
Enabling Dynamic Resolution of Host Names............................................................................................................... 390
Specifying the Local System Domain and a List of Domains....................................................................................... 391
Configuring DNS with Traceroute................................................................................................................................... 391
Configuration Tasks for ARP........................................................................................................................................... 392
ARP Learning via Gratuitous ARP...................................................................................................................................393
Enabling ARP Learning via Gratuitous ARP................................................................................................................... 393
ARP Learning via ARP Request.......................................................................................................................................393
Configuration Tasks for ICMP.........................................................................................................................................395
Configuring a Broadcast Address....................................................................................................................................397
Configurations Using UDP Helper...................................................................................................................................398
UDP Helper with Broadcast-All Addresses....................................................................................................................398
UDP Helper with Subnet Broadcast Addresses............................................................................................................399
UDP Helper with Configured Broadcast Addresses..................................................................................................... 399
UDP Helper with No Configured Broadcast Addresses...............................................................................................400
Path MTU discovery....................................................................................................................................................401
Path MTU discovery.........................................................................................................................................................406
IPv6 Neighbor Discovery of MTU Packets..............................................................................................................408
Configuring the IPv6 Recursive DNS Server...........................................................................................................408
Debugging IPv6 RDNSS Information Sent to the Host ........................................................................................ 409
Secure Shell (SSH) Over an IPv6 Transport..................................................................................................................410
Configuration Tasks for IPv6............................................................................................................................................410
Adjusting Your CAM-Profile........................................................................................................................................410
Assigning an IPv6 Address to an Interface................................................................................................................411
Assigning a Static IPv6 Route..................................................................................................................................... 411
Configuring Telnet with IPv6......................................................................................................................................412
SNMP over IPv6.......................................................................................................................................................... 412
Configuring IPv6 RA Guard.............................................................................................................................................. 415
Application of Quality of Service to iSCSI Traffic Flows.........................................................................................418
Information Monitored in iSCSI Traffic Flows.......................................................................................................... 419
Detection and Auto-Configuration for Dell EqualLogic Arrays...............................................................................419
Configuring Detection and Ports for Dell Compellent Arrays................................................................................ 420
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................. 420
Enable and Disable iSCSI Optimization......................................................................................................................421
Configuration Tasks for IS-IS.....................................................................................................................................428
Configuring the Distance of a Route........................................................................................................................ 435
Changing the IS-Type.................................................................................................................................................435
Setting the Overload Bit.............................................................................................................................................439
Maximum Values in the Routing Table..................................................................................................................... 440
Change the IS-IS Metric Style in One Level Only................................................................................................... 440
Leaks from One Level to Another............................................................................................................................. 442
25 Link Aggregation Control Protocol (LACP)................................................................................445
Introduction to Dynamic LAGs and LACP......................................................................................................................445
Important Points to Remember.................................................................................................................................445
Creating a LAG............................................................................................................................................................ 446
Configuring the LAG Interfaces as Dynamic............................................................................................................447
Setting the LACP Long Timeout............................................................................................................................... 447
Monitoring and Debugging LACP..............................................................................................................................448
Shared LAG State Tracking............................................................................................................................................. 448
Configuring Shared LAG State Tracking..................................................................................................................449
Important Points about Shared LAG State Tracking..............................................................................................450
Configure a LAG on ALPHA.......................................................................................................................................450
Manage the MAC Address Table.................................................................................................................................... 458
Clearing the MAC Address Table.............................................................................................................................. 458
Setting the Aging Time for Dynamic Entries........................................................................................................... 458
Configuring a Static MAC Address........................................................................................................................... 458
Displaying the MAC Address Table...........................................................................................................................459
MAC Learning Limit.......................................................................................................................................................... 459
Setting the MAC Learning Limit................................................................................................................................459
mac learning-limit Dynamic........................................................................................................................................ 460
mac learning-limit mac-address-sticky.....................................................................................................................460
mac learning-limit station-move................................................................................................................................460
mac learning-limit no-station-move.......................................................................................................................... 460
Setting Station Move Violation Actions.................................................................................................................... 461
Recovering from Learning Limit and Station Move Violations............................................................................... 461
Disabling MAC Address Learning on the System..........................................................................................................462
Enabling port security....................................................................................................................................................... 462
NIC Teaming...................................................................................................................................................................... 462
FEFD State Changes.................................................................................................................................................. 466
