Dell PowerSwitch S5048F-ON User Manual

Dell EMC Networking OS Configuration Guide for the S5048F–ON System
9.14.2.4
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Other trademarks may be trademarks of their respective owners.
2019 - 11
Rev. A00
Contents
1 About this Guide..........................................................................................................................31
Audience................................................................................................................................................................................31
Conventions.......................................................................................................................................................................... 31
Related Documents..............................................................................................................................................................31
2 Configuration Fundamentals....................................................................................................... 32
Accessing the Command Line............................................................................................................................................32
CLI Modes............................................................................................................................................................................ 32
Navigating CLI Modes...................................................................................................................................................34
The do Command................................................................................................................................................................36
Undoing Commands............................................................................................................................................................ 37
Obtaining Help......................................................................................................................................................................37
Entering and Editing Commands....................................................................................................................................... 38
Command History................................................................................................................................................................38
Filtering show Command Outputs.................................................................................................................................... 39
Multiple Users in Configuration Mode.............................................................................................................................. 40
Configuring alias command................................................................................................................................................ 40
Viewing alias configuration............................................................................................................................................41
3 Getting Started..........................................................................................................................42
Console Access....................................................................................................................................................................42
Serial Console.................................................................................................................................................................42
Micro USB-B Access.....................................................................................................................................................43
Default Configuration..........................................................................................................................................................44
Configuring a Host Name................................................................................................................................................... 44
Accessing the System Remotely.......................................................................................................................................44
Configure the Management Port IP Address.............................................................................................................44
Configure a Management Route................................................................................................................................. 45
Configuring a Username and Password..................................................................................................................... 45
Configuring the Enable Password..................................................................................................................................... 45
Configuration File Management........................................................................................................................................ 46
Copy Files to and from the System.............................................................................................................................46
Mounting an NFS File System......................................................................................................................................47
Save the Running-Configuration................................................................................................................................. 49
Configure the Overload Bit for a Startup Scenario...................................................................................................49
Viewing Files...................................................................................................................................................................49
Managing the File System...................................................................................................................................................51
View Command History.......................................................................................................................................................51
Upgrading Dell EMC Networking OS................................................................................................................................52
Using HTTP for File Transfers........................................................................................................................................... 52
Verify Software Images Before Installation......................................................................................................................53
4 Management..............................................................................................................................54
Configuring Privilege Levels...............................................................................................................................................54
Contents 3
Removing a Command from EXEC Mode..................................................................................................................55
Moving a Command from EXEC Privilege Mode to EXEC Mode...........................................................................55
Allowing Access to CONFIGURATION Mode Commands....................................................................................... 55
Allowing Access to Different Modes...........................................................................................................................55
Applying a Privilege Level to a Username...................................................................................................................56
Applying a Privilege Level to a Terminal Line............................................................................................................. 56
Configuring Logging............................................................................................................................................................ 57
Audit and Security Logs................................................................................................................................................57
Configuring Logging Format ................................................................................................................................ 58
Setting Up a Secure Connection to a Syslog Server.......................................................................................59
Log Messages in the Internal Buffer.................................................................................................................................60
Disabling System Logging.................................................................................................................................................. 60
Sending System Messages to a Syslog Server............................................................................................................... 60
Configuring a UNIX System as a Syslog Server........................................................................................................ 60
Track Login Activity............................................................................................................................................................. 61
Restrictions for Tracking Login Activity...................................................................................................................... 61
Configuring Login Activity Tracking.............................................................................................................................61
Display Login Statistics..................................................................................................................................................61
Limit Concurrent Login Sessions.......................................................................................................................................63
Restrictions for Limiting the Number of Concurrent Sessions................................................................................63
Configuring Concurrent Session Limit........................................................................................................................ 63
Enabling the System to Clear Existing Sessions........................................................................................................63
Enabling Secured CLI Mode...............................................................................................................................................64
Changing System Logging Settings..................................................................................................................................64
Display the Logging Buffer and the Logging Configuration...........................................................................................65
Configuring a UNIX Logging Facility Level.......................................................................................................................68
Synchronizing Log Messages............................................................................................................................................ 68
Enabling Timestamp on Syslog Messages....................................................................................................................... 69
File Transfer Services..........................................................................................................................................................70
Enabling the FTP Server...............................................................................................................................................70
Configuring FTP Server Parameters............................................................................................................................71
Configuring FTP Client Parameters............................................................................................................................. 71
Terminal Lines...................................................................................................................................................................... 72
Denying and Permitting Access to a Terminal Line................................................................................................... 72
Configuring Login Authentication for Terminal Lines................................................................................................73
Setting Timeout for EXEC Privilege Mode.......................................................................................................................73
Using Telnet to get to Another Network Device.............................................................................................................74
Lock CONFIGURATION Mode...........................................................................................................................................74
Reloading the system..........................................................................................................................................................75
Restoring the Factory Default Settings............................................................................................................................76
Restoring Factory Default Environment Variables.................................................................................................... 76
5 802.1X....................................................................................................................................... 78
Port-Authentication Process............................................................................................................................................. 79
EAP over RADIUS..........................................................................................................................................................80
Configuring 802.1X..............................................................................................................................................................80
Important Points to Remember..........................................................................................................................................81
Enabling 802.1X.................................................................................................................................................................... 81
Configuring dot1x Profile ................................................................................................................................................... 82
Configuring the Static MAB and MAB Profile ................................................................................................................ 83
4
Contents
Configuring Critical VLAN ................................................................................................................................................. 84
Configuring MAC addresses for a do1x Profile................................................................................................................84
Configuring Request Identity Re-Transmissions............................................................................................................. 85
Configuring a Quiet Period after a Failed Authentication.........................................................................................85
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................86
Re-Authenticating a Port................................................................................................................................................... 86
Configuring Timeouts..........................................................................................................................................................87
Configuring Dynamic VLAN Assignment with Port Authentication..............................................................................88
Guest and Authentication-Fail VLANs..............................................................................................................................89
Configuring a Guest VLAN...........................................................................................................................................90
Configuring an Authentication-Fail VLAN.................................................................................................................. 90
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)..........................92
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................................................92
Guidelines for Configuring ACL VLAN Groups................................................................................................................ 92
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters................................................... 93
Configuring ACL VLAN Groups................................................................................................................................... 93
Configuring FP Blocks for VLAN Parameters............................................................................................................94
Viewing CAM Usage........................................................................................................................................................... 94
Allocating FP Blocks for VLAN Processes....................................................................................................................... 97
ACL Optimization to Increase Number of Supported IPv4 ACLs..................................................................................97
Optimizing ACL for More Number of IPv4 ACL Rules..............................................................................................97
7 Access Control Lists (ACLs)........................................................................................................99
IP Access Control Lists (ACLs)........................................................................................................................................100
CAM Usage...................................................................................................................................................................100
Implementing ACLs on Dell EMC Networking OS.................................................................................................... 101
Configure ACL Range Profiles..........................................................................................................................................102
Important Points to Remember....................................................................................................................................... 103
Configuration Task List for Route Maps...................................................................................................................103
Configuring Match Routes..........................................................................................................................................105
Configuring Set Conditions.........................................................................................................................................106
Configure a Route Map for Route Redistribution.................................................................................................... 107
Configure a Route Map for Route Tagging.............................................................................................................. 108
Continue Clause........................................................................................................................................................... 108
IP Fragment Handling........................................................................................................................................................108
IP Fragments ACL Examples...................................................................................................................................... 109
Layer 4 ACL Rules Examples...................................................................................................................................... 109
Configure a Standard IP ACL............................................................................................................................................110
Configuring a Standard IP ACL Filter.......................................................................................................................... 111
Configure an Extended IP ACL..........................................................................................................................................111
Configuring Filters with a Sequence Number............................................................................................................ 111
Configuring Filters Without a Sequence Number.....................................................................................................115
Configure Layer 2 and Layer 3 ACLs............................................................................................................................... 115
Assign an IP ACL to an Interface......................................................................................................................................116
Applying an IP ACL............................................................................................................................................................. 116
Counting ACL Hits........................................................................................................................................................ 117
Configure Ingress ACLs......................................................................................................................................................117
Configure Egress ACLs...................................................................................................................................................... 117
Contents
5
Applying Egress Layer 3 ACLs (Control-Plane)........................................................................................................ 118
Configuring UDF ACL.........................................................................................................................................................119
IP Prefix Lists......................................................................................................................................................................122
Configuration Task List for Prefix Lists.....................................................................................................................122
ACL Resequencing.............................................................................................................................................................125
Resequencing an ACL or Prefix List.......................................................................................................................... 126
Route Maps.........................................................................................................................................................................127
8 Bidirectional Forwarding Detection (BFD)................................................................................... 128
How BFD Works.................................................................................................................................................................128
BFD Packet Format..................................................................................................................................................... 129
BFD Sessions................................................................................................................................................................130
BFD Three-Way Handshake........................................................................................................................................131
Session State Changes................................................................................................................................................132
Important Points to Remember........................................................................................................................................132
Configure BFD....................................................................................................................................................................132
Configure BFD for Physical Ports.............................................................................................................................. 133
Configure BFD for Static Routes............................................................................................................................... 134
Configure BFD for OSPF............................................................................................................................................ 136
Configure BFD for OSPFv3.........................................................................................................................................141
Configure BFD for IS-IS...............................................................................................................................................144
