Dell PowerSwitch S6010-ON User Manual

Dell Conguration Guide for the S6010–ON System
9.14.0.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
trademarks may be trademarks of their respective owners.
2018 - 07
Rev. A00
Contents
1 About this Guide...........................................................................................................................................36
Audience........................................................................................................................................................................... 36
Conventions......................................................................................................................................................................36
Related Documents......................................................................................................................................................... 36
2 Conguration Fundamentals........................................................................................................................ 37
Accessing the Command Line........................................................................................................................................ 37
CLI Modes.........................................................................................................................................................................37
Navigating CLI Modes...............................................................................................................................................39
The do Command............................................................................................................................................................ 42
Undoing Commands........................................................................................................................................................ 42
Obtaining Help..................................................................................................................................................................43
Entering and Editing Commands....................................................................................................................................43
Command History............................................................................................................................................................ 44
Filtering show Command Outputs.................................................................................................................................44
Example of the grep Keyword..................................................................................................................................44
Multiple Users in Conguration Mode...........................................................................................................................45
3 Getting Started............................................................................................................................................46
Console Access................................................................................................................................................................ 47
Serial Console............................................................................................................................................................. 47
Default Conguration...................................................................................................................................................... 48
Conguring a Host Name............................................................................................................................................... 48
Accessing the System Remotely....................................................................................................................................48
Accessing the System Remotely..............................................................................................................................49
Congure the Management Port IP Address.........................................................................................................49
Congure a Management Route..............................................................................................................................49
Conguring a Username and Password..................................................................................................................49
Conguring the Enable Password..................................................................................................................................50
Conguration File Management......................................................................................................................................51
Copy Files to and from the System..........................................................................................................................51
Mounting an NFS File System..................................................................................................................................52
Save the Running-Conguration..............................................................................................................................53
Congure the Overload Bit for a Startup Scenario............................................................................................... 54
Viewing Files...............................................................................................................................................................54
Managing the File System.............................................................................................................................................. 55
View Command History.................................................................................................................................................. 55
Upgrading Dell EMC Networking OS............................................................................................................................ 56
Using HTTP for File Transfers........................................................................................................................................56
Verify Software Images Before Installation...................................................................................................................57
4 Management............................................................................................................................................... 58
Contents
3
Conguring Privilege Levels........................................................................................................................................... 58
Creating a Custom Privilege Level...........................................................................................................................59
Removing a Command from EXEC Mode..............................................................................................................59
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................59
Allowing Access to CONFIGURATION Mode Commands....................................................................................59
Allowing Access to Dierent Modes........................................................................................................................59
Applying a Privilege Level to a Username................................................................................................................61
Applying a Privilege Level to a Terminal Line...........................................................................................................61
Conguring Logging......................................................................................................................................................... 61
Audit and Security Logs............................................................................................................................................62
Conguring Logging Format ...................................................................................................................................63
Setting Up a Secure Connection to a Syslog Server.............................................................................................63
Log Messages in the Internal Buer..............................................................................................................................65
Conguration Task List for System Log Management..........................................................................................65
Disabling System Logging...............................................................................................................................................65
Sending System Messages to a Syslog Server............................................................................................................65
Conguring a UNIX System as a Syslog Server.....................................................................................................65
Track Login Activity......................................................................................................................................................... 66
Restrictions for Tracking Login Activity.................................................................................................................. 66
Conguring Login Activity Tracking......................................................................................................................... 66
Display Login Statistics..............................................................................................................................................67
Limit Concurrent Login Sessions....................................................................................................................................68
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 68
Conguring Concurrent Session Limit.....................................................................................................................68
Enabling the System to Clear Existing Sessions....................................................................................................69
Enabling Secured CLI Mode........................................................................................................................................... 70
Changing System Logging Settings...............................................................................................................................70
Display the Logging Buer and the Logging Conguration.........................................................................................71
Conguring a UNIX Logging Facility Level.....................................................................................................................71
Synchronizing Log Messages......................................................................................................................................... 72