Enabling FEFD on an Interface.................................................................................................................................. 468
Protocol Data Units.....................................................................................................................................................470
TIA Organizationally Specific TLVs............................................................................................................................473
Disabling and Undoing LLDP...................................................................................................................................... 477
Enabling LLDP on Management Ports............................................................................................................................477
Disabling and Undoing LLDP on Management Ports.............................................................................................. 477
Viewing the LLDP Configuration..................................................................................................................................... 478
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................... 479
Examples of Viewing Information Advertised by Neighbors.................................................................................. 479
Configuring Transmit and Receive Mode....................................................................................................................... 481
Configuring the Time to Live Value.................................................................................................................................482
28 Microsoft Network Load Balancing...........................................................................................488
Configuring a Switch for NLB ........................................................................................................................................ 489
Enabling a Switch for Multicast NLB........................................................................................................................489
Related Configuration Tasks......................................................................................................................................493
Manage the Source-Active Cache..................................................................................................................................498
Viewing the Source-Active Cache............................................................................................................................ 498
Limiting the Source-Active Cache............................................................................................................................ 498
Clearing the Source-Active Cache............................................................................................................................498
Enabling the Rejected Source-Active Cache...........................................................................................................499
Accept Source-Active Messages that Fail the RFP Check.........................................................................................499
Limiting the Source-Active Messages from a Peer......................................................................................................502
Preventing MSDP from Caching a Local Source..........................................................................................................502
Preventing MSDP from Caching a Remote Source..................................................................................................... 502
Preventing MSDP from Advertising a Local Source.................................................................................................... 503
Logging Changes in Peership States..............................................................................................................................504
Terminating a Peership.....................................................................................................................................................504
MSDP with Anycast RP................................................................................................................................................... 505
Displaying MLD groups table............................................................................................................................................516
Configure the switch as a querier..............................................................................................................................518
Specify port as connected to multicast router........................................................................................................ 518
Display the MLD Snooping Table............................................................................................................................... 518
31 Multiple Spanning Tree Protocol (MSTP).................................................................................. 519
Spanning Tree Variations................................................................................................................................................. 520
Configure Multiple Spanning Tree Protocol...................................................................................................................520
Related Configuration Tasks......................................................................................................................................520
Enable Multiple Spanning Tree Globally.......................................................................................................................... 521
Adding and Removing Interfaces.....................................................................................................................................521
Creating Multiple Spanning Tree Instances....................................................................................................................521
Interoperate with Non-Dell Bridges................................................................................................................................ 523
Changing the Region Name or Revision.........................................................................................................................523
Modifying Global Parameters.......................................................................................................................................... 524
Modifying the Interface Parameters...............................................................................................................................525
Setting STP path cost as constant................................................................................................................................ 525
Configuring an EdgePort..................................................................................................................................................526
Flush MAC Addresses after a Topology Change.......................................................................................................... 526
Enabling IP Multicast........................................................................................................................................................ 533
Track IPv4 and IPv6 Routes...................................................................................................................................... 550
Set Tracking Delays..................................................................................................................................................... 551
Tracking a Layer 2 Interface...................................................................................................................................... 552
Tracking a Layer 3 Interface...................................................................................................................................... 553
Track an IPv4/IPv6 Route......................................................................................................................................... 554
Autonomous System (AS) Areas.............................................................................................................................. 559
Area Types................................................................................................................................................................... 560
Networks and Neighbors............................................................................................................................................ 561
Router Priority and Cost.............................................................................................................................................563
OSPF with Dell EMC Networking OS.............................................................................................................................564
Fast Convergence (OSPFv2, IPv4 Only).................................................................................................................565
Multi-Process OSPFv2 with VRF............................................................................................................................. 565
Configuration Task List for OSPFv2 (OSPF for IPv4)........................................................................................... 567
Configuration Task List for OSPFv3 (OSPF for IPv6)................................................................................................. 578
Assigning IPv6 Addresses on an Interface............................................................................................................... 579
Assigning Area ID on an Interface............................................................................................................................. 579
Assigning OSPFv3 Process ID and Router ID Globally........................................................................................... 580
Assigning OSPFv3 Process ID and Router ID to a VRF......................................................................................... 580
Configuring a Default Route....................................................................................................................................... 581
Applying cost for OSPFv3..........................................................................................................................................582
OSPFv3 Authentication Using IPsec........................................................................................................................ 584