Configure BFD for BGP...............................................................................................................................................145
Configure BFD for VRRP.............................................................................................................................................151
Configuring Protocol Liveness....................................................................................................................................154
Troubleshooting BFD...................................................................................................................................................154
9 Border Gateway Protocol (BGP)................................................................................................ 155
BGP IP version 4 (BGPv4) Overview............................................................................................................................. 155
BGP Autonomous Systems........................................................................................................................................ 155
AS4 Number Representation......................................................................................................................................157
Four-Byte AS Numbers...............................................................................................................................................159
BGP router ID............................................................................................................................................................... 159
Sessions and Peers...................................................................................................................................................... 159
Establish a Session.......................................................................................................................................................159
BGP Attributes for selecting Best Path....................................................................................................................160
Multiprotocol BGP....................................................................................................................................................... 165
BGP global and address family configuration........................................................................................................... 166
Implement BGP with Dell EMC Networking OS.......................................................................................................167
Configuration Information........................................................................................................................................... 170
Basic BGP configuration tasks......................................................................................................................................... 170
Prerequisite for configuring a BGP network.............................................................................................................170
Restrictions................................................................................................................................................................... 170
Enabling BGP................................................................................................................................................................ 170
Enabling four-byte autonomous system numbers................................................................................................... 172
Changing a BGP router ID...........................................................................................................................................173
Configuring AS4 Number Representations...............................................................................................................173
Configuring a BGP peer...............................................................................................................................................174
Example-Configuring BGP routing between peers..................................................................................................175
BGP peer group............................................................................................................................................................176
6
Contents
Advanced BGP configuration tasks.................................................................................................................................183
Route-refresh and Soft-reconfiguration...................................................................................................................183
Aggregating Routes.....................................................................................................................................................185
Filtering BGP.................................................................................................................................................................187
Configuring BGP Fast Fall-Over.................................................................................................................................192
Configuring Passive Peering.......................................................................................................................................193
Enabling Graceful Restart........................................................................................................................................... 194
Redistributing Routes.................................................................................................................................................. 195
Enabling Additional Paths............................................................................................................................................195
Configuring IP Community Lists.................................................................................................................................196
Configuring an IP Extended Community List............................................................................................................197
Configure BGP attributes........................................................................................................................................... 198
Enabling Multipath....................................................................................................................................................... 201
Route Reflectors......................................................................................................................................................... 202
Enabling Route Flap Dampening................................................................................................................................203
Changing BGP keepalive and hold timers................................................................................................................ 205
Setting the extended timer........................................................................................................................................205
Enabling or disabling BGP neighbors........................................................................................................................ 206
Route Map Continue...................................................................................................................................................207
Configuring BGP Confederations..............................................................................................................................207
Configuring a BGP VRF address family....................................................................................................................208
Maintaining Existing AS Numbers During an AS Migration....................................................................................209
Allowing an AS Number to Appear in its Own AS Path...........................................................................................210
Enabling MBGP Configurations...................................................................................................................................211
MBGP support for IPv6............................................................................................................................................... 211
Configuring IPv6 MBGP between peers....................................................................................................................211
Example-Configuring IPv4 and IPv6 neighbors........................................................................................................212
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor............................................. 214
BGP Regular Expression Optimization...................................................................................................................... 215
Debugging BGP............................................................................................................................................................216
10 Content Addressable Memory (CAM)........................................................................................ 218
CAM Allocation...................................................................................................................................................................218
Test CAM Usage...............................................................................................................................................................220
View CAM-ACL Settings..................................................................................................................................................220
View CAM Usage............................................................................................................................................................... 221
CAM Optimization.............................................................................................................................................................222
Troubleshoot CAM Profiling.............................................................................................................................................222
QoS CAM Region Limitation...................................................................................................................................... 222
Syslog Error When the Table is Full.......................................................................................................................... 222
Syslog Warning Upon 90 Percent Utilization of CAM............................................................................................223
Syslog Warning for Discrepancies Between Configured Extended Prefixes.......................................................223
Unified Forwarding Table (UFT) Modes.........................................................................................................................223
Configuring UFT Modes............................................................................................................................................. 223
11 Control Plane Policing (CoPP).................................................................................................. 225
Configure Control Plane Policing.....................................................................................................................................226
Configuring CoPP for Protocols................................................................................................................................ 227
Configuring CoPP for CPU Queues..........................................................................................................................228
Contents
7
Protocol to CPU Queue Mapping............................................................................................................................. 229
Configuring Protocol to CPU Queue Mapping........................................................................................................ 230
Displaying CoPP Configuration .................................................................................................................................230
12 Data Center Bridging (DCB)..................................................................................................... 233
Ethernet Enhancements in Data Center Bridging.........................................................................................................233
Priority-Based Flow Control.......................................................................................................................................234
Enhanced Transmission Selection.............................................................................................................................235
Data Center Bridging Exchange Protocol (DCBx)..................................................................................................236
Data Center Bridging in a Traffic Flow..................................................................................................................... 237
Buffer Organization.....................................................................................................................................................237
Enabling Data Center Bridging........................................................................................................................................ 240
DCB Maps and its Attributes..................................................................................................................................... 240
Data Center Bridging: Default Configuration..................................................................................................................241
Configuring Priority-Based Flow Control........................................................................................................................ 241
Configuring Lossless Queues..................................................................................................................................... 242
Configuring PFC in a DCB Map.......................................................................................................................................243
Applying a DCB Map on a Port........................................................................................................................................244
Configuring PFC without a DCB Map............................................................................................................................ 245
Priority-Based Flow Control Using Dynamic Buffer Method.......................................................................................246
Shared headroom for lossless or PFC packets..............................................................................................................247
Configuring Shared Head Room Buffer....................................................................................................................249
Viewing Shared Head Room Usage.......................................................................................................................... 249
Monitoring Buffer Statistics for Tracking Purposes............................................................................................... 249
Behavior of Tagged Packets........................................................................................................................................... 250
Configuration Example for DSCP and PFC Priorities...................................................................................................250
SNMP Support for PFC and Buffer Statistics Tracking...............................................................................................251
Performing PFC Using DSCP Bits Instead of 802.1p Bits............................................................................................ 251
PFC and ETS Configuration Examples...........................................................................................................................253
Using PFC to Manage Converged Ethernet Traffic.....................................................................................................253
Operations on Untagged Packets...................................................................................................................................253
Generation of PFC for a Priority for Untagged Packets..............................................................................................253
Configure Enhanced Transmission Selection................................................................................................................ 253
Creating an ETS Priority Group.................................................................................................................................253
ETS Operation with DCBx..........................................................................................................................................254
Configuring ETS in a DCB Map................................................................................................................................. 255
Hierarchical Scheduling in ETS Output Policies............................................................................................................ 256
Using ETS to Manage Converged Ethernet Traffic..................................................................................................... 256
Applying DCB Policies in a Switch Stack....................................................................................................................... 256
Configure a DCBx Operation........................................................................................................................................... 257
DCBx Operation...........................................................................................................................................................257
DCBx Port Roles..........................................................................................................................................................257
DCB Configuration Exchange....................................................................................................................................258
Configuration Source Election...................................................................................................................................259
Propagation of DCB Information...............................................................................................................................259
Auto-Detection and Manual Configuration of the DCBx Version......................................................................... 259
DCBx Example............................................................................................................................................................. 260
DCBx Prerequisites and Restrictions........................................................................................................................260
Configuring DCBx........................................................................................................................................................260
Verifying the DCB Configuration.....................................................................................................................................263
8
Contents
QoS dot1p Traffic Classification and Queue Assignment..............................................................................................271
Configuring the Dynamic Buffer Method........................................................................................................................271
Sample DCB Configuration.............................................................................................................................................. 272
13 Dynamic Host Configuration Protocol (DHCP)........................................................................... 274
DHCP Packet Format and Options.................................................................................................................................274
Assign an IP Address using DHCP.................................................................................................................................. 275
Implementation Information............................................................................................................................................. 276
Configure the System to be a DHCP Server................................................................................................................. 277
Configuring the Server for Automatic Address Allocation..................................................................................... 277
Specifying a Default Gateway....................................................................................................................................278
Configure a Method of Hostname Resolution......................................................................................................... 278
Using DNS for Address Resolution............................................................................................................................278
Using NetBIOS WINS for Address Resolution......................................................................................................... 279
Creating Manual Binding Entries............................................................................................................................... 279
Debugging the DHCP Server.....................................................................................................................................279
Using DHCP Clear Commands.................................................................................................................................. 279
Configure the System to be a DHCP Client.................................................................................................................. 280
Configuring the DHCP Client System.......................................................................................................................280
DHCP Client on a Management Interface................................................................................................................ 281
DHCP Client Operation with Other Features.......................................................................................................... 282
Configuring DHCP relay source interface......................................................................................................................282
Global DHCP relay source IPv4 or IPv6 configuration ...........................................................................................282
Interface level DHCP relay source IPv4 or IPv6 configuration .............................................................................283
Configure Secure DHCP.................................................................................................................................................. 284
Option 82 (DHCPv4 relay options)...........................................................................................................................284
DHCPv6 relay agent options..................................................................................................................................... 285
DHCP Snooping...........................................................................................................................................................285
Drop DHCP Packets on Snooped VLANs Only....................................................................................................... 289
Dynamic ARP Inspection............................................................................................................................................ 289
Configuring Dynamic ARP Inspection.......................................................................................................................290
Source Address Validation................................................................................................................................................ 291
Enabling IP Source Address Validation......................................................................................................................291
DHCP MAC Source Address Validation................................................................................................................... 292
Enabling IP+MAC Source Address Validation..........................................................................................................292
Viewing the Number of SAV Dropped Packets.......................................................................................................292
Clearing the Number of SAV Dropped Packets...................................................................................................... 293
14 Equal Cost Multi-Path (ECMP).................................................................................................294
ECMP for Flow-Based Affinity........................................................................................................................................294
