Dell Con€guration Guide for the S6010–ON System
9.14.0.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.
2018 - 07
Rev. A00
Contents
1 About this Guide........................................................................................................................................... |
36 |
Audience........................................................................................................................................................................... |
36 |
Conventions...................................................................................................................................................................... |
36 |
Related Documents......................................................................................................................................................... |
36 |
2 Con€guration Fundamentals........................................................................................................................ |
37 |
Accessing the Command Line........................................................................................................................................ |
37 |
CLI Modes......................................................................................................................................................................... |
37 |
Navigating CLI Modes............................................................................................................................................... |
39 |
The do Command............................................................................................................................................................ |
42 |
Undoing Commands........................................................................................................................................................ |
42 |
Obtaining Help.................................................................................................................................................................. |
43 |
Entering and Editing Commands.................................................................................................................................... |
43 |
Command History............................................................................................................................................................ |
44 |
Filtering show Command Outputs................................................................................................................................. |
44 |
Example of the grep Keyword.................................................................................................................................. |
44 |
Multiple Users in Configuration Mode........................................................................................................................... |
45 |
3 Getting Started............................................................................................................................................ |
46 |
Console Access................................................................................................................................................................ |
47 |
Serial Console............................................................................................................................................................. |
47 |
Default Configuration...................................................................................................................................................... |
48 |
Configuring a Host Name............................................................................................................................................... |
48 |
Accessing the System Remotely.................................................................................................................................... |
48 |
Accessing the System Remotely.............................................................................................................................. |
49 |
Configure the Management Port IP Address......................................................................................................... |
49 |
Configure a Management Route.............................................................................................................................. |
49 |
Configuring a Username and Password.................................................................................................................. |
49 |
Configuring the Enable Password.................................................................................................................................. |
50 |
Configuration File Management...................................................................................................................................... |
51 |
Copy Files to and from the System.......................................................................................................................... |
51 |
Mounting an NFS File System.................................................................................................................................. |
52 |
Save the Running-Configuration.............................................................................................................................. |
53 |
Configure the Overload Bit for a Startup Scenario............................................................................................... |
54 |
Viewing Files............................................................................................................................................................... |
54 |
Managing the File System.............................................................................................................................................. |
55 |
View Command History.................................................................................................................................................. |
55 |
Upgrading Dell EMC Networking OS............................................................................................................................ |
56 |
Using HTTP for File Transfers........................................................................................................................................ |
56 |
Verify Software Images Before Installation................................................................................................................... |
57 |
4 Management............................................................................................................................................... |
58 |
Contents 3
Configuring Privilege Levels........................................................................................................................................... |
58 |
Creating a Custom Privilege Level........................................................................................................................... |
59 |
Removing a Command from EXEC Mode.............................................................................................................. |
59 |
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................ |
59 |
Allowing Access to CONFIGURATION Mode Commands.................................................................................... |
59 |
Allowing Access to Different Modes........................................................................................................................ |
59 |
Applying a Privilege Level to a Username................................................................................................................ |
61 |
Applying a Privilege Level to a Terminal Line........................................................................................................... |
61 |
Configuring Logging......................................................................................................................................................... |
61 |
Audit and Security Logs............................................................................................................................................ |
62 |
Configuring Logging Format ................................................................................................................................... |
63 |
Setting Up a Secure Connection to a Syslog Server............................................................................................. |
63 |
Log Messages in the Internal Buffer.............................................................................................................................. |
65 |
Configuration Task List for System Log Management.......................................................................................... |
65 |
Disabling System Logging............................................................................................................................................... |
65 |
Sending System Messages to a Syslog Server............................................................................................................ |
65 |
Configuring a UNIX System as a Syslog Server..................................................................................................... |
65 |
Track Login Activity......................................................................................................................................................... |
66 |
Restrictions for Tracking Login Activity.................................................................................................................. |
66 |
Configuring Login Activity Tracking......................................................................................................................... |
66 |
Display Login Statistics.............................................................................................................................................. |
67 |
Limit Concurrent Login Sessions.................................................................................................................................... |
68 |
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ |
68 |
Configuring Concurrent Session Limit..................................................................................................................... |
68 |
Enabling the System to Clear Existing Sessions.................................................................................................... |
69 |
Enabling Secured CLI Mode........................................................................................................................................... |
70 |
Changing System Logging Settings............................................................................................................................... |
70 |
Display the Logging Buffer and the Logging Configuration......................................................................................... |
71 |
Configuring a UNIX Logging Facility Level..................................................................................................................... |
71 |
Synchronizing Log Messages......................................................................................................................................... |
72 |
Enabling Timestamp on Syslog Messages.................................................................................................................... |
73 |
File Transfer Services....................................................................................................................................................... |
73 |
Configuration Task List for File Transfer Services.................................................................................................. |
74 |
Enabling the FTP Server........................................................................................................................................... |
74 |
Configuring FTP Server Parameters........................................................................................................................ |
74 |
Configuring FTP Client Parameters......................................................................................................................... |
75 |
Terminal Lines................................................................................................................................................................... |
75 |
Denying and Permitting Access to a Terminal Line................................................................................................ |
75 |
Configuring Login Authentication for Terminal Lines............................................................................................. |
76 |
Setting Timeout for EXEC Privilege Mode.................................................................................................................... |
77 |
Using Telnet to get to Another Network Device.......................................................................................................... |
78 |
Lock CONFIGURATION Mode....................................................................................................................................... |
78 |
Viewing the Configuration Lock Status................................................................................................................... |
78 |
Restoring the Factory Default Settings......................................................................................................................... |
79 |
Important Points to Remember................................................................................................................................ |
79 |
4 Contents
Restoring Factory Default Environment Variables................................................................................................. |
80 |
Viewing the Reason for Last System Reboot............................................................................................................... |
81 |
5 802.1X.......................................................................................................................................................... |
82 |
Port-Authentication Process.......................................................................................................................................... |
84 |
EAP over RADIUS...................................................................................................................................................... |
84 |
Configuring 802.1X........................................................................................................................................................... |
85 |
Related Configuration Tasks..................................................................................................................................... |
85 |
Important Points to Remember...................................................................................................................................... |
85 |
Enabling 802.1X................................................................................................................................................................ |
86 |
Configuring Request Identity Re-Transmissions........................................................................................................... |
87 |
Configuring a Quiet Period after a Failed Authentication..................................................................................... |
88 |
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... |
89 |
Re-Authenticating a Port................................................................................................................................................ |
89 |
Configuring Timeouts...................................................................................................................................................... |
90 |
Configuring Dynamic VLAN Assignment with Port Authentication........................................................................... |
91 |
Guest and Authentication-Fail VLANs.......................................................................................................................... |
92 |
Configuring a Guest VLAN....................................................................................................................................... |
93 |
Configuring an Authentication-Fail VLAN............................................................................................................... |
93 |
6 Access Control Lists (ACLs)........................................................................................................................ |
95 |
IP Access Control Lists (ACLs)...................................................................................................................................... |
96 |
CAM Usage................................................................................................................................................................. |
97 |
Implementing ACLs on Dell EMC Networking OS.................................................................................................. |
97 |
Important Points to Remember...................................................................................................................................... |
99 |
Configuration Task List for Route Maps.................................................................................................................. |
99 |
Configuring Match Routes....................................................................................................................................... |
101 |
Configuring Set Conditions..................................................................................................................................... |
103 |
Configure a Route Map for Route Redistribution................................................................................................. |
104 |
Configure a Route Map for Route Tagging........................................................................................................... |
104 |
Continue Clause....................................................................................................................................................... |
105 |
IP Fragment Handling.................................................................................................................................................... |
105 |
IP Fragments ACL Examples................................................................................................................................... |
105 |
Layer 4 ACL Rules Examples................................................................................................................................... |
106 |
Configure a Standard IP ACL........................................................................................................................................ |
106 |
Configuring a Standard IP ACL Filter..................................................................................................................... |
107 |
Configure an Extended IP ACL..................................................................................................................................... |
108 |
Configuring Filters with a Sequence Number....................................................................................................... |
108 |
Configuring Filters Without a Sequence Number................................................................................................. |
110 |
Configure Layer 2 and Layer 3 ACLs............................................................................................................................. |
111 |
Assign an IP ACL to an Interface................................................................................................................................... |
111 |
Applying an IP ACL.......................................................................................................................................................... |
111 |
Counting ACL Hits..................................................................................................................................................... |
112 |
Configure Ingress ACLs.................................................................................................................................................. |
112 |
Configure Egress ACLs................................................................................................................................................... |
113 |
Applying Egress Layer 3 ACLs (Control-Plane)..................................................................................................... |
114 |
Contents 5
IP Prefix Lists................................................................................................................................................................... |
114 |
Implementation Information..................................................................................................................................... |
115 |
Configuration Task List for Prefix Lists................................................................................................................... |
115 |
ACL Remarks................................................................................................................................................................... |
118 |
Configuring a Remark............................................................................................................................................... |
119 |
Deleting a Remark..................................................................................................................................................... |
119 |
ACL Resequencing......................................................................................................................................................... |
120 |
Resequencing an ACL or Prefix List....................................................................................................................... |
120 |
Route Maps..................................................................................................................................................................... |
122 |
Implementation Information.................................................................................................................................... |
122 |
Flow-Based Monitoring.................................................................................................................................................. |
122 |
Behavior of Flow-Based Monitoring....................................................................................................................... |
122 |
Enabling Flow-Based Monitoring............................................................................................................................ |
124 |
Configuring IP Mirror Access Group............................................................................................................................ |
125 |
Sample Configuration............................................................................................................................................... |
125 |
Example of viewing IP mirror–access–group applied to an Interface................................................................ |
126 |
7 Bidirectional Forwarding Detection (BFD)................................................................................................... |
127 |
How BFD Works.............................................................................................................................................................. |
127 |
BFD Packet Format.................................................................................................................................................. |
128 |
BFD Sessions............................................................................................................................................................ |
129 |
BFD Three-Way Handshake.................................................................................................................................... |
130 |
Session State Changes............................................................................................................................................ |
132 |
Important Points to Remember.................................................................................................................................... |
132 |