MIB Support for OSPFv3.................................................................................................................................................590
Viewing the OSPFv3 MIB........................................................................................................................................... 591
Configuration Task List for Policy-based Routing........................................................................................................ 593
Create a Redirect List.................................................................................................................................................594
Create a Rule for a Redirect-list................................................................................................................................594
Apply a Redirect-list to an Interface using a Redirect-group................................................................................ 595
Related Configuration Tasks......................................................................................................................................603
Configuring a Designated Router....................................................................................................................................605
Creating Multicast Boundaries and Domains.................................................................................................................606
Electing an RP using the BSR Mechanism.................................................................................................................... 606
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................... 609
Electing an RP using the BSR Mechanism..................................................................................................................... 610
Enabling RP to Server Specific Multicast Groups.................................................................................................... 611
38 Port Monitoring...................................................................................................................... 613
Important Points to Remember....................................................................................................................................... 613
Port Monitoring..................................................................................................................................................................613
Configuring Port Monitoring.............................................................................................................................................615
Remote Port Mirroring..................................................................................................................................................... 620
Remote Port Mirroring Example................................................................................................................................620
Configuring Remote Port Mirroring...........................................................................................................................621
Configuration procedure for Remote Port Mirroring..............................................................................................622
Encapsulated Remote Port Monitoring..........................................................................................................................626
ERPM Behavior on a typical Dell EMC Networking OS ..............................................................................................628
Port Monitoring on VLT................................................................................................................................................... 629
Using the Private VLAN Commands...............................................................................................................................633
Creating a Primary VLAN........................................................................................................................................... 634
Creating a Community VLAN.................................................................................................................................... 635
Creating an Isolated VLAN.........................................................................................................................................636
Configure Per-VLAN Spanning Tree Plus.......................................................................................................................641
Modifying Global PVST+ Parameters.............................................................................................................................643
Configuring an EdgePort..................................................................................................................................................644
PVST+ in Multi-Vendor Networks..................................................................................................................................645
Enabling PVST+ Extend System ID................................................................................................................................ 645
Dot1p to Queue Mapping Requirement....................................................................................................................655
Create a QoS Policy....................................................................................................................................................656
DSCP Color Maps....................................................................................................................................................... 658
Queue Classification Requirements for PFC Functionality.......................................................................................... 663
Support for marking dot1p value in L3 Input Qos Policy.............................................................................................. 663
Weighted Random Early Detection.................................................................................................................................664
Enabling and Disabling WRED Globally..................................................................................................................... 664
Applying a WRED Profile to Traffic...........................................................................................................................665
Displaying Default and Configured WRED Profiles................................................................................................. 665
Displaying WRED Drop Statistics..............................................................................................................................665
Pre-Calculating Available QoS CAM Space...................................................................................................................666
20
Contents
Specifying Policy-Based Rate Shaping in Packets Per Second.................................................................................. 667
Configuring Weights and ECN for WRED .....................................................................................................................668
Configuring WRED and ECN Attributes.........................................................................................................................669
Guidelines for Configuring ECN for Classifying and Color-Marking Packets............................................................ 670
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class.................................... 670
Classifying Incoming Packets Using ECN and Color-Marking................................................................................671
Sample configuration to mark non-ecn packets as “yellow” with single traffic class.........................................672
Applying Layer 2 Match Criteria on a Layer 3 Interface...............................................................................................673
Setting the RMON Alarm........................................................................................................................................... 687
Configuring an RMON Event.....................................................................................................................................688
Configuring the RMON Collection History...............................................................................................................689
44 Rapid Spanning Tree Protocol (RSTP)......................................................................................690
Important Points to Remember.......................................................................................................................................690
RSTP and VLT..............................................................................................................................................................691
Configuring Interfaces for Layer 2 Mode....................................................................................................................... 691
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................... 691
Adding and Removing Interfaces.................................................................................................................................... 693
Modifying Global Parameters.......................................................................................................................................... 693
Enabling SNMP Traps for Root Elections and Topology Changes....................................................................... 695
Configuring an EdgePort..................................................................................................................................................696
Configuring Fast Hellos for Link State Detection......................................................................................................... 696
Configuration Task List for AAA Accounting...........................................................................................................699
Configuration Task List for AAA Authentication..................................................................................................... 706
Obscuring Passwords and Keys...................................................................................................................................... 708
Configuration Task List for Privilege Levels.............................................................................................................709