Configuring the Hash Algorithm................................................................................................................................ 294
Enabling Deterministic ECMP Next Hop..................................................................................................................294
Configuring the Hash Algorithm Seed...................................................................................................................... 294
Link Bundle Monitoring.....................................................................................................................................................295
Managing ECMP Group Paths.................................................................................................................................. 295
Creating an ECMP Group Bundle............................................................................................................................. 296
Modifying the ECMP Group Threshold.................................................................................................................... 296
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table........................................ 297
Support for ECMP in host table................................................................................................................................ 297
Contents
9
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ............................................................................297
15 FIP Snooping.......................................................................................................................... 298
Fibre Channel over Ethernet............................................................................................................................................298
Ensure Robustness in a Converged Ethernet Network............................................................................................... 298
FIP Snooping on Ethernet Bridges..................................................................................................................................299
Using FIP Snooping............................................................................................................................................................301
FIP Snooping Prerequisites.........................................................................................................................................301
Important Points to Remember..................................................................................................................................301
Enabling the FCoE Transit Feature...........................................................................................................................303
Enable FIP Snooping on VLANs.................................................................................................................................303
Configure the FC-MAP Value....................................................................................................................................303
Configure a Port for a Bridge-to-Bridge Link.......................................................................................................... 303
Configure a Port for a Bridge-to-FCF Link.............................................................................................................. 303
Impact on Other Software Features.........................................................................................................................304
FIP Snooping Restrictions.......................................................................................................................................... 304
Configuring FIP Snooping...........................................................................................................................................304
Displaying FIP Snooping Information.............................................................................................................................. 305
FCoE Transit Configuration Example............................................................................................................................. 309
16 Flex Hash and Optimized Boot-Up..............................................................................................311
Flex Hash Capability Overview..........................................................................................................................................311
Configuring the Flex Hash Mechanism............................................................................................................................ 311
RDMA Over Converged Ethernet (RoCE) Overview....................................................................................................312
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces......................................................................................... 312
17 Force10 Resilient Ring Protocol (FRRP).....................................................................................314
Protocol Overview............................................................................................................................................................. 314
Ring Status....................................................................................................................................................................315
Multiple FRRP Rings....................................................................................................................................................315
Important FRRP Points............................................................................................................................................... 316
Important FRRP Concepts..........................................................................................................................................317
Implementing FRRP........................................................................................................................................................... 317
FRRP Configuration...........................................................................................................................................................318
Creating the FRRP Group...........................................................................................................................................318
Configuring the Control VLAN................................................................................................................................... 318
Configuring and Adding the Member VLANs........................................................................................................... 319
Setting the FRRP Timers........................................................................................................................................... 320
Clearing the FRRP Counters......................................................................................................................................320
Viewing the FRRP Configuration.............................................................................................................................. 320
Viewing the FRRP Information.................................................................................................................................. 320
Troubleshooting FRRP...................................................................................................................................................... 321
Sample Configuration and Topology................................................................................................................................321
FRRP Support on VLT......................................................................................................................................................322
18 GARP VLAN Registration Protocol (GVRP)................................................................................325
Configure GVRP................................................................................................................................................................325
Enabling GVRP Globally....................................................................................................................................................326
Enabling GVRP on a Layer 2 Interface........................................................................................................................... 327
10
Contents
Configure GVRP Registration..........................................................................................................................................327
Configure a GARP Timer.................................................................................................................................................. 327
19 Internet Group Management Protocol (IGMP)........................................................................... 329
IGMP Protocol Overview................................................................................................................................................. 329
IGMP Version 2............................................................................................................................................................329
IGMP Version 3............................................................................................................................................................330
Configure IGMP.................................................................................................................................................................333
Viewing IGMP Enabled Interfaces...................................................................................................................................333
Selecting an IGMP Version.............................................................................................................................................. 334
Viewing IGMP Groups...................................................................................................................................................... 334
Adjusting Timers................................................................................................................................................................335
Adjusting Query and Response Timers.....................................................................................................................335
Enabling IGMP Immediate-Leave....................................................................................................................................335
IGMP Snooping..................................................................................................................................................................336
Configuring IGMP Snooping...................................................................................................................................... 336
Removing a Group-Port Association.........................................................................................................................337
Disabling Multicast Flooding.......................................................................................................................................337
Specifying a Port as Connected to a Multicast Router..........................................................................................337
Configuring the Switch as Querier............................................................................................................................ 337
Fast Convergence after MSTP Topology Changes......................................................................................................338
Egress Interface Selection (EIS) for HTTP and IGMP Applications...........................................................................338
Designating a Multicast Router Interface...................................................................................................................... 344
20 Interfaces.............................................................................................................................. 345
Interface Types..................................................................................................................................................................346
View Basic Interface Information.................................................................................................................................... 346
Resetting an Interface to its Factory Default State..................................................................................................... 348
Enabling a Physical Interface........................................................................................................................................... 348
Physical Interfaces............................................................................................................................................................ 349
Configuration Task List for Physical Interfaces.......................................................................................................349
Overview of Layer Modes..........................................................................................................................................349
Configuring Layer 2 (Data Link) Mode..................................................................................................................... 349
Configuring Layer 2 (Interface) Mode......................................................................................................................350
Configuring Layer 3 (Network) Mode......................................................................................................................350
Configuring Layer 3 (Interface) Mode......................................................................................................................350
Egress Interface Selection (EIS)......................................................................................................................................351
Configuring EIS.............................................................................................................................................................351
Management Interfaces................................................................................................................................................... 352
Configuring Management Interfaces........................................................................................................................352
Configuring a Management Interface on an Ethernet Port...................................................................................352
VLAN Interfaces................................................................................................................................................................353
Loopback Interfaces......................................................................................................................................................... 353
Null Interfaces....................................................................................................................................................................354
Configuring Port Delay..................................................................................................................................................... 354
Port Channel Interfaces................................................................................................................................................... 354
Port Channel Definition and Standards.................................................................................................................... 355
Port Channel Benefits................................................................................................................................................ 355
Port Channel Implementation.................................................................................................................................... 355
Contents
11
Interfaces in Port Channels........................................................................................................................................355
Configuration Tasks for Port Channel Interfaces................................................................................................... 356
Creating a Port Channel.............................................................................................................................................356
Adding a Physical Interface to a Port Channel........................................................................................................356
Reassigning an Interface to a New Port Channel................................................................................................... 358
Configuring the Minimum Oper Up Links in a Port Channel..................................................................................358
Adding or Removing a Port Channel from a VLAN.................................................................................................359
Assigning an IP Address to a Port Channel..............................................................................................................359
Deleting or Disabling a Port Channel.........................................................................................................................360
Load Balancing Through Port Channels...................................................................................................................360
Load-Balancing Method............................................................................................................................................. 360
Changing the Hash Algorithm....................................................................................................................................360
Bulk Configuration..............................................................................................................................................................361
Interface Range............................................................................................................................................................361
Bulk Configuration Examples..................................................................................................................................... 362
Defining Interface Range Macros................................................................................................................................... 363
Define the Interface Range........................................................................................................................................363
Choosing an Interface-Range Macro........................................................................................................................364
Monitoring and Maintaining Interfaces...........................................................................................................................364
Maintenance Using TDR.............................................................................................................................................365
Non Dell-Qualified Transceivers...................................................................................................................................... 365
Splitting 100G Ports..........................................................................................................................................................366
Link Dampening................................................................................................................................................................. 366
Enabling Link Dampening............................................................................................................................................369
Link Bundle Monitoring.....................................................................................................................................................370
Using Ethernet Pause Frames for Flow Control............................................................................................................370
Enabling Pause Frames................................................................................................................................................371
Configure the MTU Size on an Interface........................................................................................................................ 371
Configuring wavelength for 10–Gigabit SFP+ optics................................................................................................... 372
Port-Pipes.......................................................................................................................................................................... 372
CR4 Auto-Negotiation...................................................................................................................................................... 372
Setting the Speed of Ethernet Interfaces......................................................................................................................373
Speed Setting on 25G Interfaces....................................................................................................................................374
Configuring 10G speed on 25G ports............................................................................................................................. 375
FEC Configuration.............................................................................................................................................................376
View Advanced Interface Information............................................................................................................................ 378
Configuring the Interface Sampling Size.................................................................................................................. 378
Configuring the Traffic Sampling Size Globally............................................................................................................. 379
Dynamic Counters..............................................................................................................................................................381
Clearing Interface Counters........................................................................................................................................381
Enhanced Validation of Interface Ranges...................................................................................................................... 382
Compressing Configuration Files.....................................................................................................................................382
OUI on 25G and 50G Interfaces......................................................................................................................................384
Configuring OUI on 25G and 50G Interfaces.......................................................................................................... 384
12
21 IPv4 Routing...........................................................................................................................385
IP Addresses...................................................................................................................................................................... 386
Configuration Tasks for IP Addresses............................................................................................................................ 386
Assigning IP Addresses to an Interface..........................................................................................................................386
Configuring Static Routes................................................................................................................................................ 387
Contents
Adding description for IPv4 and IPv6 static routes................................................................................................ 388
Configure Static Routes for the Management Interface.............................................................................................388
Using the Configured Source IP Address in ICMP Messages.....................................................................................389
Configuring the Duration to Establish a TCP Connection........................................................................................... 389
Enabling Directed Broadcast........................................................................................................................................... 390
Resolution of Host Names............................................................................................................................................... 390
Enabling Dynamic Resolution of Host Names............................................................................................................... 390
Specifying the Local System Domain and a List of Domains....................................................................................... 391
Configuring DNS with Traceroute................................................................................................................................... 391