Configure BFD................................................................................................................................................................ |
132 |
Configure BFD for Physical Ports........................................................................................................................... |
133 |
Configure BFD for Static Routes............................................................................................................................ |
134 |
Configure BFD for IPv6 Static Routes................................................................................................................... |
138 |
Configure BFD for OSPF......................................................................................................................................... |
140 |
Configure BFD for OSPFv3..................................................................................................................................... |
146 |
Configure BFD for IS-IS........................................................................................................................................... |
149 |
Configure BFD for BGP............................................................................................................................................ |
151 |
Configure BFD for VRRP......................................................................................................................................... |
159 |
Configuring Protocol Liveness................................................................................................................................. |
161 |
8 Border Gateway Protocol (BGP)................................................................................................................ |
162 |
Border Gateway Protocol version 4 (BGPv4)............................................................................................................. |
162 |
Autonomous Systems (AS)........................................................................................................................................... |
162 |
AS4 Number Representation.................................................................................................................................. |
164 |
Four-Byte AS Numbers........................................................................................................................................... |
166 |
Multiprotocol BGP.......................................................................................................................................................... |
166 |
MBGP for IPv4 MulticastBGP Address Family modelIPv4 and IPv6 address family........................................ |
167 |
Sessions and Peers......................................................................................................................................................... |
167 |
Establish a Session................................................................................................................................................... |
167 |
Implementing BGP global and address family............................................................................................................. |
168 |
BGP global configuration default values................................................................................................................ |
169 |
6 Contents
BGP Attributes for selecting Best Path....................................................................................................................... |
169 |
Best Path Selection Criteria.................................................................................................................................... |
170 |
Weight......................................................................................................................................................................... |
171 |
Local Preference....................................................................................................................................................... |
172 |
Multi-Exit Discriminators (MEDs)........................................................................................................................... |
172 |
Origin.......................................................................................................................................................................... |
173 |
AS Path...................................................................................................................................................................... |
174 |
Next Hop.................................................................................................................................................................... |
174 |
Implement BGP with Dell EMC Networking OS......................................................................................................... |
175 |
Additional Path (Add-Path) Support...................................................................................................................... |
175 |
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ |
175 |
Ignore Router-ID in Best-Path Calculation............................................................................................................ |
176 |
AS Number Migration............................................................................................................................................... |
176 |
BGP4 Management Information Base (MIB)........................................................................................................ |
177 |
Important Points to Remember............................................................................................................................... |
177 |
Configuration Information.............................................................................................................................................. |
178 |
Configuring a basic BGP network................................................................................................................................ |
178 |
Enabling BGP............................................................................................................................................................ |
178 |
Configuring a BGP peer............................................................................................................................................ |
181 |
Configuring AS4 Number Representations........................................................................................................... |
182 |
Configuring a BGP VRF address family................................................................................................................. |
183 |
Route-refresh and Soft-reconfiguration................................................................................................................ |
185 |
Aggregating Routes.................................................................................................................................................. |
188 |
Filtering BGP Routes................................................................................................................................................ |
188 |
Filtering BGP Routes Using Route Maps.............................................................................................................. |
190 |
Filtering BGP Routes Using AS-PATH Information.............................................................................................. |
190 |
Configuring Peer Groups.......................................................................................................................................... |
191 |
Configuring BGP Fast Fall-Over............................................................................................................................. |
199 |
Configuring Passive Peering................................................................................................................................... |
200 |
Maintaining Existing AS Numbers During an AS Migration................................................................................. |
201 |
Allowing an AS Number to Appear in its Own AS Path...................................................................................... |
202 |
Enabling Graceful Restart....................................................................................................................................... |
203 |
Filtering on an AS-Path Attribute.......................................................................................................................... |
204 |
Regular Expressions as Filters................................................................................................................................ |
205 |
Redistributing Routes.............................................................................................................................................. |
206 |
Enabling Additional Paths........................................................................................................................................ |
207 |
Configuring IP Community Lists............................................................................................................................. |
207 |
Configuring an IP Extended Community List....................................................................................................... |
208 |
Filtering Routes with Community Lists................................................................................................................. |
209 |
Manipulating the COMMUNITY Attribute............................................................................................................. |
210 |
Changing MED Attributes........................................................................................................................................ |
211 |
Changing the LOCAL_PREFERENCE Attribute................................................................................................... |
212 |
Configuring the local System or a Different System to be the Next Hop for BGP-Learned Routes............. |
212 |
Changing the WEIGHT Attribute............................................................................................................................ |
213 |
Enabling Multipath.................................................................................................................................................... |
213 |
Contents 7
Route Reflectors....................................................................................................................................................... |
214 |
Configuring BGP Confederations........................................................................................................................... |
215 |
Enabling Route Flap Dampening............................................................................................................................. |
215 |
Changing BGP Timers.............................................................................................................................................. |
218 |
Setting the extended timer..................................................................................................................................... |
218 |
Enabling or disabling BGP neighbors..................................................................................................................... |
219 |
Route Map Continue............................................................................................................................................... |
220 |
Enabling MBGP Configurations.................................................................................................................................... |
221 |
MBGP support for IPv6................................................................................................................................................. |
221 |
Configuring IPv6 MBGP between peers..................................................................................................................... |
221 |
Example-Configuring IPv4 and IPv6 neighbors......................................................................................................... |
222 |
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor............................................... |
224 |
BGP Regular Expression Optimization........................................................................................................................ |
226 |
Debugging BGP............................................................................................................................................................. |
226 |
Storing Last and Bad PDUs.................................................................................................................................... |
227 |
Capturing PDUs....................................................................................................................................................... |
228 |
PDU Counters.......................................................................................................................................................... |
229 |
9 Content Addressable Memory (CAM)........................................................................................................ |
230 |
CAM Allocation.............................................................................................................................................................. |
230 |
Test CAM Usage............................................................................................................................................................ |
232 |
View CAM Profiles......................................................................................................................................................... |
232 |
View CAM-ACL Settings.............................................................................................................................................. |
233 |
View CAM Usage........................................................................................................................................................... |
234 |
Configuring CAM Threshold and Silence Period........................................................................................................ |
235 |
Setting CAM Threshold and Silence Period......................................................................................................... |
235 |
CAM Optimization......................................................................................................................................................... |
236 |
Troubleshoot CAM Profiling.......................................................................................................................................... |
236 |
QoS CAM Region Limitation................................................................................................................................... |
237 |
Syslog Error When the Table is Full........................................................................................................................ |
237 |
Syslog Warning Upon 90 Percent Utilization of CAM......................................................................................... |
237 |
Syslog Warning for Discrepancies Between Configured Extended Prefixes.................................................... |
237 |
Unified Forwarding Table (UFT) Modes...................................................................................................................... |
237 |
Configuring UFT Modes.......................................................................................................................................... |
238 |
10 Control Plane Policing (CoPP)................................................................................................................. |
239 |
Configure Control Plane Policing................................................................................................................................. |
240 |
Configuring CoPP for Protocols............................................................................................................................. |
241 |
Configuring CoPP for CPU Queues...................................................................................................................... |
243 |
Displaying CoPP Configuration ............................................................................................................................. |
244 |
11 Data Center Bridging (DCB)...................................................................................................................... |
246 |
Ethernet Enhancements in Data Center Bridging..................................................................................................... |
246 |
Priority-Based Flow Control.................................................................................................................................... |
247 |
Enhanced Transmission Selection.......................................................................................................................... |
248 |
Data Center Bridging Exchange Protocol (DCBx)............................................................................................... |
249 |
8 Contents
Data Center Bridging in a Traffic Flow.................................................................................................................. |
250 |
Enabling Data Center Bridging..................................................................................................................................... |
250 |
DCB Maps and its Attributes.................................................................................................................................. |
251 |
Data Center Bridging: Default Configuration.............................................................................................................. |
252 |
Configuring Priority-Based Flow Control.................................................................................................................... |
252 |
Configuring Lossless Queues................................................................................................................................. |
253 |
Configuring PFC in a DCB Map................................................................................................................................... |
254 |
PFC Configuration Notes........................................................................................................................................ |
254 |
PFC Prerequisites and Restrictions....................................................................................................................... |
255 |
Applying a DCB Map on a Port.................................................................................................................................... |
256 |
Configuring PFC without a DCB Map......................................................................................................................... |
256 |
Configuring Lossless QueuesExample:.................................................................................................................. |
257 |
Priority-Based Flow Control Using Dynamic Buffer Method.................................................................................... |
258 |
Pause and Resume of Traffic.................................................................................................................................. |
258 |
Buffer Sizes for Lossless or PFC Packets............................................................................................................ |
258 |
Behavior of Tagged Packets......................................................................................................................................... |
259 |
Configuration Example for DSCP and PFC Priorities................................................................................................ |
259 |
SNMP Support for PFC and Buffer Statistics Tracking........................................................................................... |
260 |
Performing PFC Using DSCP Bits Instead of 802.1p Bits......................................................................................... |
260 |
PFC and ETS Configuration Examples........................................................................................................................ |
261 |
Using PFC to Manage Converged Ethernet Traffic................................................................................................... |
261 |
Operations on Untagged Packets................................................................................................................................. |
261 |
Generation of PFC for a Priority for Untagged Packets........................................................................................... |
262 |
Configure Enhanced Transmission Selection.............................................................................................................. |
262 |
ETS Prerequisites and Restrictions....................................................................................................................... |
262 |
Creating an ETS Priority Group.............................................................................................................................. |
262 |
ETS Operation with DCBx...................................................................................................................................... |
264 |
Configuring Bandwidth Allocation for DCBx CIN................................................................................................. |
264 |
Configuring ETS in a DCB Map.............................................................................................................................. |
265 |
Hierarchical Scheduling in ETS Output Policies......................................................................................................... |
266 |
Using ETS to Manage Converged Ethernet Traffic................................................................................................... |
267 |
Applying DCB Policies in a Switch Stack.................................................................................................................... |
267 |
Configure a DCBx Operation........................................................................................................................................ |
267 |
DCBx Operation....................................................................................................................................................... |
267 |
DCBx Port Roles...................................................................................................................................................... |
268 |
DCB Configuration Exchange................................................................................................................................ |
269 |
Configuration Source Election............................................................................................................................... |
269 |
Propagation of DCB Information............................................................................................................................ |
270 |
Auto-Detection and Manual Configuration of the DCBx Version....................................................................... |
270 |
DCBx Example.......................................................................................................................................................... |
271 |
DCBx Prerequisites and Restrictions...................................................................................................................... |
271 |
Configuring DCBx..................................................................................................................................................... |
271 |
Verifying the DCB Configuration.................................................................................................................................. |
275 |
QoS dot1p Traffic Classification and Queue Assignment.......................................................................................... |
283 |
Configuring the Dynamic Buffer Method.................................................................................................................... |
284 |
Contents 9
Sample DCB Configuration........................................................................................................................................... |