Configuration Task List for RADIUS.......................................................................................................................... 714
Configuration Task List for TACACS+.......................................................................................................................716
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................................................719
Enabling SCP and SSH......................................................................................................................................................719
Using SCP with SSH to Copy a Software Image.................................................................................................... 720
Removing the RSA Host Keys and Zeroizing Storage ............................................................................................721
Configuring When to Re-generate an SSH Key ......................................................................................................721
Configuring the SSH Server Key Exchange Algorithm............................................................................................721
Configuring the HMAC Algorithm for the SSH Server...........................................................................................722
Configuring the HMAC Algorithm for the SSH Client............................................................................................ 722
Configuring the SSH Server Cipher List...................................................................................................................723
Configuring the SSH Client Cipher List.................................................................................................................... 723
VTY Line and Access-Class Configuration.....................................................................................................................726
VTY Line Local Authentication and Authorization...................................................................................................726
VTY Line Remote Authentication and Authorization...............................................................................................727
Overview of RBAC...................................................................................................................................................... 728
User Roles.................................................................................................................................................................... 730
AAA Authentication and Authorization for Roles.....................................................................................................733
Role Accounting...........................................................................................................................................................735
Display Information About User Roles.......................................................................................................................736
Two Factor Authentication (2FA)................................................................................................................................... 737
Creating Access and Trunk Ports..............................................................................................................................743
Enable VLAN-Stacking for a VLAN...........................................................................................................................743
Contents
Configuring the Protocol Type Value for the Outer VLAN Tag.............................................................................744
Configuring Dell EMC Networking OS Options for Trunk Ports........................................................................... 744
VLAN Stacking in Multi-Vendor Networks.............................................................................................................. 745
VLAN Stacking Packet Drop Precedence......................................................................................................................748
Enabling Drop Eligibility............................................................................................................................................... 748
Honoring the Incoming DEI Value..............................................................................................................................749
Marking Egress Packets with a DEI Value................................................................................................................749
Dynamic Mode CoS for VLAN Stacking.........................................................................................................................750
Mapping C-Tag to S-Tag dot1p Values.....................................................................................................................751
Important Points to Remember.................................................................................................................................758
Enabling and Disabling sFlow on an Interface................................................................................................................758
sFlow Show Commands...................................................................................................................................................759
Displaying Show sFlow Global....................................................................................................................................760
Displaying Show sFlow on an Interface.................................................................................................................... 760
Displaying Show sFlow on a .......................................................................................................................................761
Changing the Polling Intervals.......................................................................................................................................... 761
sFlow on LAG ports...........................................................................................................................................................762
SNMPv3 Compliance With FIPS..................................................................................................................................... 764
Configuration Task List for SNMP..................................................................................................................................765
Important Points to Remember.......................................................................................................................................765
Set up SNMP.....................................................................................................................................................................765
Creating a Community................................................................................................................................................ 766
Setting Up User-Based Security (SNMPv3)........................................................................................................... 766
Configuring Contact and Location Information using SNMP...................................................................................... 768
Subscribing to Managed Object Value Updates using SNMP.....................................................................................769
Enabling a Subset of SNMP Traps..................................................................................................................................769
Enabling an SNMP Agent to Notify Syslog Server Failure...........................................................................................770
Contents
23
Copy Configuration Files Using SNMP............................................................................................................................771
Copying a Configuration File...................................................................................................................................... 772
Copying Configuration Files via SNMP..................................................................................................................... 773
Copying the Startup-Config Files to the Running-Config......................................................................................773
Copying the Startup-Config Files to the Server via FTP........................................................................................773
Copying the Startup-Config Files to the Server via TFTP..................................................................................... 774
Copy a Binary File to the Startup-Configuration..................................................................................................... 774
Additional MIB Objects to View Copy Statistics......................................................................................................774
Obtaining a Value for MIB Objects............................................................................................................................775
MIB Support for Power Monitoring................................................................................................................................ 775
MIB Support for 25G, 40G, 50G, 100G Optical Transceiver or DAC cable IDPROM user info.............................. 776
MIB Support to Display the Available Memory Size on Flash...................................................................................... 777
Viewing the Available Flash Memory Size.................................................................................................................777
MIB Support to Display the Software Core Files Generated by the System.............................................................778
Viewing the Software Core Files Generated by the System................................................................................. 778
MIB Support for PFC Storm Control.............................................................................................................................. 779
MIB Support for PFC no-drop-priority L2Dlf Drop....................................................................................................... 780
MIB Support for Monitoring the overall buffer usage for lossy and lossless traffic per XPE.................................. 781
SNMP Support for WRED Green/Yellow/Red Drop Counters...................................................................................782
MIB Support to Display the Available Partitions on Flash............................................................................................ 783