ARP..................................................................................................................................................................................... 392
Configuration Tasks for ARP........................................................................................................................................... 392
Configuring Static ARP Entries....................................................................................................................................... 392
Enabling Proxy ARP.......................................................................................................................................................... 392
Clearing ARP Cache..........................................................................................................................................................393
ARP Learning via Gratuitous ARP...................................................................................................................................393
Enabling ARP Learning via Gratuitous ARP................................................................................................................... 393
ARP Learning via ARP Request.......................................................................................................................................393
Configuring ARP Retries.................................................................................................................................................. 394
ICMP...................................................................................................................................................................................395
Configuration Tasks for ICMP.........................................................................................................................................395
Enabling ICMP Unreachable Messages..........................................................................................................................395
ICMP Redirects................................................................................................................................................................. 395
UDP Helper........................................................................................................................................................................ 396
Enabling UDP Helper.........................................................................................................................................................397
Configuring a Broadcast Address....................................................................................................................................397
Configurations Using UDP Helper...................................................................................................................................398
UDP Helper with Broadcast-All Addresses....................................................................................................................398
UDP Helper with Subnet Broadcast Addresses............................................................................................................399
UDP Helper with Configured Broadcast Addresses..................................................................................................... 399
UDP Helper with No Configured Broadcast Addresses...............................................................................................400
Troubleshooting UDP Helper...........................................................................................................................................400
22 IPv6 Routing...........................................................................................................................401
Protocol Overview.............................................................................................................................................................401
Extended Address Space............................................................................................................................................ 401
Path MTU discovery....................................................................................................................................................401
Stateless Autoconfiguration.......................................................................................................................................402
IPv6 Headers................................................................................................................................................................403
Longest Prefix Match (LPM) Table and IPv6 /65 – /128 support...................................................................... 403
IPv6 Header Fields...................................................................................................................................................... 403
Extension Header Fields............................................................................................................................................. 404
Addressing....................................................................................................................................................................405
Implementing IPv6 with Dell EMC Networking OS...................................................................................................... 406
ICMPv6.............................................................................................................................................................................. 406
Path MTU discovery.........................................................................................................................................................406
IPv6 Neighbor Discovery..................................................................................................................................................407
IPv6 Neighbor Discovery of MTU Packets..............................................................................................................408
Configuring the IPv6 Recursive DNS Server...........................................................................................................408
Debugging IPv6 RDNSS Information Sent to the Host ........................................................................................ 409
Displaying IPv6 RDNSS Information......................................................................................................................... 409
Contents
13
Secure Shell (SSH) Over an IPv6 Transport..................................................................................................................410
Configuration Tasks for IPv6............................................................................................................................................410
Adjusting Your CAM-Profile........................................................................................................................................410
Assigning an IPv6 Address to an Interface................................................................................................................411
Assigning a Static IPv6 Route..................................................................................................................................... 411
Configuring Telnet with IPv6......................................................................................................................................412
SNMP over IPv6.......................................................................................................................................................... 412
Displaying IPv6 Information.........................................................................................................................................412
Displaying an IPv6 Interface Information.................................................................................................................. 412
Showing IPv6 Routes.................................................................................................................................................. 413
Showing the Running-Configuration for an Interface............................................................................................. 414
Clearing IPv6 Routes................................................................................................................................................... 415
Configuring IPv6 RA Guard.............................................................................................................................................. 415
23 iSCSI Optimization.................................................................................................................. 417
iSCSI Optimization Overview............................................................................................................................................417
Monitoring iSCSI Traffic Flows...................................................................................................................................418
Application of Quality of Service to iSCSI Traffic Flows.........................................................................................418
Information Monitored in iSCSI Traffic Flows.......................................................................................................... 419
Detection and Auto-Configuration for Dell EqualLogic Arrays...............................................................................419
Configuring Detection and Ports for Dell Compellent Arrays................................................................................ 420
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................. 420
Enable and Disable iSCSI Optimization......................................................................................................................421
Default iSCSI Optimization Values...................................................................................................................................421
iSCSI Optimization Prerequisites..................................................................................................................................... 421
Configuring iSCSI Optimization....................................................................................................................................... 422
Displaying iSCSI Optimization Information.....................................................................................................................423
24 Intermediate System to Intermediate System........................................................................... 425
IS-IS Protocol Overview...................................................................................................................................................425
IS-IS Addressing................................................................................................................................................................ 425
Multi-Topology IS-IS......................................................................................................................................................... 426
Transition Mode...........................................................................................................................................................426
Interface Support........................................................................................................................................................ 426
Adjacencies...................................................................................................................................................................426
Graceful Restart................................................................................................................................................................ 427
Timers............................................................................................................................................................................427
Implementation Information............................................................................................................................................. 427
Configuration Information................................................................................................................................................ 428
Configuration Tasks for IS-IS.....................................................................................................................................428
Configuring the Distance of a Route........................................................................................................................ 435
Changing the IS-Type.................................................................................................................................................435
Redistributing IPv4 Routes.........................................................................................................................................437
Redistributing IPv6 Routes.........................................................................................................................................438
Configuring Authentication Passwords.................................................................................................................... 438
Setting the Overload Bit.............................................................................................................................................439
Debugging IS-IS...........................................................................................................................................................439
IS-IS Metric Styles............................................................................................................................................................ 440
Configure Metric Values...................................................................................................................................................440
14
Contents
Maximum Values in the Routing Table..................................................................................................................... 440
Change the IS-IS Metric Style in One Level Only................................................................................................... 440
Leaks from One Level to Another............................................................................................................................. 442
Sample Configurations......................................................................................................................................................442
25 Link Aggregation Control Protocol (LACP)................................................................................445
Introduction to Dynamic LAGs and LACP......................................................................................................................445
Important Points to Remember.................................................................................................................................445
LACP Modes................................................................................................................................................................445
Configuring LACP Commands...................................................................................................................................446
LACP Configuration Tasks...............................................................................................................................................446
Creating a LAG............................................................................................................................................................ 446
Configuring the LAG Interfaces as Dynamic............................................................................................................447
Setting the LACP Long Timeout............................................................................................................................... 447
Monitoring and Debugging LACP..............................................................................................................................448
Shared LAG State Tracking............................................................................................................................................. 448
Configuring Shared LAG State Tracking..................................................................................................................449
Important Points about Shared LAG State Tracking..............................................................................................450
LACP Basic Configuration Example................................................................................................................................450
Configure a LAG on ALPHA.......................................................................................................................................450
26 Layer 2.................................................................................................................................. 458
Manage the MAC Address Table.................................................................................................................................... 458
Clearing the MAC Address Table.............................................................................................................................. 458
Setting the Aging Time for Dynamic Entries........................................................................................................... 458
Configuring a Static MAC Address........................................................................................................................... 458
Displaying the MAC Address Table...........................................................................................................................459
MAC Learning Limit.......................................................................................................................................................... 459
Setting the MAC Learning Limit................................................................................................................................459
mac learning-limit Dynamic........................................................................................................................................ 460
mac learning-limit mac-address-sticky.....................................................................................................................460
mac learning-limit station-move................................................................................................................................460
mac learning-limit no-station-move.......................................................................................................................... 460
Learning Limit Violation Actions................................................................................................................................. 461
Setting Station Move Violation Actions.................................................................................................................... 461
Recovering from Learning Limit and Station Move Violations............................................................................... 461
Disabling MAC Address Learning on the System..........................................................................................................462
Enabling port security....................................................................................................................................................... 462
NIC Teaming...................................................................................................................................................................... 462
Configure Redundant Pairs..............................................................................................................................................463
Far-End Failure Detection................................................................................................................................................ 466
FEFD State Changes.................................................................................................................................................. 466
Configuring FEFD........................................................................................................................................................ 467
Enabling FEFD on an Interface.................................................................................................................................. 468
Debugging FEFD..........................................................................................................................................................468
27 Link Layer Discovery Protocol (LLDP).......................................................................................470
802.1AB (LLDP) Overview...............................................................................................................................................470
Protocol Data Units.....................................................................................................................................................470
Contents
15
Optional TLVs..................................................................................................................................................................... 471
Management TLVs.......................................................................................................................................................471
TIA-1057 (LLDP-MED) Overview................................................................................................................................... 472
TIA Organizationally Specific TLVs............................................................................................................................473
Configure LLDP................................................................................................................................................................. 475
CONFIGURATION versus INTERFACE Configurations............................................................................................... 476
Enabling LLDP....................................................................................................................................................................477
Disabling and Undoing LLDP...................................................................................................................................... 477
Enabling LLDP on Management Ports............................................................................................................................477
Disabling and Undoing LLDP on Management Ports.............................................................................................. 477
Advertising TLVs............................................................................................................................................................... 478
Viewing the LLDP Configuration..................................................................................................................................... 478
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................... 479
Examples of Viewing Information Advertised by Neighbors.................................................................................. 479
Configuring LLDPDU Intervals......................................................................................................................................... 481
Configuring Transmit and Receive Mode....................................................................................................................... 481
Configuring the Time to Live Value.................................................................................................................................482
Debugging LLDP................................................................................................................................................................483
Relevant Management Objects.......................................................................................................................................484
28 Microsoft Network Load Balancing...........................................................................................488
Configuring a Switch for NLB ........................................................................................................................................ 489
Enabling a Switch for Multicast NLB........................................................................................................................489
29 Multicast Source Discovery Protocol (MSDP)............................................................................491
Anycast RP.........................................................................................................................................................................492
Implementation Information.............................................................................................................................................493