285 |
PFC and ETS Configuration Command Examples............................................................................................... |
287 |
12 Dynamic Host Con€guration Protocol (DHCP)......................................................................................... |
288 |
DHCP Packet Format and Options............................................................................................................................. |
288 |
Assign an IP Address using DHCP............................................................................................................................... |
290 |
Implementation Information.......................................................................................................................................... |
291 |
Configure the System to be a DHCP Server.............................................................................................................. |
291 |
Configuring the Server for Automatic Address Allocation.................................................................................. |
292 |
Specifying a Default Gateway................................................................................................................................ |
293 |
Configure a Method of Hostname Resolution..................................................................................................... |
293 |
Using DNS for Address Resolution........................................................................................................................ |
293 |
Using NetBIOS WINS for Address Resolution..................................................................................................... |
294 |
Creating Manual Binding Entries............................................................................................................................ |
294 |
Debugging the DHCP Server................................................................................................................................. |
294 |
Using DHCP Clear Commands.............................................................................................................................. |
295 |
Configure the System to be a DHCP Client............................................................................................................... |
295 |
Configuring the DHCP Client System................................................................................................................... |
295 |
DHCP Client on a Management Interface............................................................................................................ |
297 |
DHCP Client Operation with Other Features....................................................................................................... |
297 |
DHCP Relay When DHCP Server and Client are in Different VRFs........................................................................ |
298 |
Configuring Route Leaking between VRFs on DHCP Relay Agent................................................................... |
298 |
Configure the System for User Port Stacking (Option 230)................................................................................... |
300 |
Configure Secure DHCP............................................................................................................................................... |
300 |
Option 82.................................................................................................................................................................. |
300 |
DHCP Snooping........................................................................................................................................................ |
301 |
Drop DHCP Packets on Snooped VLANs Only.................................................................................................... |
305 |
Dynamic ARP Inspection........................................................................................................................................ |
306 |
Configuring Dynamic ARP Inspection................................................................................................................... |
307 |
Source Address Validation............................................................................................................................................ |
308 |
Enabling IP Source Address Validation.................................................................................................................. |
308 |
DHCP MAC Source Address Validation................................................................................................................ |
309 |
Enabling IP+MAC Source Address Validation....................................................................................................... |
309 |
Viewing the Number of SAV Dropped Packets.................................................................................................... |
310 |
Clearing the Number of SAV Dropped Packets.................................................................................................... |
310 |
13 Equal Cost Multi-Path (ECMP)................................................................................................................. |
311 |
ECMP for Flow-Based Affinity....................................................................................................................................... |
311 |
Configuring the Hash Algorithm.............................................................................................................................. |
311 |
Enabling Deterministic ECMP Next Hop................................................................................................................ |
311 |
Configuring the Hash Algorithm Seed................................................................................................................... |
312 |
Link Bundle Monitoring.................................................................................................................................................. |
312 |
Managing ECMP Group Paths................................................................................................................................ |
313 |
Creating an ECMP Group Bundle........................................................................................................................... |
313 |
Modifying the ECMP Group Threshold................................................................................................................. |
313 |
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table....................................... |
314 |
10 Contents
Support for ECMP in host table............................................................................................................................. |
315 |
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ......................................................................... |
315 |
14 FIP Snooping............................................................................................................................................ |
316 |
Fibre Channel over Ethernet......................................................................................................................................... |
316 |
Ensure Robustness in a Converged Ethernet Network............................................................................................. |
316 |
FIP Snooping on Ethernet Bridges............................................................................................................................... |
318 |
FIP Snooping in a Switch Stack................................................................................................................................... |
320 |
Using FIP Snooping....................................................................................................................................................... |
320 |
FIP Snooping Prerequisites..................................................................................................................................... |
320 |
Important Points to Remember............................................................................................................................. |
320 |
Enabling the FCoE Transit Feature......................................................................................................................... |
321 |
Enable FIP Snooping on VLANs............................................................................................................................. |
322 |
Configure the FC-MAP Value................................................................................................................................ |
322 |
Configure a Port for a Bridge-to-Bridge Link....................................................................................................... |
322 |
Configure a Port for a Bridge-to-FCF Link........................................................................................................... |
322 |
Impact on Other Software Features..................................................................................................................... |
322 |
FIP Snooping Restrictions...................................................................................................................................... |
323 |
Configuring FIP Snooping....................................................................................................................................... |
323 |
Displaying FIP Snooping Information........................................................................................................................... |
324 |
FCoE Transit Configuration Example........................................................................................................................... |
329 |
15 Flex Hash and Optimized Boot-Up............................................................................................................ |
331 |
Flex Hash Capability Overview..................................................................................................................................... |
331 |
Configuring the Flex Hash Mechanism........................................................................................................................ |
331 |
Configuring Fast Boot and LACP Fast Switchover................................................................................................... |
332 |
Optimizing the Boot Time............................................................................................................................................. |
332 |
Booting Process When Optimized Boot Time Mechanism is Enabled.............................................................. |
332 |
Guidelines for Configuring Optimized Booting Mechanism................................................................................ |
333 |
Interoperation of Applications with Fast Boot and System States.......................................................................... |
334 |
LACP and IPv4 Routing.......................................................................................................................................... |
334 |
LACP and IPv6 Routing.......................................................................................................................................... |
334 |
BGP Graceful Restart............................................................................................................................................. |
335 |
Cold Boot Caused by Power Cycling the System................................................................................................ |
335 |
Unexpected Reload of the System........................................................................................................................ |
335 |
Software Upgrade................................................................................................................................................... |
335 |
LACP Fast Switchover............................................................................................................................................ |
335 |
Changes to BGP Multipath.................................................................................................................................... |
336 |
Delayed Installation of ECMP Routes Into BGP................................................................................................... |
336 |
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... |
336 |
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... |
337 |
16 Force10 Resilient Ring Protocol (FRRP)................................................................................................... |
338 |
Protocol Overview......................................................................................................................................................... |
338 |
Ring Status............................................................................................................................................................... |
339 |
Multiple FRRP Rings............................................................................................................................................... |
339 |
Contents 11
Important FRRP Points........................................................................................................................................... |
340 |
Important FRRP Concepts...................................................................................................................................... |
341 |
Implementing FRRP....................................................................................................................................................... |
342 |
FRRP Configuration....................................................................................................................................................... |
342 |
Creating the FRRP Group....................................................................................................................................... |
342 |
Configuring the Control VLAN............................................................................................................................... |
343 |
Configuring and Adding the Member VLANs....................................................................................................... |
344 |
Setting the FRRP Timers........................................................................................................................................ |
345 |
Clearing the FRRP Counters.................................................................................................................................. |
345 |
Viewing the FRRP Configuration........................................................................................................................... |
345 |
Viewing the FRRP Information.............................................................................................................................. |
345 |
Troubleshooting FRRP.................................................................................................................................................. |
346 |
Configuration Checks.............................................................................................................................................. |
346 |
Sample Configuration and Topology............................................................................................................................ |
346 |
FRRP Support on VLT................................................................................................................................................... |
347 |
Example Scenario.................................................................................................................................................... |
348 |
Important Points to Remember............................................................................................................................. |
349 |
17 GARP VLAN Registration Protocol (GVRP).............................................................................................. |
350 |
Important Points to Remember................................................................................................................................... |
350 |
Configure GVRP............................................................................................................................................................. |
351 |
Related Configuration Tasks.................................................................................................................................... |
351 |
Enabling GVRP Globally................................................................................................................................................ |
352 |
Enabling GVRP on a Layer 2 Interface........................................................................................................................ |
352 |
Configure GVRP Registration...................................................................................................................................... |
352 |
Configure a GARP Timer.............................................................................................................................................. |
353 |
18 Internet Group Management Protocol (IGMP)......................................................................................... |
354 |
IGMP Implementation Information.............................................................................................................................. |
354 |
IGMP Protocol Overview.............................................................................................................................................. |
354 |
IGMP Version 2........................................................................................................................................................ |
354 |
IGMP Version 3........................................................................................................................................................ |
356 |
Configure IGMP............................................................................................................................................................. |
359 |
Related Configuration Tasks................................................................................................................................... |
359 |
Viewing IGMP Enabled Interfaces............................................................................................................................... |
360 |
Selecting an IGMP Version........................................................................................................................................... |
360 |
Viewing IGMP Groups.................................................................................................................................................... |
361 |
Adjusting Timers............................................................................................................................................................. |
361 |
Adjusting Query and Response Timers.................................................................................................................. |
361 |
Enabling IGMP Immediate-Leave................................................................................................................................. |
362 |
IGMP Snooping.............................................................................................................................................................. |
363 |
IGMP Snooping Implementation Information....................................................................................................... |
363 |
Configuring IGMP Snooping................................................................................................................................... |
363 |
Removing a Group-Port Association..................................................................................................................... |
364 |
Disabling Multicast Flooding................................................................................................................................... |
364 |
Specifying a Port as Connected to a Multicast Router...................................................................................... |
364 |
12 Contents
Configuring the Switch as Querier........................................................................................................................ |
365 |
Fast Convergence after MSTP Topology Changes................................................................................................... |
365 |
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................ |
365 |
Protocol Separation................................................................................................................................................. |
366 |
Enabling and Disabling Management Egress Interface Selection...................................................................... |
367 |
Handling of Management Route Configuration................................................................................................... |
368 |
Handling of Switch-Initiated Traffic....................................................................................................................... |
368 |
Handling of Switch-Destined Traffic...................................................................................................................... |
369 |
Handling of Transit Traffic (Traffic Separation)..................................................................................................... |
370 |
Mapping of Management Applications and Traffic Type..................................................................................... |
370 |
Behavior of Various Applications for Switch-Initiated Traffic ............................................................................. |
371 |
Behavior of Various Applications for Switch-Destined Traffic ........................................................................... |
372 |
Interworking of EIS With Various Applications..................................................................................................... |
372 |
Designating a Multicast Router Interface................................................................................................................... |
373 |
19 Interfaces................................................................................................................................................. |
374 |
Basic Interface Configuration....................................................................................................................................... |
374 |
Advanced Interface Configuration............................................................................................................................... |
374 |
Interface Types............................................................................................................................................................... |
375 |
View Basic Interface Information................................................................................................................................. |
375 |
Resetting an Interface to its Factory Default State................................................................................................... |
377 |
Enabling a Physical Interface........................................................................................................................................ |
378 |
Physical Interfaces......................................................................................................................................................... |
378 |
Configuration Task List for Physical Interfaces.................................................................................................... |
378 |
40G to 1G Breakout Cable Adaptor....................................................................................................................... |
378 |
Overview of Layer Modes....................................................................................................................................... |
379 |
Configuring Layer 2 (Data Link) Mode.................................................................................................................. |
380 |