Viewing the Available Partitions on Flash................................................................................................................. 783
MIB Support to Display the ECN Marked Packets ...................................................................................................... 784
MIB Support to Display Egress Queue Statistics.......................................................................................................... 784
MIB Support to ECMP Group Count..............................................................................................................................784
Viewing the ECMP Group Count Information......................................................................................................... 785
Viewing the FEC BER Details.....................................................................................................................................788
MIB Support for entAliasMappingTable ........................................................................................................................ 790
Viewing the entAliasMappingTable MIB...................................................................................................................790
MIB Support for LAG.........................................................................................................................................................791
Viewing the LAG MIB..................................................................................................................................................792
MIB Support for CAM.......................................................................................................................................................792
Viewing the CAM MIB................................................................................................................................................ 793
MIB support for MAC notification traps.........................................................................................................................793
MIB support for Port Security......................................................................................................................................... 794
Global MIB objects for port security......................................................................................................................... 794
MIB support for interface level port security...........................................................................................................794
MIB objects for configuring MAC addresses...........................................................................................................795
MIB objects for configuring MAC addresses...........................................................................................................796
Configuring SNMP traps for new MAC learning or station–move.............................................................................796
Manage VLANs using SNMP........................................................................................................................................... 797
Creating a VLAN.......................................................................................................................................................... 797
Assigning a VLAN Alias................................................................................................................................................797
Displaying the Ports in a VLAN.................................................................................................................................. 797
Add Tagged and Untagged Ports to a VLAN...........................................................................................................797
Managing Overload on Startup....................................................................................................................................... 798
Enabling and Disabling a Port using SNMP....................................................................................................................799
Fetch Dynamic MAC Entries using SNMP.....................................................................................................................799
Example of Deriving the Interface Index Number.........................................................................................................800
MIB Objects for Viewing the System Image on Flash Partitions.......................................................................... 800
Restore Queue Drop State........................................................................................................................................ 806
View Details of Storm Control PFC.......................................................................................................................... 806
51 Spanning Tree Protocol (STP)................................................................................................. 808
Important Points to Remember.......................................................................................................................................809
Configuring Interfaces for Layer 2 Mode.......................................................................................................................809
Enabling Spanning Tree Protocol Globally...................................................................................................................... 810
Adding an Interface to the Spanning Tree Group..........................................................................................................812
Modifying Global Parameters........................................................................................................................................... 812
Enabling SNMP Traps for Root Elections and Topology Changes..............................................................................818
Configuring Spanning Trees as Hitless............................................................................................................................818
53 System Time and Date............................................................................................................ 829
Network Time Protocol.................................................................................................................................................... 829
Configure the Network Time Protocol..................................................................................................................... 830
Disabling NTP on an Interface....................................................................................................................................831
Configuring a Source IP Address for NTP Packets................................................................................................. 831
Configuring NTP control key password....................................................................................................................834
Configuring the NTP Step-Threshold.......................................................................................................................834
Configuring a Custom-defined Period for NTP time Synchronization................................................................. 834
Dell EMC Networking OS Time and Date...................................................................................................................... 835
Configuration Task List ..............................................................................................................................................835
Setting the Time and Date for the Switch Software Clock...................................................................................835
Setting the Timezone................................................................................................................................................. 835
Set Daylight Saving Time........................................................................................................................................... 836
Setting Daylight Saving Time Once.......................................................................................................................... 836
Configuring a Tunnel.........................................................................................................................................................838
Configuring a Tunnel Interface........................................................................................................................................839
How Uplink Failure Detection Works.............................................................................................................................. 843
UFD and NIC Teaming......................................................................................................................................................844
Important Points to Remember.......................................................................................................................................844
Clearing a UFD-Disabled Interface..................................................................................................................................846
VLANs and Port Tagging................................................................................................................................................. 852
Creating a Port-Based VLAN.....................................................................................................................................853
Assigning Interfaces to a VLAN.................................................................................................................................853
Assigning an IP Address to a VLAN.......................................................................................................................... 855
Enabling Null VLAN as the Default VLAN...................................................................................................................... 856
26
58 Virtual Link Trunking (VLT)..................................................................................................... 857
Layer-2 Traffic in VLT Domains.................................................................................................................................859
VLT on Core Switches.................................................................................................................................................861