Enabling Timestamp on Syslog Messages.................................................................................................................... 73
File Transfer Services.......................................................................................................................................................73
Conguration Task List for File Transfer Services.................................................................................................. 74
Enabling the FTP Server........................................................................................................................................... 74
Conguring FTP Server Parameters........................................................................................................................74
Conguring FTP Client Parameters.........................................................................................................................75
Terminal Lines................................................................................................................................................................... 75
Denying and Permitting Access to a Terminal Line................................................................................................ 75
Conguring Login Authentication for Terminal Lines.............................................................................................76
Setting Timeout for EXEC Privilege Mode....................................................................................................................77
Using Telnet to get to Another Network Device..........................................................................................................78
Lock CONFIGURATION Mode....................................................................................................................................... 78
Viewing the Conguration Lock Status...................................................................................................................78
Restoring the Factory Default Settings.........................................................................................................................79
Important Points to Remember................................................................................................................................79
Contents
4
Restoring Factory Default Environment Variables.................................................................................................80
Viewing the Reason for Last System Reboot............................................................................................................... 81
5 802.1X..........................................................................................................................................................82
Port-Authentication Process..........................................................................................................................................84
EAP over RADIUS......................................................................................................................................................84
Conguring 802.1X...........................................................................................................................................................85
Related Conguration Tasks..................................................................................................................................... 85
Important Points to Remember......................................................................................................................................85
Enabling 802.1X................................................................................................................................................................ 86
Conguring Request Identity Re-Transmissions...........................................................................................................87
Conguring a Quiet Period after a Failed Authentication..................................................................................... 88
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 89
Re-Authenticating a Port................................................................................................................................................89
Conguring Timeouts......................................................................................................................................................90
Conguring Dynamic VLAN Assignment with Port Authentication........................................................................... 91
Guest and Authentication-Fail VLANs.......................................................................................................................... 92
Conguring a Guest VLAN....................................................................................................................................... 93
Conguring an Authentication-Fail VLAN...............................................................................................................93
6 Access Control Lists (ACLs)........................................................................................................................ 95
IP Access Control Lists (ACLs)...................................................................................................................................... 96
CAM Usage.................................................................................................................................................................97
Implementing ACLs on Dell EMC Networking OS..................................................................................................97
Important Points to Remember......................................................................................................................................99
Conguration Task List for Route Maps..................................................................................................................99
Conguring Match Routes.......................................................................................................................................101
Conguring Set Conditions..................................................................................................................................... 103
Congure a Route Map for Route Redistribution.................................................................................................104
Congure a Route Map for Route Tagging........................................................................................................... 104
Continue Clause....................................................................................................................................................... 105
IP Fragment Handling.................................................................................................................................................... 105
IP Fragments ACL Examples...................................................................................................................................105
Layer 4 ACL Rules Examples...................................................................................................................................106
Congure a Standard IP ACL........................................................................................................................................106
Conguring a Standard IP ACL Filter..................................................................................................................... 107
Congure an Extended IP ACL..................................................................................................................................... 108
Conguring Filters with a Sequence Number.......................................................................................................108
Conguring Filters Without a Sequence Number................................................................................................. 110
Congure Layer 2 and Layer 3 ACLs............................................................................................................................. 111
Assign an IP ACL to an Interface................................................................................................................................... 111
Applying an IP ACL.......................................................................................................................................................... 111
Counting ACL Hits.....................................................................................................................................................112
Congure Ingress ACLs..................................................................................................................................................112
Congure Egress ACLs...................................................................................................................................................113
Applying Egress Layer 3 ACLs (Control-Plane).....................................................................................................114
Contents
5
IP Prex Lists...................................................................................................................................................................114
Implementation Information..................................................................................................................................... 115
Conguration Task List for Prex Lists...................................................................................................................115
ACL Remarks...................................................................................................................................................................118
Conguring a Remark...............................................................................................................................................119
Deleting a Remark.....................................................................................................................................................119
ACL Resequencing.........................................................................................................................................................120
Resequencing an ACL or Prex List.......................................................................................................................120
Route Maps.....................................................................................................................................................................122
Implementation Information.................................................................................................................................... 122
Flow-Based Monitoring..................................................................................................................................................122