Configuring Layer 2 (Interface) Mode.................................................................................................................. |
380 |
Configuring Layer 3 (Network) Mode................................................................................................................... |
380 |
Configuring Layer 3 (Interface) Mode................................................................................................................... |
381 |
Automatic recovery of an Err-disabled interface....................................................................................................... |
382 |
Configuring an automatic recovery for an Err-disabled interface...................................................................... |
382 |
Egress Interface Selection (EIS).................................................................................................................................. |
383 |
Important Points to Remember............................................................................................................................. |
383 |
Configuring EIS........................................................................................................................................................ |
383 |
Management Interfaces................................................................................................................................................ |
384 |
Configuring Management Interfaces..................................................................................................................... |
384 |
Configuring a Management Interface on an Ethernet Port............................................................................... |
385 |
VLAN Interfaces............................................................................................................................................................ |
386 |
Loopback Interfaces...................................................................................................................................................... |
387 |
Null Interfaces................................................................................................................................................................. |
387 |
Port Channel Interfaces................................................................................................................................................ |
387 |
Port Channel Definition and Standards................................................................................................................. |
388 |
Port Channel Benefits............................................................................................................................................. |
388 |
Port Channel Implementation................................................................................................................................. |
388 |
Interfaces in Port Channels.................................................................................................................................... |
389 |
Contents 13
Configuration Tasks for Port Channel Interfaces................................................................................................. |
389 |
Creating a Port Channel......................................................................................................................................... |
389 |
Adding a Physical Interface to a Port Channel..................................................................................................... |
390 |
Reassigning an Interface to a New Port Channel................................................................................................. |
391 |
Configuring the Minimum Oper Up Links in a Port Channel.............................................................................. |
392 |
Adding or Removing a Port Channel from a VLAN............................................................................................. |
392 |
Assigning an IP Address to a Port Channel.......................................................................................................... |
394 |
Deleting or Disabling a Port Channel..................................................................................................................... |
394 |
Load Balancing Through Port Channels................................................................................................................ |
394 |
Changing the Hash Algorithm................................................................................................................................ |
394 |
Bulk Configuration......................................................................................................................................................... |
396 |
Interface Range....................................................................................................................................................... |
396 |
Bulk Configuration Examples.................................................................................................................................. |
396 |
Defining Interface Range Macros................................................................................................................................ |
398 |
Define the Interface Range.................................................................................................................................... |
398 |
Choosing an Interface-Range Macro.................................................................................................................... |
398 |
Monitoring and Maintaining Interfaces....................................................................................................................... |
398 |
Maintenance Using TDR......................................................................................................................................... |
399 |
Non Dell-Qualified Transceivers................................................................................................................................... |
400 |
Splitting 40G Ports without Reload............................................................................................................................ |
400 |
Splitting QSFP Ports to SFP+ Ports........................................................................................................................... |
402 |
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port.................................................................................. |
403 |
Important Points to Remember............................................................................................................................. |
403 |
Example Scenarios.................................................................................................................................................. |
404 |
Link Dampening............................................................................................................................................................. |
405 |
Important Points to Remember............................................................................................................................. |
405 |
Configuration Example of Link Dampening.......................................................................................................... |
406 |
Enabling Link Dampening........................................................................................................................................ |
408 |
Link Bundle Monitoring................................................................................................................................................. |
409 |
Using Ethernet Pause Frames for Flow Control......................................................................................................... |
410 |
Enabling Pause Frames............................................................................................................................................ |
410 |
Configure the MTU Size on an Interface..................................................................................................................... |
411 |
Port-Pipes........................................................................................................................................................................ |
412 |
Auto-Negotiation on Ethernet Interfaces.................................................................................................................... |
412 |
Setting the Speed of Ethernet Interfaces............................................................................................................. |
412 |
Set Auto-Negotiation Options................................................................................................................................ |
414 |
View Advanced Interface Information.......................................................................................................................... |
414 |
Configuring the Interface Sampling Size............................................................................................................... |
415 |
Configuring the Traffic Sampling Size Globally........................................................................................................... |
416 |
Dynamic Counters.......................................................................................................................................................... |
418 |
Clearing Interface Counters.................................................................................................................................... |
418 |
Compressing Configuration Files.................................................................................................................................. |
419 |
Discard Counters............................................................................................................................................................ |
421 |
Display discard counters......................................................................................................................................... |
422 |
20 IPv4 Routing............................................................................................................................................ |
424 |
14 Contents
IP Addresses................................................................................................................................................................... |
425 |
Implementation Information.................................................................................................................................... |
425 |
Configuration Tasks for IP Addresses.......................................................................................................................... |
425 |
Assigning IP Addresses to an Interface....................................................................................................................... |
425 |
Configuring Static Routes............................................................................................................................................. |
426 |
Configure Static Routes for the Management Interface.......................................................................................... |
427 |
IPv4 Path MTU Discovery Overview.......................................................................................................................... |
428 |
Packet handling during MTU mismatch................................................................................................................ |
428 |
Using the Configured Source IP Address in ICMP Messages.................................................................................. |
428 |
Configuring the ICMP Source Interface............................................................................................................... |
428 |
Configuring the Duration to Establish a TCP Connection........................................................................................ |
429 |
Enabling Directed Broadcast........................................................................................................................................ |
429 |
Resolution of Host Names............................................................................................................................................ |
429 |
Enabling Dynamic Resolution of Host Names............................................................................................................ |
430 |
Specifying the Local System Domain and a List of Domains................................................................................... |
430 |
Configuring DNS with Traceroute................................................................................................................................ |
431 |
ARP.................................................................................................................................................................................. |
431 |
Configuration Tasks for ARP........................................................................................................................................ |
432 |
Configuring Static ARP Entries.................................................................................................................................... |
432 |
Enabling Proxy ARP....................................................................................................................................................... |
432 |
Clearing ARP Cache...................................................................................................................................................... |
433 |
ARP Learning via Gratuitous ARP................................................................................................................................ |
433 |
Enabling ARP Learning via Gratuitous ARP................................................................................................................ |
433 |
ARP Learning via ARP Request................................................................................................................................... |
433 |
Configuring ARP Retries............................................................................................................................................... |
434 |
ICMP............................................................................................................................................................................... |
435 |
Configuration Tasks for ICMP...................................................................................................................................... |
435 |
Enabling ICMP Unreachable Messages...................................................................................................................... |
435 |
UDP Helper..................................................................................................................................................................... |
435 |
Configure UDP Helper............................................................................................................................................. |
435 |
Important Points to Remember............................................................................................................................. |
436 |
Enabling UDP Helper..................................................................................................................................................... |
436 |
Configurations Using UDP Helper............................................................................................................................... |
436 |
UDP Helper with Broadcast-All Addresses................................................................................................................. |
436 |
UDP Helper with Subnet Broadcast Addresses......................................................................................................... |
437 |
UDP Helper with Configured Broadcast Addresses.................................................................................................. |
437 |
UDP Helper with No Configured Broadcast Addresses............................................................................................ |
438 |
Troubleshooting UDP Helper........................................................................................................................................ |
438 |
21 IPv6 Routing............................................................................................................................................ |
439 |
Protocol Overview......................................................................................................................................................... |
439 |
Extended Address Space........................................................................................................................................ |
440 |
Stateless Autoconfiguration................................................................................................................................... |
440 |
IPv6 Headers............................................................................................................................................................ |
440 |
Longest Prefix Match (LPM) Table and IPv6 /65 – /128 support.................................................................... |
441 |
IPv6 Header Fields................................................................................................................................................... |
442 |
Contents 15
Extension Header Fields.......................................................................................................................................... |
444 |
Addressing................................................................................................................................................................ |
445 |
Implementing IPv6 with Dell EMC Networking OS................................................................................................... |
446 |
ICMPv6........................................................................................................................................................................... |
447 |
Path MTU discovery...................................................................................................................................................... |
448 |
IPv6 Neighbor Discovery.............................................................................................................................................. |
448 |
IPv6 Neighbor Discovery of MTU Packets........................................................................................................... |
449 |
Configuring the IPv6 Recursive DNS Server....................................................................................................... |
449 |
Debugging IPv6 RDNSS Information Sent to the Host ..................................................................................... |
450 |
Displaying IPv6 RDNSS Information...................................................................................................................... |
450 |
Secure Shell (SSH) Over an IPv6 Transport............................................................................................................... |
451 |
Configuration Tasks for IPv6......................................................................................................................................... |
451 |
Adjusting Your CAM-Profile..................................................................................................................................... |
451 |
Assigning an IPv6 Address to an Interface........................................................................................................... |
452 |
Assigning a Static IPv6 Route................................................................................................................................ |
453 |
Configuring Telnet with IPv6.................................................................................................................................. |
453 |
SNMP over IPv6...................................................................................................................................................... |
454 |
Displaying IPv6 Information.................................................................................................................................... |
454 |
Displaying an IPv6 Interface Information.............................................................................................................. |
454 |
Showing IPv6 Routes.............................................................................................................................................. |
455 |
Showing the Running-Configuration for an Interface......................................................................................... |
456 |
Clearing IPv6 Routes............................................................................................................................................... |
457 |
Disabling ND Entry Timeout................................................................................................................................... |
457 |
Configuring IPv6 RA Guard.......................................................................................................................................... |
457 |
Configuring IPv6 RA Guard on an Interface......................................................................................................... |
459 |
Monitoring IPv6 RA Guard..................................................................................................................................... |
460 |
22 iSCSI Optimization................................................................................................................................... |
461 |
iSCSI Optimization Overview........................................................................................................................................ |
461 |
Monitoring iSCSI Traffic Flows............................................................................................................................... |
463 |
Application of Quality of Service to iSCSI Traffic Flows..................................................................................... |
463 |
Information Monitored in iSCSI Traffic Flows....................................................................................................... |
463 |
Detection and Auto-Configuration for Dell EqualLogic Arrays........................................................................... |
464 |
Configuring Detection and Ports for Dell Compellent Arrays............................................................................. |
464 |
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer................................................................. |
465 |
Enable and Disable iSCSI Optimization................................................................................................................. |
465 |
Default iSCSI Optimization Values............................................................................................................................... |
466 |
iSCSI Optimization Prerequisites................................................................................................................................. |
466 |
Configuring iSCSI Optimization................................................................................................................................... |
466 |
Displaying iSCSI Optimization Information................................................................................................................. |
468 |
23 Intermediate System to Intermediate System........................................................................................... |
470 |
IS-IS Protocol Overview................................................................................................................................................ |
470 |
IS-IS Addressing............................................................................................................................................................. |
470 |
Multi-Topology IS-IS....................................................................................................................................................... |
471 |
Transition Mode........................................................................................................................................................ |