Configure Multicast Source Discovery Protocol...........................................................................................................493
Related Configuration Tasks......................................................................................................................................493
Enable MSDP.....................................................................................................................................................................497
Manage the Source-Active Cache..................................................................................................................................498
Viewing the Source-Active Cache............................................................................................................................ 498
Limiting the Source-Active Cache............................................................................................................................ 498
Clearing the Source-Active Cache............................................................................................................................498
Enabling the Rejected Source-Active Cache...........................................................................................................499
Accept Source-Active Messages that Fail the RFP Check.........................................................................................499
Specifying Source-Active Messages...............................................................................................................................501
Limiting the Source-Active Messages from a Peer......................................................................................................502
Preventing MSDP from Caching a Local Source..........................................................................................................502
Preventing MSDP from Caching a Remote Source..................................................................................................... 502
Preventing MSDP from Advertising a Local Source.................................................................................................... 503
Logging Changes in Peership States..............................................................................................................................504
Terminating a Peership.....................................................................................................................................................504
Clearing Peer Statistics.................................................................................................................................................... 504
Debugging MSDP..............................................................................................................................................................505
MSDP with Anycast RP................................................................................................................................................... 505
Configuring Anycast RP...................................................................................................................................................506
Reducing Source-Active Message Flooding............................................................................................................ 507
Specifying the RP Address Used in SA Messages..................................................................................................507
16
Contents
MSDP Sample Configurations.........................................................................................................................................509
30 Multicast Listener Discovery Protocol.......................................................................................512
MLD timers......................................................................................................................................................................... 515
Reducing Host Response Burstiness.........................................................................................................................515
Configuring MLD Version..................................................................................................................................................516
Clearing MLD groups.........................................................................................................................................................516
Debugging MLD................................................................................................................................................................. 516
Explicit Tracking................................................................................................................................................................. 516
Reducing Leave Latency...................................................................................................................................................516
Displaying MLD groups table............................................................................................................................................516
Displaying MLD Interfaces................................................................................................................................................ 517
MLD Snooping....................................................................................................................................................................517
Enable MLD Snooping................................................................................................................................................. 517
Disable MLD Snooping.................................................................................................................................................517
Configure the switch as a querier..............................................................................................................................518
Specify port as connected to multicast router........................................................................................................ 518
Enable Snooping Explicit Tracking............................................................................................................................. 518
Display the MLD Snooping Table............................................................................................................................... 518
31 Multiple Spanning Tree Protocol (MSTP).................................................................................. 519
Spanning Tree Variations................................................................................................................................................. 520
Implementation Information.......................................................................................................................................520
Configure Multiple Spanning Tree Protocol...................................................................................................................520
Related Configuration Tasks......................................................................................................................................520
Enable Multiple Spanning Tree Globally.......................................................................................................................... 521
Adding and Removing Interfaces.....................................................................................................................................521
Creating Multiple Spanning Tree Instances....................................................................................................................521
Influencing MSTP Root Selection................................................................................................................................... 523
Interoperate with Non-Dell Bridges................................................................................................................................ 523
Changing the Region Name or Revision.........................................................................................................................523
Modifying Global Parameters.......................................................................................................................................... 524
Modifying the Interface Parameters...............................................................................................................................525
Setting STP path cost as constant................................................................................................................................ 525
Configuring an EdgePort..................................................................................................................................................526
Flush MAC Addresses after a Topology Change.......................................................................................................... 526
MSTP Sample Configurations..........................................................................................................................................527
Debugging and Verifying MSTP Configurations............................................................................................................ 531
32 Multicast Features..................................................................................................................533
Enabling IP Multicast........................................................................................................................................................ 533
Implementation Information.............................................................................................................................................533
Multicast Policies...............................................................................................................................................................534
IPv4 Multicast Policies................................................................................................................................................534
Understanding Multicast Traceroute (mtrace)..............................................................................................................541
Printing Multicast Traceroute (mtrace) Paths...............................................................................................................541
Supported Error Codes.................................................................................................................................................... 543
mtrace Scenarios.............................................................................................................................................................. 543
Contents
17
33 Object Tracking......................................................................................................................549
Object Tracking Overview............................................................................................................................................... 549
Track Layer 2 Interfaces............................................................................................................................................ 550
Track Layer 3 Interfaces............................................................................................................................................ 550
Track IPv4 and IPv6 Routes...................................................................................................................................... 550
Set Tracking Delays..................................................................................................................................................... 551
VRRP Object Tracking................................................................................................................................................552
Object Tracking Configuration........................................................................................................................................ 552
Tracking a Layer 2 Interface...................................................................................................................................... 552
Tracking a Layer 3 Interface...................................................................................................................................... 553
Track an IPv4/IPv6 Route......................................................................................................................................... 554
Displaying Tracked Objects..............................................................................................................................................557
34 Open Shortest Path First (OSPFv2 and OSPFv3)...................................................................... 559
Protocol Overview............................................................................................................................................................ 559
Autonomous System (AS) Areas.............................................................................................................................. 559
Area Types................................................................................................................................................................... 560
Networks and Neighbors............................................................................................................................................ 561
Router Types................................................................................................................................................................ 561
Designated and Backup Designated Routers.......................................................................................................... 562
Link-State Advertisements (LSAs)...........................................................................................................................562
Router Priority and Cost.............................................................................................................................................563
OSPF with Dell EMC Networking OS.............................................................................................................................564
Graceful Restart.......................................................................................................................................................... 564
Fast Convergence (OSPFv2, IPv4 Only).................................................................................................................565
Multi-Process OSPFv2 with VRF............................................................................................................................. 565
OSPF ACK Packing.....................................................................................................................................................566
Setting OSPF Adjacency with Cisco Routers..........................................................................................................566
Configuration Information................................................................................................................................................566
Configuration Task List for OSPFv2 (OSPF for IPv4)........................................................................................... 567
Configuration Task List for OSPFv3 (OSPF for IPv6)................................................................................................. 578
Enabling IPv6 Unicast Routing...................................................................................................................................579
Assigning IPv6 Addresses on an Interface............................................................................................................... 579
Assigning Area ID on an Interface............................................................................................................................. 579
Assigning OSPFv3 Process ID and Router ID Globally........................................................................................... 580
Assigning OSPFv3 Process ID and Router ID to a VRF......................................................................................... 580
Configuring Stub Areas.............................................................................................................................................. 580
Configuring Passive-Interface....................................................................................................................................581
Redistributing Routes.................................................................................................................................................. 581
Configuring a Default Route....................................................................................................................................... 581
Applying cost for OSPFv3..........................................................................................................................................582
Enabling OSPFv3 Graceful Restart...........................................................................................................................582
OSPFv3 Authentication Using IPsec........................................................................................................................ 584
Troubleshooting OSPFv3...........................................................................................................................................589
MIB Support for OSPFv3.................................................................................................................................................590
Viewing the OSPFv3 MIB........................................................................................................................................... 591
18
35 Policy-based Routing (PBR).................................................................................................... 592
Contents
Overview............................................................................................................................................................................ 592
Implementing PBR............................................................................................................................................................ 593
Configuration Task List for Policy-based Routing........................................................................................................ 593
Create a Redirect List.................................................................................................................................................594
Create a Rule for a Redirect-list................................................................................................................................594
Apply a Redirect-list to an Interface using a Redirect-group................................................................................ 595
Sample Configuration....................................................................................................................................................... 597
36 PIM Sparse-Mode (PIM-SM)................................................................................................... 602
Implementation Information.............................................................................................................................................602
Protocol Overview............................................................................................................................................................ 602
Requesting Multicast Traffic..................................................................................................................................... 602
Refuse Multicast Traffic.............................................................................................................................................602
Send Multicast Traffic................................................................................................................................................ 603
Configuring PIM-SM.........................................................................................................................................................603
Related Configuration Tasks......................................................................................................................................603
Enable PIM-SM................................................................................................................................................................. 603
Configuring S,G Expiry Timers........................................................................................................................................ 604
Configuring a Static Rendezvous Point......................................................................................................................... 605
Overriding Bootstrap Router Updates..................................................................................................................... 605
Configuring a Designated Router....................................................................................................................................605
Creating Multicast Boundaries and Domains.................................................................................................................606
Electing an RP using the BSR Mechanism.................................................................................................................... 606
37 PIM Source-Specific Mode (PIM-SSM).................................................................................... 608
Implementation Information.............................................................................................................................................608
Configure PIM-SSM......................................................................................................................................................... 608
Enabling PIM-SSM............................................................................................................................................................609
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................... 609
Electing an RP using the BSR Mechanism..................................................................................................................... 610
Enabling RP to Server Specific Multicast Groups.................................................................................................... 611
38 Port Monitoring...................................................................................................................... 613
Important Points to Remember....................................................................................................................................... 613
Port Monitoring..................................................................................................................................................................613
Configuring Port Monitoring.............................................................................................................................................615
Configuring Monitor Multicast Queue.............................................................................................................................616
Flow-Based Monitoring..................................................................................................................................................... 617
Enabling Flow-Based Monitoring............................................................................................................................... 618
Remote Port Mirroring..................................................................................................................................................... 620
Remote Port Mirroring Example................................................................................................................................620
Configuring Remote Port Mirroring...........................................................................................................................621
Displaying Remote-Port Mirroring Configurations..................................................................................................622
Configuration procedure for Remote Port Mirroring..............................................................................................622
Encapsulated Remote Port Monitoring..........................................................................................................................626
ERPM Behavior on a typical Dell EMC Networking OS ..............................................................................................628
Port Monitoring on VLT................................................................................................................................................... 629
39 Private VLANs (PVLAN).......................................................................................................... 632
Contents
19
Private VLAN Concepts................................................................................................................................................... 632