Behavior of Flow-Based Monitoring.......................................................................................................................122
Enabling Flow-Based Monitoring............................................................................................................................124
Conguring IP Mirror Access Group............................................................................................................................ 125
Sample Conguration...............................................................................................................................................125
Example of viewing IP mirror–access–group applied to an Interface................................................................126
7 Bidirectional Forwarding Detection (BFD)...................................................................................................127
How BFD Works..............................................................................................................................................................127
BFD Packet Format..................................................................................................................................................128
BFD Sessions............................................................................................................................................................ 129
BFD Three-Way Handshake....................................................................................................................................130
Session State Changes............................................................................................................................................132
Important Points to Remember.................................................................................................................................... 132
Congure BFD................................................................................................................................................................ 132
Congure BFD for Physical Ports...........................................................................................................................133
Congure BFD for Static Routes............................................................................................................................134
Congure BFD for IPv6 Static Routes...................................................................................................................138
Congure BFD for OSPF.........................................................................................................................................140
Congure BFD for OSPFv3.....................................................................................................................................146
Congure BFD for IS-IS...........................................................................................................................................149
Congure BFD for BGP............................................................................................................................................151
Congure BFD for VRRP.........................................................................................................................................159
Conguring Protocol Liveness.................................................................................................................................161
8 Border Gateway Protocol (BGP)................................................................................................................ 162
Border Gateway Protocol version 4 (BGPv4).............................................................................................................162
Autonomous Systems (AS)........................................................................................................................................... 162
AS4 Number Representation.................................................................................................................................. 164
Four-Byte AS Numbers........................................................................................................................................... 166
Multiprotocol BGP..........................................................................................................................................................166
MBGP for IPv4 MulticastBGP Address Family modelIPv4 and IPv6 address family........................................167
Sessions and Peers.........................................................................................................................................................167
Establish a Session................................................................................................................................................... 167
Implementing BGP global and address family.............................................................................................................168
BGP global conguration default values................................................................................................................169
Contents
6
BGP Attributes for selecting Best Path.......................................................................................................................169
Best Path Selection Criteria....................................................................................................................................170
Weight.........................................................................................................................................................................171
Local Preference.......................................................................................................................................................172
Multi-Exit Discriminators (MEDs)...........................................................................................................................172
Origin..........................................................................................................................................................................173
AS Path...................................................................................................................................................................... 174
Next Hop....................................................................................................................................................................174
Implement BGP with Dell EMC Networking OS.........................................................................................................175
Additional Path (Add-Path) Support......................................................................................................................175
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ 175
Ignore Router-ID in Best-Path Calculation............................................................................................................ 176
AS Number Migration...............................................................................................................................................176
BGP4 Management Information Base (MIB)........................................................................................................ 177
Important Points to Remember...............................................................................................................................177
Conguration Information..............................................................................................................................................178
Conguring a basic BGP network................................................................................................................................ 178
Enabling BGP............................................................................................................................................................ 178
Conguring a BGP peer............................................................................................................................................181
Conguring AS4 Number Representations........................................................................................................... 182
Conguring a BGP VRF address family.................................................................................................................183
Route-refresh and Soft-reconguration................................................................................................................185
Aggregating Routes..................................................................................................................................................188
Filtering BGP Routes................................................................................................................................................188
Filtering BGP Routes Using Route Maps.............................................................................................................. 190
Filtering BGP Routes Using AS-PATH Information.............................................................................................. 190
Conguring Peer Groups..........................................................................................................................................191
Conguring BGP Fast Fall-Over.............................................................................................................................199
Conguring Passive Peering...................................................................................................................................200
Maintaining Existing AS Numbers During an AS Migration.................................................................................201
Allowing an AS Number to Appear in its Own AS Path...................................................................................... 202
Enabling Graceful Restart.......................................................................................................................................203
Filtering on an AS-Path Attribute.......................................................................................................................... 204
Regular Expressions as Filters................................................................................................................................205
Redistributing Routes..............................................................................................................................................206
Enabling Additional Paths........................................................................................................................................207
Conguring IP Community Lists.............................................................................................................................207
Conguring an IP Extended Community List.......................................................................................................208