471 |
16 Contents
Interface Support..................................................................................................................................................... |
472 |
Adjacencies............................................................................................................................................................... |
472 |
Graceful Restart............................................................................................................................................................. |
472 |
Timers........................................................................................................................................................................ |
472 |
Implementation Information.......................................................................................................................................... |
472 |
Configuration Information............................................................................................................................................. |
473 |
Configuration Tasks for IS-IS.................................................................................................................................. |
474 |
Configuring the Distance of a Route...................................................................................................................... |
481 |
Changing the IS-Type.............................................................................................................................................. |
482 |
Redistributing IPv4 Routes..................................................................................................................................... |
484 |
Redistributing IPv6 Routes..................................................................................................................................... |
485 |
Configuring Authentication Passwords................................................................................................................. |
486 |
Setting the Overload Bit......................................................................................................................................... |
486 |
Debugging IS-IS....................................................................................................................................................... |
487 |
IS-IS Metric Styles......................................................................................................................................................... |
488 |
Configure Metric Values............................................................................................................................................... |
488 |
Maximum Values in the Routing Table.................................................................................................................. |
488 |
Change the IS-IS Metric Style in One Level Only................................................................................................ |
488 |
Leaks from One Level to Another.......................................................................................................................... |
490 |
Sample Configurations................................................................................................................................................... |
491 |
24 Link Aggregation Control Protocol (LACP).............................................................................................. |
493 |
Introduction to Dynamic LAGs and LACP.................................................................................................................. |
493 |
Important Points to Remember............................................................................................................................. |
493 |
LACP Modes............................................................................................................................................................ |
494 |
Configuring LACP Commands............................................................................................................................... |
494 |
LACP Configuration Tasks............................................................................................................................................ |
495 |
Creating a LAG......................................................................................................................................................... |
495 |
Configuring the LAG Interfaces as Dynamic........................................................................................................ |
495 |
Setting the LACP Long Timeout........................................................................................................................... |
496 |
Monitoring and Debugging LACP.......................................................................................................................... |
496 |
Shared LAG State Tracking........................................................................................................................................... |
497 |
Configuring Shared LAG State Tracking............................................................................................................... |
497 |
Important Points about Shared LAG State Tracking........................................................................................... |
499 |
LACP Basic Configuration Example............................................................................................................................ |
499 |
Configure a LAG on ALPHA................................................................................................................................... |
499 |
25 Layer 2.................................................................................................................................................... |
508 |
Manage the MAC Address Table................................................................................................................................. |
508 |
Clearing the MAC Address Table........................................................................................................................... |
508 |
Setting the Aging Time for Dynamic Entries........................................................................................................ |
508 |
Configuring a Static MAC Address........................................................................................................................ |
509 |
Displaying the MAC Address Table........................................................................................................................ |
509 |
MAC Learning Limit....................................................................................................................................................... |
509 |
Setting the MAC Learning Limit............................................................................................................................. |
510 |
mac learning-limit Dynamic..................................................................................................................................... |
510 |
Contents 17
mac learning-limit mac-address-sticky.................................................................................................................. |
510 |
mac learning-limit station-move.............................................................................................................................. |
511 |
mac learning-limit no-station-move........................................................................................................................ |
511 |
Learning Limit Violation Actions............................................................................................................................... |
511 |
Setting Station Move Violation Actions................................................................................................................. |
512 |
Recovering from Learning Limit and Station Move Violations............................................................................ |
512 |
NIC Teaming.................................................................................................................................................................... |
513 |
Configure Redundant Pairs........................................................................................................................................... |
514 |
Important Points about Configuring Redundant Pairs......................................................................................... |
516 |
Far-End Failure Detection.............................................................................................................................................. |
517 |
FEFD State Changes................................................................................................................................................ |
518 |
Configuring FEFD..................................................................................................................................................... |
519 |
Enabling FEFD on an Interface............................................................................................................................... |
519 |
Debugging FEFD...................................................................................................................................................... |
520 |
26 Link Layer Discovery Protocol (LLDP)..................................................................................................... |
522 |
802.1AB (LLDP) Overview............................................................................................................................................ |
522 |
Protocol Data Units................................................................................................................................................. |
522 |
Optional TLVs................................................................................................................................................................. |
523 |
Management TLVs................................................................................................................................................... |
523 |
TIA-1057 (LLDP-MED) Overview................................................................................................................................ |
525 |
TIA Organizationally Specific TLVs........................................................................................................................ |
525 |
Configure LLDP............................................................................................................................................................. |
529 |
Related Configuration Tasks................................................................................................................................... |
529 |
Important Points to Remember............................................................................................................................. |
529 |
LLDP Compatibility.................................................................................................................................................. |
530 |
CONFIGURATION versus INTERFACE Configurations............................................................................................ |
530 |
Enabling LLDP................................................................................................................................................................ |
530 |
Disabling and Undoing LLDP................................................................................................................................... |
531 |
Enabling LLDP on Management Ports......................................................................................................................... |
531 |
Disabling and Undoing LLDP on Management Ports........................................................................................... |
531 |
Advertising TLVs............................................................................................................................................................. |
531 |
Storing and Viewing Unrecognized LLDP TLVs......................................................................................................... |
533 |
Reserved Unrecognized LLDP TLVs..................................................................................................................... |
533 |
Organizational Specific Unrecognized LLDP TLVs.............................................................................................. |
533 |
Viewing Unrecognized LLDP TLVs........................................................................................................................ |
533 |
Viewing the LLDP Configuration................................................................................................................................. |
534 |
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................ |
534 |
Examples of Viewing Information Advertised by Neighbors............................................................................... |
534 |
Configuring LLDPDU Intervals..................................................................................................................................... |
536 |
Configuring LLDP Notification Interval....................................................................................................................... |
537 |
Configuring LLDP Notification Interval....................................................................................................................... |
537 |
Configuring Transmit and Receive Mode.................................................................................................................... |
537 |
Configuring the Time to Live Value............................................................................................................................. |
538 |
Debugging LLDP............................................................................................................................................................ |
539 |
Relevant Management Objects................................................................................................................................... |
540 |
18 Contents
27 Microsoft Network Load Balancing.......................................................................................................... |
545 |
NLB Unicast Mode Scenario........................................................................................................................................ |
545 |
NLB Multicast Mode Scenario..................................................................................................................................... |
545 |
Limitations of the NLB Feature.................................................................................................................................... |
546 |
Microsoft Clustering...................................................................................................................................................... |
546 |
Enable and Disable VLAN Flooding ............................................................................................................................ |
546 |
Configuring a Switch for NLB ..................................................................................................................................... |
546 |
Enabling a Switch for Multicast NLB.................................................................................................................... |
547 |
28 Multicast Source Discovery Protocol (MSDP)......................................................................................... |
548 |
Protocol Overview......................................................................................................................................................... |
548 |
Anycast RP..................................................................................................................................................................... |
549 |
Implementation Information......................................................................................................................................... |
550 |
Configure Multicast Source Discovery Protocol........................................................................................................ |
550 |
Related Configuration Tasks................................................................................................................................... |
550 |
Enable MSDP................................................................................................................................................................. |
554 |
Manage the Source-Active Cache.............................................................................................................................. |
555 |
Viewing the Source-Active Cache........................................................................................................................ |
555 |
Limiting the Source-Active Cache........................................................................................................................ |
555 |
Clearing the Source-Active Cache........................................................................................................................ |
556 |
Enabling the Rejected Source-Active Cache....................................................................................................... |
556 |
Accept Source-Active Messages that Fail the RFP Check..................................................................................... |
556 |
Specifying Source-Active Messages........................................................................................................................... |
559 |
Limiting the Source-Active Messages from a Peer................................................................................................... |
560 |
Preventing MSDP from Caching a Local Source....................................................................................................... |
560 |
Preventing MSDP from Caching a Remote Source................................................................................................... |
561 |
Preventing MSDP from Advertising a Local Source.................................................................................................. |
561 |
Logging Changes in Peership States........................................................................................................................... |
562 |
Terminating a Peership.................................................................................................................................................. |
562 |
Clearing Peer Statistics................................................................................................................................................. |
563 |
Debugging MSDP.......................................................................................................................................................... |
563 |
MSDP with Anycast RP................................................................................................................................................ |
564 |
Configuring Anycast RP............................................................................................................................................... |
565 |
Reducing Source-Active Message Flooding........................................................................................................ |
566 |
Specifying the RP Address Used in SA Messages.............................................................................................. |
566 |
MSDP Sample Configurations..................................................................................................................................... |
568 |
32 Multicast Listener Discovery Protocol...................................................................................................... |
571 |
MLD Version 1................................................................................................................................................................. |
571 |
MLD Querier Router....................................................................................................................................................... |
571 |
Joining a Multicast Group............................................................................................................................................. |
572 |
Leaving a Multicast Group............................................................................................................................................ |
572 |
MLD version 2................................................................................................................................................................ |
572 |
MLD timers..................................................................................................................................................................... |
574 |
Reducing Host Response Burstiness.................................................................................................................... |
575 |
Contents 19
Clearing MLD groups..................................................................................................................................................... |
575 |
Debugging MLD............................................................................................................................................................. |
575 |
Explicit Tracking............................................................................................................................................................. |
575 |
Reducing Leave Latency............................................................................................................................................... |
575 |
Displaying MLD groups table........................................................................................................................................ |
576 |
Displaying MLD Interfaces............................................................................................................................................ |
576 |
30 Multiple Spanning Tree Protocol (MSTP)................................................................................................. |
577 |
Protocol Overview......................................................................................................................................................... |
577 |
Spanning Tree Variations............................................................................................................................................... |
578 |
Implementation Information.................................................................................................................................... |
578 |
Configure Multiple Spanning Tree Protocol................................................................................................................ |
578 |
Related Configuration Tasks................................................................................................................................... |
579 |
Enable Multiple Spanning Tree Globally....................................................................................................................... |
579 |
Adding and Removing Interfaces................................................................................................................................. |
579 |
Creating Multiple Spanning Tree Instances................................................................................................................ |
580 |
Influencing MSTP Root Selection................................................................................................................................ |
581 |
Interoperate with Non-Dell Bridges............................................................................................................................. |
582 |
Changing the Region Name or Revision..................................................................................................................... |
582 |
Modifying Global Parameters....................................................................................................................................... |
582 |