Configure Virtual Link Trunking....................................................................................................................................... 862
Important Points to Remember.................................................................................................................................862
Primary and Secondary VLT Peers........................................................................................................................... 866
RSTP and VLT............................................................................................................................................................. 866
VLT and Stacking........................................................................................................................................................ 867
VLT and IGMP Snooping............................................................................................................................................ 867
VLT Port Delayed Restoration................................................................................................................................... 867
PIM-Sparse Mode Support on VLT.......................................................................................................................... 868
Verifying a VLT Configuration......................................................................................................................................... 894
Reconfiguring Stacked Switches as VLT.......................................................................................................................900
Specifying VLT Nodes in a PVLAN.................................................................................................................................900
Configuring a VLT VLAN or LAG in a PVLAN............................................................................................................... 903
Creating a VLT LAG or a VLT VLAN.........................................................................................................................903
Associating the VLT LAG or VLT VLAN in a PVLAN..............................................................................................904
Proxy ARP Capability on VLT Peer Nodes.................................................................................................................... 905
VLT Nodes as Rendezvous Points for Multicast Resiliency........................................................................................906
Configuring VLAN-Stack over VLT................................................................................................................................ 906
IPv6 Peer Routing in VLT Domains Overview...............................................................................................................909
Configure BFD in VLT Domain......................................................................................................................................... 913
Sample BFD configuration in VLT domain................................................................................................................ 913
Proxy Gateway in VLT Domains.......................................................................................................................................918
LLDP VLT Proxy Gateway in a Square VLT Topology............................................................................................ 921
Configuring a Static VLT Proxy Gateway...................................................................................................................... 922
Contents
27
Configuring an LLDP VLT Proxy Gateway.....................................................................................................................922
60 Virtual Extensible LAN (VXLAN)...............................................................................................927
Components of VXLAN network.................................................................................................................................... 928
Functional Overview of VXLAN Gateway......................................................................................................................928
Connecting to an NVP Controller............................................................................................................................. 934
Advertising VXLAN Access Ports to Controller...................................................................................................... 935
Limitations on VXLAN ................................................................................................................................................937
Disabling MAC Address Learning on Static VXLAN Tunnels.................................................................................938
Preserving 802.1 p value across VXLAN tunnels.......................................................................................................... 939
Creating a Non-Default VRF Instance......................................................................................................................942
Assigning an Interface to a VRF................................................................................................................................ 943
Assigning a Front-end Port to a Management VRF............................................................................................... 943
Assigning an OSPF Process to a VRF Instance.......................................................................................................943
Configuring VRRP on a VRF Instance...................................................................................................................... 944
Configuring a Static Route.........................................................................................................................................945
VRRP in a VRF Configuration.................................................................................................................................... 970
VRRP for IPv6 Configuration.....................................................................................................................................975
63 Debugging and Diagnostics......................................................................................................979
Important Points to Remember.................................................................................................................................979
Auto Save on Crash or Rollover...................................................................................................................................... 980
Recognize an Overtemperature Condition.............................................................................................................. 982
Troubleshoot an Over-temperature Condition........................................................................................................982
Recognize an Under-Voltage Condition................................................................................................................... 982
Troubleshoot an Under-Voltage Condition.............................................................................................................. 983
Displaying Drop Counters...........................................................................................................................................984
Display Stack Member Counters...............................................................................................................................986
Mini Core Dumps...............................................................................................................................................................988
RFC and I-D Compliance..................................................................................................................................................992
General Internet Protocols.........................................................................................................................................992
General IPv4 Protocols...............................................................................................................................................993
General IPv6 Protocols...............................................................................................................................................994
Open Shortest Path First (OSPF)............................................................................................................................ 996
Intermediate System to Intermediate System (IS-IS)............................................................................................996
Routing Information Protocol (RIP).......................................................................................................................... 997
Introduction to X.509v3 certificates.............................................................................................................................1004
X.509v3 support in .........................................................................................................................................................1005
Information about installing CA certificates................................................................................................................. 1006
Installing CA certificate............................................................................................................................................. 1007
Information about Creating Certificate Signing Requests (CSR)............................................................................. 1007
Information about installing trusted certificates..........................................................................................................1008
Transport layer security (TLS).......................................................................................................................................1008
Syslog over TLS.........................................................................................................................................................1009
Online Certificate Status Protocol (OSCP)................................................................................................................. 1009
Configuring OCSP setting on CA............................................................................................................................ 1009
Verifying Server certificates......................................................................................................................................1010