Using the Private VLAN Commands...............................................................................................................................633
Configuration Task List.....................................................................................................................................................634
Creating PVLAN ports................................................................................................................................................634
Creating a Primary VLAN........................................................................................................................................... 634
Creating a Community VLAN.................................................................................................................................... 635
Creating an Isolated VLAN.........................................................................................................................................636
Private VLAN Configuration Example.............................................................................................................................637
Inspecting the Private VLAN Configuration.................................................................................................................. 638
40 Per-VLAN Spanning Tree Plus (PVST+)....................................................................................640
Protocol Overview............................................................................................................................................................ 640
Implementation Information..............................................................................................................................................641
Configure Per-VLAN Spanning Tree Plus.......................................................................................................................641
Enabling PVST+................................................................................................................................................................. 641
Disabling PVST+.................................................................................................................................................................641
Influencing PVST+ Root Selection..................................................................................................................................642
Modifying Global PVST+ Parameters.............................................................................................................................643
Modifying Interface PVST+ Parameters........................................................................................................................644
Configuring an EdgePort..................................................................................................................................................644
PVST+ in Multi-Vendor Networks..................................................................................................................................645
Enabling PVST+ Extend System ID................................................................................................................................ 645
PVST+ Sample Configurations........................................................................................................................................646
41 Quality of Service (QoS).......................................................................................................... 648
Implementation Information.............................................................................................................................................650
Port-Based QoS Configurations..................................................................................................................................... 650
Setting dot1p Priorities for Incoming Traffic............................................................................................................650
Honoring dot1p Priorities on Ingress Traffic............................................................................................................. 651
Configuring Port-Based Rate Policing.......................................................................................................................651
Configuring Port-Based Rate Shaping......................................................................................................................651
Policy-Based QoS Configurations...................................................................................................................................652
Classify Traffic.............................................................................................................................................................652
Dot1p to Queue Mapping Requirement....................................................................................................................655
Create a QoS Policy....................................................................................................................................................656
DSCP Color Maps....................................................................................................................................................... 658
Create Policy Maps.....................................................................................................................................................659
Enabling QoS Rate Adjustment....................................................................................................................................... 662
Enabling Strict-Priority Queueing....................................................................................................................................662
Queue Classification Requirements for PFC Functionality.......................................................................................... 663
Support for marking dot1p value in L3 Input Qos Policy.............................................................................................. 663
Weighted Random Early Detection.................................................................................................................................664
Enabling and Disabling WRED Globally..................................................................................................................... 664
Creating WRED Profiles............................................................................................................................................. 665
Applying a WRED Profile to Traffic...........................................................................................................................665
Displaying Default and Configured WRED Profiles................................................................................................. 665
Displaying WRED Drop Statistics..............................................................................................................................665
Displaying egress–queue Statistics...........................................................................................................................666
Pre-Calculating Available QoS CAM Space...................................................................................................................666
20
Contents
Specifying Policy-Based Rate Shaping in Packets Per Second.................................................................................. 667
Configuring Policy-Based Rate Shaping.........................................................................................................................667
Configuring Weights and ECN for WRED .....................................................................................................................668
Configuring WRED and ECN Attributes.........................................................................................................................669
Guidelines for Configuring ECN for Classifying and Color-Marking Packets............................................................ 670
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class.................................... 670
Classifying Incoming Packets Using ECN and Color-Marking................................................................................671
Sample configuration to mark non-ecn packets as “yellow” with single traffic class.........................................672
Applying Layer 2 Match Criteria on a Layer 3 Interface...............................................................................................673
Managing Hardware Buffer Statistics...................................................................................................................... 673
Enabling Buffer Statistics Tracking ................................................................................................................................674
42 Routing Information Protocol (RIP)..........................................................................................676
Protocol Overview............................................................................................................................................................ 676
RIPv1............................................................................................................................................................................. 676
RIPv2.............................................................................................................................................................................676
Implementation Information............................................................................................................................................. 676
Configuration Information.................................................................................................................................................677
Configuration Task List............................................................................................................................................... 677
RIP Configuration Example........................................................................................................................................ 682
43 Remote Monitoring (RMON)....................................................................................................687
Implementation Information............................................................................................................................................. 687
Fault Recovery...................................................................................................................................................................687
Setting the RMON Alarm........................................................................................................................................... 687
Configuring an RMON Event.....................................................................................................................................688
Configuring RMON Collection Statistics..................................................................................................................689
Configuring the RMON Collection History...............................................................................................................689
44 Rapid Spanning Tree Protocol (RSTP)......................................................................................690
Protocol Overview............................................................................................................................................................ 690
Configuring Rapid Spanning Tree................................................................................................................................... 690
Important Points to Remember.......................................................................................................................................690
RSTP and VLT..............................................................................................................................................................691
Configuring Interfaces for Layer 2 Mode....................................................................................................................... 691
Enabling Rapid Spanning Tree Protocol Globally........................................................................................................... 691
Adding and Removing Interfaces.................................................................................................................................... 693
Modifying Global Parameters.......................................................................................................................................... 693
Enabling SNMP Traps for Root Elections and Topology Changes....................................................................... 695
Modifying Interface Parameters..................................................................................................................................... 695
Enabling SNMP Traps for Root Elections and Topology Changes.............................................................................695
Influencing RSTP Root Selection....................................................................................................................................695
Configuring an EdgePort..................................................................................................................................................696
Configuring Fast Hellos for Link State Detection......................................................................................................... 696
45 Software-Defined Networking (SDN)....................................................................................... 698
46 Security.................................................................................................................................699
AAA Accounting................................................................................................................................................................ 699
Contents
21
Configuration Task List for AAA Accounting...........................................................................................................699
RADIUS Accounting.....................................................................................................................................................701
AAA Authentication...........................................................................................................................................................706
Configuration Task List for AAA Authentication..................................................................................................... 706
Obscuring Passwords and Keys...................................................................................................................................... 708
AAA Authorization.............................................................................................................................................................709
Privilege Levels Overview.......................................................................................................................................... 709
Configuration Task List for Privilege Levels.............................................................................................................709
RADIUS................................................................................................................................................................................712
RADIUS Authentication............................................................................................................................................... 713
Configuration Task List for RADIUS.......................................................................................................................... 714
TACACS+............................................................................................................................................................................716
Configuration Task List for TACACS+.......................................................................................................................716
TACACS+ Remote Authentication.............................................................................................................................718
Command Authorization..............................................................................................................................................719
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................................................719
Enabling SCP and SSH......................................................................................................................................................719
Using SCP with SSH to Copy a Software Image.................................................................................................... 720
Removing the RSA Host Keys and Zeroizing Storage ............................................................................................721
Configuring When to Re-generate an SSH Key ......................................................................................................721
Configuring the SSH Server Key Exchange Algorithm............................................................................................721
Configuring the HMAC Algorithm for the SSH Server...........................................................................................722
Configuring the HMAC Algorithm for the SSH Client............................................................................................ 722
Configuring the SSH Server Cipher List...................................................................................................................723
Configuring the SSH Client Cipher List.................................................................................................................... 723
Secure Shell Authentication....................................................................................................................................... 723
Troubleshooting SSH.................................................................................................................................................. 725
Telnet.................................................................................................................................................................................. 726
VTY Line and Access-Class Configuration.....................................................................................................................726
VTY Line Local Authentication and Authorization...................................................................................................726
VTY Line Remote Authentication and Authorization...............................................................................................727
VTY MAC-SA Filter Support...................................................................................................................................... 727
Role-Based Access Control..............................................................................................................................................728
Overview of RBAC...................................................................................................................................................... 728
User Roles.................................................................................................................................................................... 730
AAA Authentication and Authorization for Roles.....................................................................................................733
Role Accounting...........................................................................................................................................................735
Display Information About User Roles.......................................................................................................................736
Two Factor Authentication (2FA)................................................................................................................................... 737
Handling Access-Challenge Message....................................................................................................................... 737
Configuring Challenge Response Authentication for SSHv2................................................................................. 737
SMS-OTP Mechanism................................................................................................................................................738
Configuring the System to Drop Certain ICMP Reply Messages............................................................................... 738
SSH Lockout Settings...................................................................................................................................................... 740
22
47 Service Provider Bridging.........................................................................................................741
VLAN Stacking................................................................................................................................................................... 741
Configure VLAN Stacking...........................................................................................................................................742
Creating Access and Trunk Ports..............................................................................................................................743
Enable VLAN-Stacking for a VLAN...........................................................................................................................743
Contents
Configuring the Protocol Type Value for the Outer VLAN Tag.............................................................................744
Configuring Dell EMC Networking OS Options for Trunk Ports........................................................................... 744
Debugging VLAN Stacking.........................................................................................................................................745
VLAN Stacking in Multi-Vendor Networks.............................................................................................................. 745
VLAN Stacking Packet Drop Precedence......................................................................................................................748
Enabling Drop Eligibility............................................................................................................................................... 748
Honoring the Incoming DEI Value..............................................................................................................................749
Marking Egress Packets with a DEI Value................................................................................................................749
Dynamic Mode CoS for VLAN Stacking.........................................................................................................................750
Mapping C-Tag to S-Tag dot1p Values.....................................................................................................................751
Layer 2 Protocol Tunneling............................................................................................................................................... 751
Enabling Layer 2 Protocol Tunneling.........................................................................................................................753
Specifying a Destination MAC Address for BPDUs................................................................................................ 754
Setting Rate-Limit BPDUs..........................................................................................................................................754
Debugging Layer 2 Protocol Tunneling.....................................................................................................................754
Provider Backbone Bridging.............................................................................................................................................754
48 sFlow.....................................................................................................................................756
Overview............................................................................................................................................................................ 756
Implementation Information.............................................................................................................................................756
Enabling Extended sFlow..................................................................................................................................................757
Important Points to Remember.................................................................................................................................758
Enabling and Disabling sFlow on an Interface................................................................................................................758