Filtering Routes with Community Lists................................................................................................................. 209
Manipulating the COMMUNITY Attribute.............................................................................................................210
Changing MED Attributes........................................................................................................................................211
Changing the LOCAL_PREFERENCE Attribute...................................................................................................212
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes............. 212
Changing the WEIGHT Attribute............................................................................................................................213
Enabling Multipath....................................................................................................................................................213
Contents
7
Route Reectors.......................................................................................................................................................214
Conguring BGP Confederations...........................................................................................................................215
Enabling Route Flap Dampening.............................................................................................................................215
Changing BGP Timers..............................................................................................................................................218
Setting the extended timer.....................................................................................................................................218
Enabling or disabling BGP neighbors..................................................................................................................... 219
Route Map Continue...............................................................................................................................................220
Enabling MBGP Congurations.................................................................................................................................... 221
MBGP support for IPv6.................................................................................................................................................221
Conguring IPv6 MBGP between peers..................................................................................................................... 221
Example-Conguring IPv4 and IPv6 neighbors......................................................................................................... 222
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor............................................... 224
BGP Regular Expression Optimization........................................................................................................................226
Debugging BGP............................................................................................................................................................. 226
Storing Last and Bad PDUs....................................................................................................................................227
Capturing PDUs....................................................................................................................................................... 228
PDU Counters..........................................................................................................................................................229
9 Content Addressable Memory (CAM)........................................................................................................ 230
CAM Allocation.............................................................................................................................................................. 230
Test CAM Usage............................................................................................................................................................ 232
View CAM Proles.........................................................................................................................................................232
View CAM-ACL Settings.............................................................................................................................................. 233
View CAM Usage...........................................................................................................................................................234
Conguring CAM Threshold and Silence Period........................................................................................................235
Setting CAM Threshold and Silence Period......................................................................................................... 235
CAM Optimization......................................................................................................................................................... 236
Troubleshoot CAM Proling..........................................................................................................................................236
QoS CAM Region Limitation...................................................................................................................................237
Syslog Error When the Table is Full........................................................................................................................237
Syslog Warning Upon 90 Percent Utilization of CAM......................................................................................... 237
Syslog Warning for Discrepancies Between Congured Extended Prexes.................................................... 237
Unied Forwarding Table (UFT) Modes...................................................................................................................... 237
Conguring UFT Modes..........................................................................................................................................238
10 Control Plane Policing (CoPP)................................................................................................................. 239
Congure Control Plane Policing................................................................................................................................. 240
Conguring CoPP for Protocols............................................................................................................................. 241
Conguring CoPP for CPU Queues...................................................................................................................... 243
Displaying CoPP Conguration ............................................................................................................................. 244
11 Data Center Bridging (DCB)......................................................................................................................246
Ethernet Enhancements in Data Center Bridging..................................................................................................... 246
Priority-Based Flow Control....................................................................................................................................247
Enhanced Transmission Selection..........................................................................................................................248
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................249
Contents
8
Data Center Bridging in a Trac Flow.................................................................................................................. 250
Enabling Data Center Bridging.....................................................................................................................................250
DCB Maps and its Attributes.................................................................................................................................. 251
Data Center Bridging: Default Conguration..............................................................................................................252
Conguring Priority-Based Flow Control.................................................................................................................... 252
Conguring Lossless Queues................................................................................................................................. 253
Conguring PFC in a DCB Map................................................................................................................................... 254
PFC Conguration Notes........................................................................................................................................254
PFC Prerequisites and Restrictions.......................................................................................................................255
Applying a DCB Map on a Port....................................................................................................................................256
Conguring PFC without a DCB Map.........................................................................................................................256
Conguring Lossless QueuesExample:..................................................................................................................257
Priority-Based Flow Control Using Dynamic Buer Method....................................................................................258
Pause and Resume of Trac..................................................................................................................................258
Buer Sizes for Lossless or PFC Packets............................................................................................................ 258
Behavior of Tagged Packets.........................................................................................................................................259
Conguration Example for DSCP and PFC Priorities................................................................................................259
SNMP Support for PFC and Buer Statistics Tracking........................................................................................... 260
Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................260
PFC and ETS Conguration Examples........................................................................................................................ 261
Using PFC to Manage Converged Ethernet Trac................................................................................................... 261
Operations on Untagged Packets.................................................................................................................................261
Generation of PFC for a Priority for Untagged Packets...........................................................................................262