Modifying the Interface Parameters........................................................................................................................... |
584 |
Configuring an EdgePort.............................................................................................................................................. |
585 |
Flush MAC Addresses after a Topology Change....................................................................................................... |
585 |
MSTP Sample Configurations...................................................................................................................................... |
586 |
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running- |
|
ConfigurationSFTOS Example Running-Configuration....................................................................................... |
586 |
Debugging and Verifying MSTP Configurations........................................................................................................ |
590 |
31 Multicast Features.................................................................................................................................... |
592 |
Enabling IP Multicast..................................................................................................................................................... |
592 |
Implementation Information.......................................................................................................................................... |
592 |
Multicast Policies........................................................................................................................................................... |
593 |
IPv4 Multicast Policies............................................................................................................................................ |
593 |
Understanding Multicast Traceroute (mtrace).......................................................................................................... |
600 |
Important Points to Remember.............................................................................................................................. |
601 |
Printing Multicast Traceroute (mtrace) Paths............................................................................................................ |
601 |
Supported Error Codes................................................................................................................................................. |
602 |
mtrace Scenarios........................................................................................................................................................... |
603 |
32 Multicast Listener Discovery Protocol..................................................................................................... |
609 |
MLD Version 1................................................................................................................................................................ |
609 |
MLD Querier Router...................................................................................................................................................... |
609 |
Joining a Multicast Group.............................................................................................................................................. |
610 |
Leaving a Multicast Group............................................................................................................................................ |
610 |
MLD version 2................................................................................................................................................................. |
610 |
MLD timers...................................................................................................................................................................... |
612 |
20 Contents
Reducing Host Response Burstiness..................................................................................................................... |
613 |
Clearing MLD groups..................................................................................................................................................... |
613 |
Debugging MLD.............................................................................................................................................................. |
613 |
Explicit Tracking.............................................................................................................................................................. |
613 |
Reducing Leave Latency................................................................................................................................................ |
613 |
Displaying MLD groups table......................................................................................................................................... |
614 |
Displaying MLD Interfaces............................................................................................................................................. |
614 |
MLD Snooping................................................................................................................................................................ |
614 |
Enable MLD Snooping............................................................................................................................................. |
614 |
Disable MLD Snooping............................................................................................................................................. |
615 |
Configure the switch as a querier.......................................................................................................................... |
615 |
Specify port as connected to multicast router..................................................................................................... |
615 |
Enable Snooping Explicit Tracking.......................................................................................................................... |
616 |
Display the MLD Snooping Table............................................................................................................................ |
616 |
33 Object Tracking........................................................................................................................................ |
617 |
Object Tracking Overview............................................................................................................................................. |
617 |
Track Layer 2 Interfaces.......................................................................................................................................... |
618 |
Track Layer 3 Interfaces.......................................................................................................................................... |
618 |
Track IPv4 and IPv6 Routes.................................................................................................................................... |
619 |
Set Tracking Delays................................................................................................................................................. |
620 |
VRRP Object Tracking............................................................................................................................................ |
620 |
Object Tracking Configuration..................................................................................................................................... |
620 |
Tracking a Layer 2 Interface................................................................................................................................... |
620 |
Tracking a Layer 3 Interface.................................................................................................................................... |
621 |
Track an IPv4/IPv6 Route...................................................................................................................................... |
623 |
Displaying Tracked Objects........................................................................................................................................... |
626 |
34 Open Shortest Path First (OSPFv2 and OSPFv3).................................................................................... |
628 |
Protocol Overview......................................................................................................................................................... |
628 |
Autonomous System (AS) Areas........................................................................................................................... |
628 |
Area Types................................................................................................................................................................ |
629 |
Networks and Neighbors........................................................................................................................................ |
630 |
Router Types............................................................................................................................................................ |
630 |
Designated and Backup Designated Routers....................................................................................................... |
632 |
Link-State Advertisements (LSAs)........................................................................................................................ |
632 |
Router Priority and Cost......................................................................................................................................... |
633 |
OSPF with Dell EMC Networking OS......................................................................................................................... |
634 |
Graceful Restart...................................................................................................................................................... |
635 |
Fast Convergence (OSPFv2, IPv4 Only).............................................................................................................. |
636 |
Multi-Process OSPFv2 with VRF.......................................................................................................................... |
636 |
RFC-2328 Compliant OSPF Flooding................................................................................................................... |
636 |
OSPF ACK Packing.................................................................................................................................................. |
637 |
Setting OSPF Adjacency with Cisco Routers....................................................................................................... |
637 |
Configuration Information............................................................................................................................................. |
638 |
Configuration Task List for OSPFv2 (OSPF for IPv4)........................................................................................ |
638 |
Contents 21
OSPFv3 NSSA............................................................................................................................................................... |
652 |
NSSA Options.......................................................................................................................................................... |
652 |
Configuration Task List for OSPFv3 (OSPF for IPv6).............................................................................................. |
653 |
Enabling IPv6 Unicast Routing............................................................................................................................... |
653 |
Applying cost for OSPFv3...................................................................................................................................... |
654 |
Assigning IPv6 Addresses on an Interface........................................................................................................... |
654 |
Assigning Area ID on an Interface.......................................................................................................................... |
654 |
Assigning OSPFv3 Process ID and Router ID Globally........................................................................................ |
655 |
Assigning OSPFv3 Process ID and Router ID to a VRF...................................................................................... |
655 |
Configuring Stub Areas........................................................................................................................................... |
656 |
Configuring Passive-Interface................................................................................................................................ |
656 |
Redistributing Routes.............................................................................................................................................. |
656 |
Configuring a Default Route................................................................................................................................... |
657 |
Enabling OSPFv3 Graceful Restart....................................................................................................................... |
657 |
OSPFv3 Authentication Using IPsec..................................................................................................................... |
659 |
Troubleshooting OSPFv3........................................................................................................................................ |
665 |
35 Policy-based Routing (PBR).................................................................................................................... |
667 |
Overview......................................................................................................................................................................... |
667 |
Implementing PBR......................................................................................................................................................... |
668 |
Configuration Task List for Policy-based Routing...................................................................................................... |
668 |
PBR Exceptions (Permit)....................................................................................................................................... |
669 |
Create a Redirect List............................................................................................................................................. |
669 |
Create a Rule for a Redirect-list............................................................................................................................. |
669 |
Apply a Redirect-list to an Interface using a Redirect-group.............................................................................. |
671 |
Sample Configuration.................................................................................................................................................... |
673 |
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View Redirect-List GOLD...... |
674 |
36 PIM Sparse-Mode (PIM-SM).................................................................................................................. |
678 |
Implementation Information.......................................................................................................................................... |
678 |
Protocol Overview......................................................................................................................................................... |
678 |
Requesting Multicast Traffic................................................................................................................................... |
678 |
Refuse Multicast Traffic.......................................................................................................................................... |
679 |
Send Multicast Traffic............................................................................................................................................. |
679 |
Configuring PIM-SM..................................................................................................................................................... |
679 |
Related Configuration Tasks................................................................................................................................... |
680 |
Enable PIM-SM.............................................................................................................................................................. |
680 |
Configuring S,G Expiry Timers..................................................................................................................................... |
682 |
Configuring a Static Rendezvous Point...................................................................................................................... |
682 |
Overriding Bootstrap Router Updates.................................................................................................................. |
683 |
Configuring a Designated Router................................................................................................................................. |
683 |
Creating Multicast Boundaries and Domains............................................................................................................. |
685 |
37 PIM Source-Speci€c Mode (PIM-SSM).................................................................................................. |
686 |
Implementation Information......................................................................................................................................... |
686 |
Important Points to Remember............................................................................................................................. |
686 |
22 Contents
Configure PIM-SSM...................................................................................................................................................... |
687 |
Related Configuration Tasks................................................................................................................................... |
687 |
Enabling PIM-SSM........................................................................................................................................................ |
687 |
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................ |
687 |
Configuring PIM-SSM with IGMPv2..................................................................................................................... |
688 |
Electing an RP using the BSR Mechanism................................................................................................................. |
689 |
Enabling RP to Server Specific Multicast Groups............................................................................................... |
689 |
38 Port Monitoring........................................................................................................................................ |
691 |
Important Points to Remember.................................................................................................................................... |
691 |
Port Monitoring.............................................................................................................................................................. |
692 |
Configuring Port Monitoring........................................................................................................................................ |
693 |
Configuring Monitor Multicast Queue........................................................................................................................ |
694 |
Enabling Flow-Based Monitoring................................................................................................................................. |
695 |
Remote Port Mirroring.................................................................................................................................................. |
696 |
Remote Port Mirroring Example............................................................................................................................ |
696 |
Configuring Remote Port Mirroring....................................................................................................................... |
697 |
Displaying Remote-Port Mirroring Configurations............................................................................................... |
699 |
Configuring the Sample Remote Port Mirroring.................................................................................................. |
699 |
Encapsulated Remote Port Monitoring....................................................................................................................... |
702 |
ERPM Behavior on a typical Dell EMC Networking OS ........................................................................................... |
704 |
Decapsulation of ERPM packets at the Destination IP/ Analyzer..................................................................... |
704 |
Port Monitoring on VLT................................................................................................................................................. |
705 |
VLT Non-fail over Scenario..................................................................................................................................... |
705 |
VLT Fail-over Scenario............................................................................................................................................ |
706 |
RPM over VLT Scenarios........................................................................................................................................ |
706 |
39 Per-VLAN Spanning Tree Plus (PVST+)................................................................................................... |
708 |
Protocol Overview......................................................................................................................................................... |
708 |
Implementation Information.......................................................................................................................................... |
709 |
Configure Per-VLAN Spanning Tree Plus.................................................................................................................... |
709 |
Related Configuration Tasks................................................................................................................................... |
709 |
Enabling PVST+............................................................................................................................................................. |
709 |
Disabling PVST+............................................................................................................................................................. |
710 |
Influencing PVST+ Root Selection............................................................................................................................... |
710 |
Modifying Global PVST+ Parameters........................................................................................................................... |
712 |
Modifying Interface PVST+ Parameters...................................................................................................................... |
713 |
Configuring an EdgePort............................................................................................................................................... |
714 |
PVST+ in Multi-Vendor Networks................................................................................................................................ |
714 |
Enabling PVST+ Extend System ID.............................................................................................................................. |
714 |
PVST+ Sample Configurations...................................................................................................................................... |
715 |
40 Quality of Service (QoS).......................................................................................................................... |
718 |
Implementation Information.......................................................................................................................................... |
720 |