Enabling sFlow Max-Header Size Extended..................................................................................................................759
sFlow Show Commands...................................................................................................................................................759
Displaying Show sFlow Global....................................................................................................................................760
Displaying Show sFlow on an Interface.................................................................................................................... 760
Displaying Show sFlow on a .......................................................................................................................................761
Configuring Specify Collectors.........................................................................................................................................761
Changing the Polling Intervals.......................................................................................................................................... 761
Back-Off Mechanism.........................................................................................................................................................761
sFlow on LAG ports...........................................................................................................................................................762
49 Simple Network Management Protocol (SNMP)........................................................................ 763
Protocol Overview............................................................................................................................................................ 764
Implementation Information............................................................................................................................................. 764
SNMPv3 Compliance With FIPS..................................................................................................................................... 764
Configuration Task List for SNMP..................................................................................................................................765
Important Points to Remember.......................................................................................................................................765
Set up SNMP.....................................................................................................................................................................765
Creating a Community................................................................................................................................................ 766
Setting Up User-Based Security (SNMPv3)........................................................................................................... 766
Enable SNMPv3 traps.................................................................................................................................................767
Reading Managed Object Values.....................................................................................................................................767
Writing Managed Object Values......................................................................................................................................768
Configuring Contact and Location Information using SNMP...................................................................................... 768
Subscribing to Managed Object Value Updates using SNMP.....................................................................................769
Enabling a Subset of SNMP Traps..................................................................................................................................769
Enabling an SNMP Agent to Notify Syslog Server Failure...........................................................................................770
Contents
23
Copy Configuration Files Using SNMP............................................................................................................................771
Copying a Configuration File...................................................................................................................................... 772
Copying Configuration Files via SNMP..................................................................................................................... 773
Copying the Startup-Config Files to the Running-Config......................................................................................773
Copying the Startup-Config Files to the Server via FTP........................................................................................773
Copying the Startup-Config Files to the Server via TFTP..................................................................................... 774
Copy a Binary File to the Startup-Configuration..................................................................................................... 774
Additional MIB Objects to View Copy Statistics......................................................................................................774
Obtaining a Value for MIB Objects............................................................................................................................775
MIB Support for Power Monitoring................................................................................................................................ 775
MIB Support for 25G, 40G, 50G, 100G Optical Transceiver or DAC cable IDPROM user info.............................. 776
MIB Support to Display the Available Memory Size on Flash...................................................................................... 777
Viewing the Available Flash Memory Size.................................................................................................................777
MIB Support to Display the Software Core Files Generated by the System.............................................................778
Viewing the Software Core Files Generated by the System................................................................................. 778
MIB Support for PFC Storm Control.............................................................................................................................. 779
MIB Support for PFC no-drop-priority L2Dlf Drop....................................................................................................... 780
MIB Support for Monitoring the overall buffer usage for lossy and lossless traffic per XPE.................................. 781
SNMP Support for WRED Green/Yellow/Red Drop Counters...................................................................................782
MIB Support to Display the Available Partitions on Flash............................................................................................ 783
Viewing the Available Partitions on Flash................................................................................................................. 783
MIB Support to Display the ECN Marked Packets ...................................................................................................... 784
MIB Support to Display Egress Queue Statistics.......................................................................................................... 784
MIB Support to ECMP Group Count..............................................................................................................................784
Viewing the ECMP Group Count Information......................................................................................................... 785
............................................................................................................................................................................................. 787
Viewing the FEC BER Details.....................................................................................................................................788
MIB Support for entAliasMappingTable ........................................................................................................................ 790
Viewing the entAliasMappingTable MIB...................................................................................................................790
MIB Support for LAG.........................................................................................................................................................791
Viewing the LAG MIB..................................................................................................................................................792
MIB Support for CAM.......................................................................................................................................................792
Viewing the CAM MIB................................................................................................................................................ 793
MIB support for MAC notification traps.........................................................................................................................793
MIB support for Port Security......................................................................................................................................... 794
Global MIB objects for port security......................................................................................................................... 794
MIB support for interface level port security...........................................................................................................794
MIB objects for configuring MAC addresses...........................................................................................................795
MIB objects for configuring MAC addresses...........................................................................................................796
Configuring SNMP traps for new MAC learning or station–move.............................................................................796
Manage VLANs using SNMP........................................................................................................................................... 797
Creating a VLAN.......................................................................................................................................................... 797
Assigning a VLAN Alias................................................................................................................................................797
Displaying the Ports in a VLAN.................................................................................................................................. 797
Add Tagged and Untagged Ports to a VLAN...........................................................................................................797
Managing Overload on Startup....................................................................................................................................... 798
Enabling and Disabling a Port using SNMP....................................................................................................................799
Fetch Dynamic MAC Entries using SNMP.....................................................................................................................799
Example of Deriving the Interface Index Number.........................................................................................................800
MIB Objects for Viewing the System Image on Flash Partitions.......................................................................... 800
24
Contents
Monitor Port-Channels..................................................................................................................................................... 801
Troubleshooting SNMP Operation..................................................................................................................................802
Transceiver Monitoring.................................................................................................................................................... 802
Configuring SNMP context name...................................................................................................................................803
50 Storm Control........................................................................................................................ 804
Configure Storm Control..................................................................................................................................................804
Configuring Storm Control from INTERFACE Mode..............................................................................................804
Configuring Storm Control from CONFIGURATION Mode...................................................................................805
PFC Storm......................................................................................................................................................................... 805
Detect PFC Storm...................................................................................................................................................... 805
Restore Queue Drop State........................................................................................................................................ 806
View Details of Storm Control PFC.......................................................................................................................... 806
51 Spanning Tree Protocol (STP)................................................................................................. 808
Protocol Overview............................................................................................................................................................ 808
Configure Spanning Tree................................................................................................................................................. 808
Important Points to Remember.......................................................................................................................................809
Configuring Interfaces for Layer 2 Mode.......................................................................................................................809
Enabling Spanning Tree Protocol Globally...................................................................................................................... 810
Adding an Interface to the Spanning Tree Group..........................................................................................................812
Modifying Global Parameters........................................................................................................................................... 812
Modifying Interface STP Parameters..............................................................................................................................813
Enabling PortFast...............................................................................................................................................................813
Prevent Network Disruptions with BPDU Guard.....................................................................................................814
Selecting STP Root........................................................................................................................................................... 816
STP Root Guard.................................................................................................................................................................816
Root Guard Scenario................................................................................................................................................... 816
Configuring Root Guard...............................................................................................................................................817
Enabling SNMP Traps for Root Elections and Topology Changes..............................................................................818
Configuring Spanning Trees as Hitless............................................................................................................................818
STP Loop Guard.................................................................................................................................................................818
Configuring Loop Guard.............................................................................................................................................. 819
Displaying STP Guard Configuration.............................................................................................................................. 820
52 SupportAssist......................................................................................................................... 821
Configuring SupportAssist Using a Configuration Wizard............................................................................................ 821
Configuring SupportAssist Manually...............................................................................................................................822
Configuring SupportAssist Activity.................................................................................................................................823
Configuring SupportAssist Company..............................................................................................................................825
Configuring SupportAssist Person..................................................................................................................................825
Configuring SupportAssist Server...................................................................................................................................826
Viewing SupportAssist Configuration............................................................................................................................. 827
53 System Time and Date............................................................................................................ 829
Network Time Protocol.................................................................................................................................................... 829
Protocol Overview...................................................................................................................................................... 830
Configure the Network Time Protocol..................................................................................................................... 830
Enabling NTP............................................................................................................................................................... 830
Contents
25
Configuring NTP Broadcasts......................................................................................................................................831
Disabling NTP on an Interface....................................................................................................................................831
Configuring a Source IP Address for NTP Packets................................................................................................. 831
Configuring NTP Authentication............................................................................................................................... 832
Configuring NTP control key password....................................................................................................................834
Configuring the NTP Step-Threshold.......................................................................................................................834
Configuring a Custom-defined Period for NTP time Synchronization................................................................. 834
Dell EMC Networking OS Time and Date...................................................................................................................... 835
Configuration Task List ..............................................................................................................................................835
Setting the Time and Date for the Switch Software Clock...................................................................................835
Setting the Timezone................................................................................................................................................. 835
Set Daylight Saving Time........................................................................................................................................... 836
Setting Daylight Saving Time Once.......................................................................................................................... 836
Setting Recurring Daylight Saving Time...................................................................................................................836
54 Tunneling...............................................................................................................................838
Configuring a Tunnel.........................................................................................................................................................838
Configuring Tunnel Keepalive Settings...........................................................................................................................839
Configuring a Tunnel Interface........................................................................................................................................839
Configuring Tunnel Allow-Remote Decapsulation.........................................................................................................840
Configuring Tunnel source anylocal Decapsulation.......................................................................................................840
Guidelines for Configuring Multipoint Receive-Only Tunnels.......................................................................................841
Multipoint Receive-Only Tunnels..................................................................................................................................... 841
55 Uplink Failure Detection (UFD)................................................................................................ 842
Feature Description...........................................................................................................................................................842
How Uplink Failure Detection Works.............................................................................................................................. 843
UFD and NIC Teaming......................................................................................................................................................844
Important Points to Remember.......................................................................................................................................844
Configuring Uplink Failure Detection.............................................................................................................................. 845
Clearing a UFD-Disabled Interface..................................................................................................................................846
Displaying Uplink Failure Detection................................................................................................................................. 847
Sample Configuration: Uplink Failure Detection............................................................................................................848
56 Upgrade Procedures............................................................................................................... 850
57 Virtual LANs (VLANs).............................................................................................................. 851
Default VLAN......................................................................................................................................................................851
Port-Based VLANs............................................................................................................................................................852
VLANs and Port Tagging................................................................................................................................................. 852
Configuration Task List.....................................................................................................................................................853
Creating a Port-Based VLAN.....................................................................................................................................853
Assigning Interfaces to a VLAN.................................................................................................................................853
Moving Untagged Interfaces..................................................................................................................................... 854
Assigning an IP Address to a VLAN.......................................................................................................................... 855