Congure Enhanced Transmission Selection..............................................................................................................262
ETS Prerequisites and Restrictions....................................................................................................................... 262
Creating an ETS Priority Group..............................................................................................................................262
ETS Operation with DCBx......................................................................................................................................264
Conguring Bandwidth Allocation for DCBx CIN.................................................................................................264
Conguring ETS in a DCB Map..............................................................................................................................265
Hierarchical Scheduling in ETS Output Policies......................................................................................................... 266
Using ETS to Manage Converged Ethernet Trac................................................................................................... 267
Applying DCB Policies in a Switch Stack.................................................................................................................... 267
Congure a DCBx Operation........................................................................................................................................ 267
DCBx Operation....................................................................................................................................................... 267
DCBx Port Roles......................................................................................................................................................268
DCB Conguration Exchange................................................................................................................................ 269
Conguration Source Election............................................................................................................................... 269
Propagation of DCB Information............................................................................................................................270
Auto-Detection and Manual Conguration of the DCBx Version.......................................................................270
DCBx Example.......................................................................................................................................................... 271
DCBx Prerequisites and Restrictions......................................................................................................................271
Conguring DCBx.....................................................................................................................................................271
Verifying the DCB Conguration..................................................................................................................................275
QoS dot1p Trac Classication and Queue Assignment..........................................................................................283
Conguring the Dynamic Buer Method....................................................................................................................284
Contents
9
Sample DCB Conguration...........................................................................................................................................285
PFC and ETS Conguration Command Examples...............................................................................................287
12 Dynamic Host Conguration Protocol (DHCP).........................................................................................288
DHCP Packet Format and Options............................................................................................................................. 288
Assign an IP Address using DHCP...............................................................................................................................290
Implementation Information.......................................................................................................................................... 291
Congure the System to be a DHCP Server.............................................................................................................. 291
Conguring the Server for Automatic Address Allocation..................................................................................292
Specifying a Default Gateway................................................................................................................................293
Congure a Method of Hostname Resolution..................................................................................................... 293
Using DNS for Address Resolution........................................................................................................................293
Using NetBIOS WINS for Address Resolution..................................................................................................... 294
Creating Manual Binding Entries............................................................................................................................294
Debugging the DHCP Server.................................................................................................................................294
Using DHCP Clear Commands.............................................................................................................................. 295
Congure the System to be a DHCP Client...............................................................................................................295
Conguring the DHCP Client System...................................................................................................................295
DHCP Client on a Management Interface............................................................................................................ 297
DHCP Client Operation with Other Features....................................................................................................... 297
DHCP Relay When DHCP Server and Client are in Dierent VRFs........................................................................ 298
Conguring Route Leaking between VRFs on DHCP Relay Agent................................................................... 298
Congure the System for User Port Stacking (Option 230)................................................................................... 300
Congure Secure DHCP...............................................................................................................................................300
Option 82..................................................................................................................................................................300
DHCP Snooping........................................................................................................................................................301
Drop DHCP Packets on Snooped VLANs Only....................................................................................................305
Dynamic ARP Inspection........................................................................................................................................ 306
Conguring Dynamic ARP Inspection................................................................................................................... 307
Source Address Validation............................................................................................................................................308
Enabling IP Source Address Validation..................................................................................................................308
DHCP MAC Source Address Validation................................................................................................................ 309
Enabling IP+MAC Source Address Validation.......................................................................................................309
Viewing the Number of SAV Dropped Packets.................................................................................................... 310
Clearing the Number of SAV Dropped Packets....................................................................................................310
13 Equal Cost Multi-Path (ECMP)................................................................................................................. 311
ECMP for Flow-Based Anity.......................................................................................................................................311
Conguring the Hash Algorithm..............................................................................................................................311
Enabling Deterministic ECMP Next Hop................................................................................................................311
Conguring the Hash Algorithm Seed................................................................................................................... 312
Link Bundle Monitoring.................................................................................................................................................. 312
Managing ECMP Group Paths................................................................................................................................313
Creating an ECMP Group Bundle...........................................................................................................................313
Modifying the ECMP Group Threshold................................................................................................................. 313
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table.......................................314
10
Contents
Support for ECMP in host table.............................................................................................................................315
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes .........................................................................315
14 FIP Snooping............................................................................................................................................ 316
Fibre Channel over Ethernet.........................................................................................................................................316
Ensure Robustness in a Converged Ethernet Network.............................................................................................316
FIP Snooping on Ethernet Bridges...............................................................................................................................318
FIP Snooping in a Switch Stack...................................................................................................................................320