Port-Based QoS Configurations.................................................................................................................................. |
720 |
Setting dot1p Priorities for Incoming Traffic......................................................................................................... |
720 |
Contents 23
Honoring dot1p Priorities on Ingress Traffic........................................................................................................... |
721 |
Configuring Port-Based Rate Policing................................................................................................................... |
722 |
Configuring Port-Based Rate Shaping.................................................................................................................. |
722 |
Policy-Based QoS Configurations................................................................................................................................ |
723 |
Classify Traffic.......................................................................................................................................................... |
723 |
Dot1p to Queue Mapping Requirement................................................................................................................. |
727 |
Create a QoS Policy................................................................................................................................................. |
727 |
DSCP Color Maps.................................................................................................................................................... |
730 |
Create Policy Maps.................................................................................................................................................. |
732 |
Enabling QoS Rate Adjustment.................................................................................................................................... |
735 |
Enabling Strict-Priority Queueing................................................................................................................................ |
736 |
Queue Classification Requirements for PFC Functionality....................................................................................... |
736 |
Support for marking dot1p value in L3 Input Qos Policy........................................................................................... |
736 |
Weighted Random Early Detection.............................................................................................................................. |
737 |
Creating WRED Profiles.......................................................................................................................................... |
738 |
Applying a WRED Profile to Traffic........................................................................................................................ |
738 |
Displaying Default and Configured WRED Profiles.............................................................................................. |
739 |
Displaying WRED Drop Statistics........................................................................................................................... |
739 |
Displaying egress–queue Statistics....................................................................................................................... |
739 |
Pre-Calculating Available QoS CAM Space................................................................................................................ |
740 |
Specifying Policy-Based Rate Shaping in Packets Per Second................................................................................ |
741 |
Configuring Policy-Based Rate Shaping...................................................................................................................... |
741 |
Configuring Weights and ECN for WRED .................................................................................................................. |
742 |
Global Service Pools With WRED and ECN Settings.......................................................................................... |
742 |
Configuring WRED and ECN Attributes...................................................................................................................... |
743 |
Guidelines for Configuring ECN for Classifying and Color-Marking Packets......................................................... |
744 |
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class.................................. |
745 |
Classifying Incoming Packets Using ECN and Color-Marking............................................................................ |
745 |
Sample configuration to mark non-ecn packets as “yellow” with single traffic class...................................... |
747 |
Applying Layer 2 Match Criteria on a Layer 3 Interface............................................................................................ |
748 |
Managing Hardware Buffer Statistics.................................................................................................................... |
748 |
Enabling Buffer Statistics Tracking ............................................................................................................................. |
749 |
41 Routing Information Protocol (RIP).......................................................................................................... |
752 |
Protocol Overview......................................................................................................................................................... |
752 |
RIPv1.......................................................................................................................................................................... |
752 |
RIPv2......................................................................................................................................................................... |
752 |
Implementation Information.......................................................................................................................................... |
753 |
Configuration Information............................................................................................................................................. |
753 |
Configuration Task List............................................................................................................................................ |
753 |
RIP Configuration Example..................................................................................................................................... |
760 |
42 Remote Monitoring (RMON)................................................................................................................... |
765 |
Implementation Information.......................................................................................................................................... |
765 |
Fault Recovery............................................................................................................................................................... |
765 |
Setting the RMON Alarm........................................................................................................................................ |
766 |
24 Contents
Configuring an RMON Event................................................................................................................................. |
766 |
Configuring RMON Collection Statistics............................................................................................................... |
767 |
Configuring the RMON Collection History............................................................................................................ |
767 |
43 Rapid Spanning Tree Protocol (RSTP)..................................................................................................... |
769 |
Protocol Overview......................................................................................................................................................... |
769 |
Configuring Rapid Spanning Tree................................................................................................................................. |
769 |
Related Configuration Tasks................................................................................................................................... |
769 |
Important Points to Remember.................................................................................................................................... |
769 |
RSTP and VLT.......................................................................................................................................................... |
770 |
Configuring Interfaces for Layer 2 Mode.................................................................................................................... |
770 |
Enabling Rapid Spanning Tree Protocol Globally......................................................................................................... |
771 |
Adding and Removing Interfaces................................................................................................................................. |
773 |
Modifying Global Parameters........................................................................................................................................ |
773 |
Enabling SNMP Traps for Root Elections and Topology Changes..................................................................... |
775 |
Modifying Interface Parameters................................................................................................................................... |
775 |
Enabling SNMP Traps for Root Elections and Topology Changes........................................................................... |
775 |
Influencing RSTP Root Selection................................................................................................................................. |
775 |
Configuring an EdgePort............................................................................................................................................... |
776 |
Configuring Fast Hellos for Link State Detection....................................................................................................... |
777 |
44 Software-De€ned Networking (SDN)...................................................................................................... |
778 |
45 Security................................................................................................................................................... |
779 |
AAA Accounting............................................................................................................................................................. |
779 |
Configuration Task List for AAA Accounting........................................................................................................ |
779 |
AAA Authentication........................................................................................................................................................ |
781 |
Configuration Task List for AAA Authentication................................................................................................... |
782 |
Obscuring Passwords and Keys................................................................................................................................... |
785 |
AAA Authorization......................................................................................................................................................... |
785 |
Privilege Levels Overview....................................................................................................................................... |
785 |
Configuration Task List for Privilege Levels.......................................................................................................... |
786 |
RADIUS........................................................................................................................................................................... |
790 |
RADIUS Authentication........................................................................................................................................... |
790 |
Configuration Task List for RADIUS....................................................................................................................... |
791 |
Support for Change of Authorization and Disconnect Messages packets...................................................... |
795 |
TACACS+........................................................................................................................................................................ |
806 |
Configuration Task List for TACACS+................................................................................................................... |
806 |
TACACS+ Remote Authentication........................................................................................................................ |
808 |
Command Authorization......................................................................................................................................... |
809 |
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... |
809 |
Enabling SCP and SSH................................................................................................................................................. |
809 |
Using SCP with SSH to Copy a Software Image................................................................................................. |
810 |
Removing the RSA Host Keys and Zeroizing Storage ......................................................................................... |
811 |
Configuring When to Re-generate an SSH Key ................................................................................................... |
811 |
Configuring the SSH Server Key Exchange Algorithm........................................................................................ |
812 |
Contents 25
Configuring the HMAC Algorithm for the SSH Server........................................................................................ |
812 |
Configuring the SSH Server Cipher List................................................................................................................ |
813 |
Configuring DNS in the SSH Server...................................................................................................................... |
813 |
Secure Shell Authentication.................................................................................................................................... |
814 |
Troubleshooting SSH................................................................................................................................................ |
816 |
Telnet................................................................................................................................................................................ |
816 |
VTY Line and Access-Class Configuration.................................................................................................................. |
817 |
VTY Line Local Authentication and Authorization................................................................................................ |
817 |
VTY Line Remote Authentication and Authorization........................................................................................... |
818 |
VTY MAC-SA Filter Support................................................................................................................................... |
818 |
Role-Based Access Control........................................................................................................................................... |
818 |
Overview of RBAC................................................................................................................................................... |
819 |
User Roles................................................................................................................................................................. |
821 |
AAA Authentication and Authorization for Roles................................................................................................. |
824 |
Role Accounting....................................................................................................................................................... |
827 |
Display Information About User Roles................................................................................................................... |
828 |
Two Factor Authentication (2FA)................................................................................................................................ |
829 |
Handling Access-Challenge Message................................................................................................................... |
829 |
Configuring Challenge Response Authentication for SSHv2............................................................................. |
829 |
SMS-OTP Mechanism............................................................................................................................................ |
830 |
Configuring the System to Drop Certain ICMP Reply Messages............................................................................ |
830 |
Dell EMC Networking OS Security Hardening........................................................................................................... |
832 |
Dell EMC Networking OS Image Verification....................................................................................................... |
832 |
Startup Configuration Verification......................................................................................................................... |
833 |
Configuring the root User Password..................................................................................................................... |
834 |
Locking Access to GRUB Interface....................................................................................................................... |
835 |
Enabling User Lockout for Failed Login Attempts............................................................................................... |
836 |
46 Service Provider Bridging........................................................................................................................ |
837 |
VLAN Stacking............................................................................................................................................................... |
837 |
Important Points to Remember............................................................................................................................. |
838 |
Configure VLAN Stacking....................................................................................................................................... |
838 |
Creating Access and Trunk Ports.......................................................................................................................... |
839 |
Enable VLAN-Stacking for a VLAN....................................................................................................................... |
840 |
Configuring the Protocol Type Value for the Outer VLAN Tag.......................................................................... |
840 |
Configuring Dell EMC Networking OS Options for Trunk Ports........................................................................ |
840 |
Debugging VLAN Stacking...................................................................................................................................... |
841 |
VLAN Stacking in Multi-Vendor Networks........................................................................................................... |
842 |
VLAN Stacking Packet Drop Precedence.................................................................................................................. |
845 |
Enabling Drop Eligibility........................................................................................................................................... |
845 |
Honoring the Incoming DEI Value.......................................................................................................................... |
846 |
Marking Egress Packets with a DEI Value............................................................................................................ |
847 |
Dynamic Mode CoS for VLAN Stacking..................................................................................................................... |
847 |
Mapping C-Tag to S-Tag dot1p Values................................................................................................................... |
848 |
Layer 2 Protocol Tunneling........................................................................................................................................... |
849 |
Implementation Information.................................................................................................................................... |
851 |
26 Contents
Enabling Layer 2 Protocol Tunneling...................................................................................................................... |
851 |
Specifying a Destination MAC Address for BPDUs............................................................................................. |
852 |
Setting Rate-Limit BPDUs...................................................................................................................................... |
852 |
Debugging Layer 2 Protocol Tunneling.................................................................................................................. |
853 |
Provider Backbone Bridging......................................................................................................................................... |
853 |
47 sFlow....................................................................................................................................................... |
854 |
Overview......................................................................................................................................................................... |
854 |
Implementation Information.......................................................................................................................................... |
854 |
Important Points to Remember............................................................................................................................. |
855 |
Enabling Extended sFlow.............................................................................................................................................. |
855 |
Enabling and Disabling sFlow on an Interface............................................................................................................ |
856 |
Enabling sFlow Max-Header Size Extended.............................................................................................................. |
856 |
sFlow Show Commands............................................................................................................................................... |
857 |
Displaying Show sFlow Global................................................................................................................................ |
857 |
Displaying Show sFlow on an Interface................................................................................................................ |
858 |
Displaying Show sFlow on a Stack-unit................................................................................................................ |
858 |
Configuring Specify Collectors.................................................................................................................................... |
859 |
Changing the Polling Intervals...................................................................................................................................... |
859 |
Back-Off Mechanism.................................................................................................................................................... |
859 |
sFlow on LAG ports....................................................................................................................................................... |
860 |
Enabling Extended sFlow.............................................................................................................................................. |
860 |
Important Points to Remember.............................................................................................................................. |