Configuring Native VLANs...............................................................................................................................................856
Enabling Null VLAN as the Default VLAN...................................................................................................................... 856
26
58 Virtual Link Trunking (VLT)..................................................................................................... 857
Contents
Overview............................................................................................................................................................................ 857
VLT Terminology......................................................................................................................................................... 859
Layer-2 Traffic in VLT Domains.................................................................................................................................859
Interspersed VLANs....................................................................................................................................................860
VLT on Core Switches.................................................................................................................................................861
Enhanced VLT.............................................................................................................................................................. 861
Configure Virtual Link Trunking....................................................................................................................................... 862
Important Points to Remember.................................................................................................................................862
Configuration Notes....................................................................................................................................................863
Primary and Secondary VLT Peers........................................................................................................................... 866
RSTP and VLT............................................................................................................................................................. 866
VLT Bandwidth Monitoring........................................................................................................................................ 867
VLT and Stacking........................................................................................................................................................ 867
VLT and IGMP Snooping............................................................................................................................................ 867
VLT IPv6.......................................................................................................................................................................867
VLT Port Delayed Restoration................................................................................................................................... 867
PIM-Sparse Mode Support on VLT.......................................................................................................................... 868
VLT Routing ................................................................................................................................................................869
Non-VLT ARP Sync.....................................................................................................................................................872
RSTP Configuration.......................................................................................................................................................... 872
Preventing Forwarding Loops in a VLT Domain...................................................................................................... 872
Sample RSTP configuration....................................................................................................................................... 873
Configuring VLT...........................................................................................................................................................873
PVST+ Configuration........................................................................................................................................................ 881
Peer Routing Configuration Example..............................................................................................................................882
Dell-1 Switch Configuration........................................................................................................................................883
Dell-2 Switch Configuration....................................................................................................................................... 887
R1 Configuration.......................................................................................................................................................... 890
Access Switch A1 Configurations and Verification.................................................................................................. 891
eVLT Configuration Example............................................................................................................................................891
PIM-Sparse Mode Configuration Example.................................................................................................................... 894
Verifying a VLT Configuration......................................................................................................................................... 894
Additional VLT Sample Configurations........................................................................................................................... 897
Troubleshooting VLT........................................................................................................................................................ 899
Reconfiguring Stacked Switches as VLT.......................................................................................................................900
Specifying VLT Nodes in a PVLAN.................................................................................................................................900
Configuring a VLT VLAN or LAG in a PVLAN............................................................................................................... 903
Creating a VLT LAG or a VLT VLAN.........................................................................................................................903
Associating the VLT LAG or VLT VLAN in a PVLAN..............................................................................................904
Proxy ARP Capability on VLT Peer Nodes.................................................................................................................... 905
VLT Nodes as Rendezvous Points for Multicast Resiliency........................................................................................906
Configuring VLAN-Stack over VLT................................................................................................................................ 906
IPv6 Peer Routing in VLT Domains Overview...............................................................................................................909
Configure BFD in VLT Domain......................................................................................................................................... 913
Sample BFD configuration in VLT domain................................................................................................................ 913
59 VLT Proxy Gateway................................................................................................................. 918
Proxy Gateway in VLT Domains.......................................................................................................................................918
LLDP VLT Proxy Gateway in a Square VLT Topology............................................................................................ 921
Configuring a Static VLT Proxy Gateway...................................................................................................................... 922
Contents
27
Configuring an LLDP VLT Proxy Gateway.....................................................................................................................922
VLT Proxy Gateway Sample Topology...........................................................................................................................922
VLT Domain Configuration.........................................................................................................................................923
Dell-1 VLT Configuration.............................................................................................................................................923
Dell-2 VLT Configuration............................................................................................................................................924
Dell-3 VLT Configuration............................................................................................................................................925
Dell-4 VLT Configuration............................................................................................................................................926
60 Virtual Extensible LAN (VXLAN)...............................................................................................927
Components of VXLAN network.................................................................................................................................... 928
Functional Overview of VXLAN Gateway......................................................................................................................928
VXLAN Frame Format......................................................................................................................................................929
Configuring and Controlling VXLAN from the NSX Controller GUI............................................................................930
Configuring VxLAN Gateway...........................................................................................................................................934
Connecting to an NVP Controller............................................................................................................................. 934
Advertising VXLAN Access Ports to Controller...................................................................................................... 935
Displaying VXLAN Configurations...................................................................................................................................935
Static Virtual Extensible LAN (VXLAN)......................................................................................................................... 936
Configuring Static VXLAN......................................................................................................................................... 936
Limitations on VXLAN ................................................................................................................................................937
Displaying Static VXLAN Configurations..................................................................................................................937
Disabling MAC Address Learning on Static VXLAN Tunnels.................................................................................938
Preserving 802.1 p value across VXLAN tunnels.......................................................................................................... 939
RIOT....................................................................................................................................................................................939
61 Virtual Routing and Forwarding (VRF)...................................................................................... 940
VRF Overview................................................................................................................................................................... 940
VRF Configuration Notes..................................................................................................................................................941
DHCP............................................................................................................................................................................ 942
VRF Configuration.............................................................................................................................................................942
Loading VRF CAM.......................................................................................................................................................942
Creating a Non-Default VRF Instance......................................................................................................................942
Assigning an Interface to a VRF................................................................................................................................ 943
Assigning a Front-end Port to a Management VRF............................................................................................... 943
View VRF Instance Information.................................................................................................................................943
Assigning an OSPF Process to a VRF Instance.......................................................................................................943
Configuring VRRP on a VRF Instance...................................................................................................................... 944
Configuring Management VRF..................................................................................................................................944
Configuring a Static Route.........................................................................................................................................945
Sample VRF Configuration...............................................................................................................................................945
Route Leaking VRFs......................................................................................................................................................... 950
Dynamic Route Leaking....................................................................................................................................................950
Configuring Route Leaking without Filtering Criteria.............................................................................................. 951
Configuring Route Leaking with Filtering................................................................................................................. 953
62 Virtual Router Redundancy Protocol (VRRP)............................................................................ 956
VRRP Overview................................................................................................................................................................ 956
VRRP Benefits...................................................................................................................................................................957
VRRP Implementation...................................................................................................................................................... 957
28
Contents
VRRP Configuration......................................................................................................................................................... 958
Configuration Task List...............................................................................................................................................958
Setting VRRP Initialization Delay...............................................................................................................................965
Sample Configurations..................................................................................................................................................... 966
VRRP in a VRF Configuration.................................................................................................................................... 970
VRRP for IPv6 Configuration.....................................................................................................................................975
63 Debugging and Diagnostics......................................................................................................979
Offline Diagnostics............................................................................................................................................................ 979
Important Points to Remember.................................................................................................................................979
Running Offline Diagnostics....................................................................................................................................... 979
Trace Logs......................................................................................................................................................................... 980
Auto Save on Crash or Rollover...................................................................................................................................... 980
Hardware Watchdog Timer............................................................................................................................................. 980
Enabling Environmental Monitoring................................................................................................................................980
Recognize an Overtemperature Condition.............................................................................................................. 982
Troubleshoot an Over-temperature Condition........................................................................................................982
Recognize an Under-Voltage Condition................................................................................................................... 982
Troubleshoot an Under-Voltage Condition.............................................................................................................. 983
Buffer Tuning.....................................................................................................................................................................983
Troubleshooting Packet Loss.......................................................................................................................................... 984
Displaying Drop Counters...........................................................................................................................................984
Dataplane Statistics.................................................................................................................................................... 985
Display Stack Member Counters...............................................................................................................................986
Enabling Application Core Dumps................................................................................................................................... 988
Mini Core Dumps...............................................................................................................................................................988
Enabling TCP Dumps........................................................................................................................................................989
64 Standards Compliance.............................................................................................................991
IEEE Compliance................................................................................................................................................................ 991
RFC and I-D Compliance..................................................................................................................................................992
General Internet Protocols.........................................................................................................................................992
General IPv4 Protocols...............................................................................................................................................993
General IPv6 Protocols...............................................................................................................................................994
Border Gateway Protocol (BGP)..............................................................................................................................995
Open Shortest Path First (OSPF)............................................................................................................................ 996
Intermediate System to Intermediate System (IS-IS)............................................................................................996
Routing Information Protocol (RIP).......................................................................................................................... 997
Multicast.......................................................................................................................................................................997
Network Management................................................................................................................................................998
MIB Location.................................................................................................................................................................... 1002
65 X.509v3................................................................................................................................1004
Introduction to X.509v3 certificates.............................................................................................................................1004
X.509v3 support in .........................................................................................................................................................1005
Information about installing CA certificates................................................................................................................. 1006
Installing CA certificate............................................................................................................................................. 1007
Information about Creating Certificate Signing Requests (CSR)............................................................................. 1007
Creating Certificate Signing Requests (CSR)........................................................................................................1007
Contents
29
Information about installing trusted certificates..........................................................................................................1008
Installing trusted certificates....................................................................................................................................1008
Transport layer security (TLS).......................................................................................................................................1008
Syslog over TLS.........................................................................................................................................................1009
Online Certificate Status Protocol (OSCP)................................................................................................................. 1009
Configuring OCSP setting on CA............................................................................................................................ 1009
Configuring OCSP behavior..................................................................................................................................... 1009
Configuring Revocation Behavior.............................................................................................................................1010
Configuring OSCP responder preference............................................................................................................... 1010
Verifying certificates........................................................................................................................................................1010
Verifying Server certificates......................................................................................................................................1010
Verifying Client Certificates...................................................................................................................................... 1010
Event logging.................................................................................................................................................................... 1010
30 Contents
Loading...
+ 981 hidden pages