861 |
48 Simple Network Management Protocol (SNMP)..................................................................................... |
862 |
Protocol Overview......................................................................................................................................................... |
863 |
Implementation Information.......................................................................................................................................... |
863 |
SNMPv3 Compliance With FIPS................................................................................................................................. |
863 |
Configuration Task List for SNMP............................................................................................................................... |
864 |
Related Configuration Tasks................................................................................................................................... |
864 |
Important Points to Remember................................................................................................................................... |
865 |
Set up SNMP................................................................................................................................................................. |
865 |
Creating a Community............................................................................................................................................ |
865 |
Setting Up User-Based Security (SNMPv3)....................................................................................................... |
865 |
Reading Managed Object Values................................................................................................................................. |
867 |
Writing Managed Object Values................................................................................................................................... |
867 |
Configuring Contact and Location Information using SNMP................................................................................... |
868 |
Subscribing to Managed Object Value Updates using SNMP................................................................................. |
868 |
Enabling a Subset of SNMP Traps.............................................................................................................................. |
869 |
Enabling an SNMP Agent to Notify Syslog Server Failure........................................................................................ |
873 |
Copy Configuration Files Using SNMP........................................................................................................................ |
874 |
Copying a Configuration File................................................................................................................................... |
875 |
Copying Configuration Files via SNMP................................................................................................................. |
876 |
Copying the Startup-Config Files to the Running-Config.................................................................................. |
876 |
Copying the Startup-Config Files to the Server via FTP.................................................................................... |
877 |
Copying the Startup-Config Files to the Server via TFTP.................................................................................. |
877 |
Contents 27
Copy a Binary File to the Startup-Configuration.................................................................................................. |
878 |
Additional MIB Objects to View Copy Statistics.................................................................................................. |
878 |
Obtaining a Value for MIB Objects......................................................................................................................... |
879 |
MIB Support to Display Reason for Last System Reboot......................................................................................... |
879 |
Viewing the Reason for Last System Reboot Using SNMP............................................................................... |
880 |
MIB Support for Power Monitoring............................................................................................................................. |
880 |
MIB Support to Display the Available Memory Size on Flash................................................................................... |
881 |
Viewing the Available Flash Memory Size............................................................................................................. |
881 |
MIB Support to Display the Software Core Files Generated by the System.......................................................... |
881 |
Viewing the Software Core Files Generated by the System.............................................................................. |
882 |
SNMP Support for WRED Green/Yellow/Red Drop Counters................................................................................ |
882 |
MIB Support to Display the Available Partitions on Flash......................................................................................... |
883 |
Viewing the Available Partitions on Flash............................................................................................................. |
884 |
MIB Support to Display Egress Queue Statistics....................................................................................................... |
885 |
MIB Support to ECMP Group Count.......................................................................................................................... |
885 |
Viewing the ECMP Group Count Information...................................................................................................... |
885 |
MIB Support for entAliasMappingTable ..................................................................................................................... |
888 |
Viewing the entAliasMappingTable MIB................................................................................................................ |
888 |
MIB Support for LAG.................................................................................................................................................... |
888 |
Viewing the LAG MIB.............................................................................................................................................. |
890 |
MIB Support to Display Unrecognized LLDP TLVs................................................................................................... |
890 |
MIB Support to Display Reserved Unrecognized LLDP TLVs............................................................................ |
890 |
MIB Support to Display Organizational Specific Unrecognized LLDP TLVs...................................................... |
891 |
MIB Support to Display Unrecognized LLDP TLVs.................................................................................................... |
892 |
Viewing the Details of Reserved Unrecognized LLDP TLVs.............................................................................. |
892 |
MIB Support for LLDP Notification Interval............................................................................................................... |
893 |
Manage VLANs using SNMP....................................................................................................................................... |
893 |
Creating a VLAN...................................................................................................................................................... |
893 |
Assigning a VLAN Alias........................................................................................................................................... |
893 |
Displaying the Ports in a VLAN.............................................................................................................................. |
894 |
Add Tagged and Untagged Ports to a VLAN....................................................................................................... |
894 |
Managing Overload on Startup.................................................................................................................................... |
895 |
Enabling and Disabling a Port using SNMP................................................................................................................ |
895 |
Fetch Dynamic MAC Entries using SNMP................................................................................................................. |
896 |
Example of Deriving the Interface Index Number...................................................................................................... |
897 |
MIB Objects for Viewing the System Image on Flash Partitions....................................................................... |
897 |
Monitoring BGP sessions via SNMP........................................................................................................................... |
897 |
Monitor Port-Channels................................................................................................................................................. |
899 |
Troubleshooting SNMP Operation.............................................................................................................................. |
900 |
Transceiver Monitoring.................................................................................................................................................. |
901 |
49 Stacking.................................................................................................................................................. |
903 |
Stacking Overview........................................................................................................................................................ |
903 |
Stack Management Roles....................................................................................................................................... |
903 |
Stack Master Election............................................................................................................................................. |
904 |
Virtual IP................................................................................................................................................................... |
905 |
28 Contents
Failover Roles........................................................................................................................................................... |
905 |
MAC Addressing on Stacks.................................................................................................................................... |
905 |
Stacking LAG........................................................................................................................................................... |
906 |
Supported Stacking Topologies............................................................................................................................. |
906 |
High Availability on Stacks...................................................................................................................................... |
907 |
Management Access on Stacks............................................................................................................................. |
907 |
Important Points to Remember................................................................................................................................... |
908 |
Stacking Installation Tasks............................................................................................................................................ |
908 |
Create a Stack......................................................................................................................................................... |
908 |
Add Units to an Existing Stack............................................................................................................................... |
912 |
Split a Stack.............................................................................................................................................................. |
914 |
Stacking Configuration Tasks........................................................................................................................................ |
914 |
Assigning Unit Numbers to Units in an Stack....................................................................................................... |
915 |
Creating a Virtual Stack Unit on a Stack............................................................................................................... |
915 |
Displaying Information about a Stack..................................................................................................................... |
915 |
Influencing Management Unit Selection on a Stack............................................................................................ |
917 |
Managing Redundancy on a Stack......................................................................................................................... |
917 |
Resetting a Unit on a Stack.................................................................................................................................... |
918 |
Verify a Stack Configuration......................................................................................................................................... |
918 |
Displaying the Status of Stacking Ports................................................................................................................ |
918 |
Remove Units or Front End Ports from a Stack......................................................................................................... |
919 |
Removing a Unit from a Stack................................................................................................................................ |
919 |
Removing Front End Port Stacking....................................................................................................................... |
919 |
Troubleshoot a Stack..................................................................................................................................................... |
920 |
Recover from Stack Link Flaps.............................................................................................................................. |
920 |
Recover from a Card Problem State on a Stack.................................................................................................. |
920 |
50 Storm Control.......................................................................................................................................... |
921 |
Configure Storm Control............................................................................................................................................... |
921 |
Configuring Storm Control from INTERFACE Mode............................................................................................ |
921 |
Configuring Storm Control from CONFIGURATION Mode................................................................................ |
922 |
Detect PFC Storm......................................................................................................................................................... |
922 |
Restore Queue Drop State........................................................................................................................................... |
923 |
PFC Storm...................................................................................................................................................................... |
923 |
View Details of Storm Control PFC............................................................................................................................. |
923 |
51 Spanning Tree Protocol (STP).................................................................................................................. |
925 |
Protocol Overview......................................................................................................................................................... |
925 |
Configure Spanning Tree............................................................................................................................................... |
926 |
Related Configuration Tasks................................................................................................................................... |
926 |
Important Points to Remember................................................................................................................................... |
926 |
Configuring Interfaces for Layer 2 Mode.................................................................................................................... |
927 |
Enabling Spanning Tree Protocol Globally................................................................................................................... |
928 |
Adding an Interface to the Spanning Tree Group...................................................................................................... |
930 |
Modifying Global Parameters....................................................................................................................................... |
930 |
Modifying Interface STP Parameters........................................................................................................................... |
931 |
Contents 29
Enabling PortFast........................................................................................................................................................... |
931 |
Prevent Network Disruptions with BPDU Guard................................................................................................. |
932 |
Selecting STP Root....................................................................................................................................................... |
934 |
STP Root Guard............................................................................................................................................................. |
934 |
Root Guard Scenario............................................................................................................................................... |
934 |
Configuring Root Guard.......................................................................................................................................... |
935 |
Enabling SNMP Traps for Root Elections and Topology Changes........................................................................... |
936 |
Configuring Spanning Trees as Hitless........................................................................................................................ |
936 |
STP Loop Guard............................................................................................................................................................. |
936 |
Configuring Loop Guard.......................................................................................................................................... |
938 |
Displaying STP Guard Configuration........................................................................................................................... |
938 |
52 SupportAssist.......................................................................................................................................... |
940 |
Configuring SupportAssist Using a Configuration Wizard......................................................................................... |
941 |
Configuring SupportAssist Manually............................................................................................................................ |
941 |
Configuring SupportAssist Activity............................................................................................................................. |
943 |
Configuring SupportAssist Company.......................................................................................................................... |
944 |
Configuring SupportAssist Person.............................................................................................................................. |
945 |
Configuring SupportAssist Server............................................................................................................................... |
945 |
Viewing SupportAssist Configuration......................................................................................................................... |
946 |
53 System Time and Date............................................................................................................................. |
948 |
Network Time Protocol................................................................................................................................................. |
948 |
Protocol Overview................................................................................................................................................... |
949 |
Configure the Network Time Protocol.................................................................................................................. |
949 |
Enabling NTP........................................................................................................................................................... |
950 |
Configuring NTP Broadcasts................................................................................................................................. |
950 |
Disabling NTP on an Interface................................................................................................................................ |
951 |
Configuring a Source IP Address for NTP Packets.............................................................................................. |
951 |
Configuring NTP Authentication............................................................................................................................ |
951 |
Configuring NTP control key password................................................................................................................ |
954 |
Dell EMC Networking OS Time and Date................................................................................................................... |
954 |
Configuration Task List .......................................................................................................................................... |
954 |
Setting the Time and Date for the Switch Software Clock............................................................................... |
954 |
Setting the Timezone.............................................................................................................................................. |
955 |
Set Daylight Saving Time........................................................................................................................................ |
955 |
Setting Daylight Saving Time Once....................................................................................................................... |
955 |
Setting Recurring Daylight Saving Time............................................................................................................... |
956 |
54 Tunneling................................................................................................................................................. |
958 |
Configuring a Tunnel..................................................................................................................................................... |
958 |
Configuring Tunnel Keepalive Settings........................................................................................................................ |
959 |
Configuring a Tunnel Interface..................................................................................................................................... |
960 |
Configuring Tunnel Allow-Remote Decapsulation...................................................................................................... |
960 |
Configuring Tunnel source anylocal Decapsulation.................................................................................................... |
961 |
Guidelines for Configuring Multipoint Receive-Only Tunnels.................................................................................... |
961 |
30 Contents