Using FIP Snooping....................................................................................................................................................... 320
FIP Snooping Prerequisites.....................................................................................................................................320
Important Points to Remember............................................................................................................................. 320
Enabling the FCoE Transit Feature.........................................................................................................................321
Enable FIP Snooping on VLANs.............................................................................................................................322
Congure the FC-MAP Value................................................................................................................................ 322
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 322
Congure a Port for a Bridge-to-FCF Link...........................................................................................................322
Impact on Other Software Features..................................................................................................................... 322
FIP Snooping Restrictions...................................................................................................................................... 323
Conguring FIP Snooping.......................................................................................................................................323
Displaying FIP Snooping Information...........................................................................................................................324
FCoE Transit Conguration Example...........................................................................................................................329
15 Flex Hash and Optimized Boot-Up............................................................................................................ 331
Flex Hash Capability Overview..................................................................................................................................... 331
Conguring the Flex Hash Mechanism........................................................................................................................331
Conguring Fast Boot and LACP Fast Switchover...................................................................................................332
Optimizing the Boot Time.............................................................................................................................................332
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................332
Guidelines for Conguring Optimized Booting Mechanism................................................................................333
Interoperation of Applications with Fast Boot and System States..........................................................................334
LACP and IPv4 Routing.......................................................................................................................................... 334
LACP and IPv6 Routing.......................................................................................................................................... 334
BGP Graceful Restart............................................................................................................................................. 335
Cold Boot Caused by Power Cycling the System................................................................................................335
Unexpected Reload of the System........................................................................................................................335
Software Upgrade................................................................................................................................................... 335
LACP Fast Switchover............................................................................................................................................335
Changes to BGP Multipath.................................................................................................................................... 336
Delayed Installation of ECMP Routes Into BGP...................................................................................................336
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 336
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 337
16 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 338
Protocol Overview.........................................................................................................................................................338
Ring Status...............................................................................................................................................................339
Multiple FRRP Rings............................................................................................................................................... 339
Contents
11
Important FRRP Points...........................................................................................................................................340
Important FRRP Concepts......................................................................................................................................341
Implementing FRRP.......................................................................................................................................................342
FRRP Conguration.......................................................................................................................................................342
Creating the FRRP Group.......................................................................................................................................342
Conguring the Control VLAN...............................................................................................................................343
Conguring and Adding the Member VLANs.......................................................................................................344
Setting the FRRP Timers........................................................................................................................................345
Clearing the FRRP Counters..................................................................................................................................345
Viewing the FRRP Conguration...........................................................................................................................345
Viewing the FRRP Information.............................................................................................................................. 345
Troubleshooting FRRP.................................................................................................................................................. 346
Conguration Checks..............................................................................................................................................346
Sample Conguration and Topology............................................................................................................................ 346
FRRP Support on VLT...................................................................................................................................................347
Example Scenario.................................................................................................................................................... 348
Important Points to Remember............................................................................................................................. 349
17 GARP VLAN Registration Protocol (GVRP)..............................................................................................350
Important Points to Remember................................................................................................................................... 350
Congure GVRP............................................................................................................................................................. 351
Related Conguration Tasks....................................................................................................................................351
Enabling GVRP Globally................................................................................................................................................ 352
Enabling GVRP on a Layer 2 Interface........................................................................................................................352
Congure GVRP Registration...................................................................................................................................... 352
Congure a GARP Timer.............................................................................................................................................. 353
18 Internet Group Management Protocol (IGMP)......................................................................................... 354
IGMP Implementation Information.............................................................................................................................. 354
IGMP Protocol Overview..............................................................................................................................................354
IGMP Version 2........................................................................................................................................................354
IGMP Version 3........................................................................................................................................................356
Congure IGMP.............................................................................................................................................................359
Related Conguration Tasks...................................................................................................................................359
Viewing IGMP Enabled Interfaces...............................................................................................................................360
Selecting an IGMP Version...........................................................................................................................................360
Viewing IGMP Groups....................................................................................................................................................361
Adjusting Timers............................................................................................................................................................. 361
Adjusting Query and Response Timers..................................................................................................................361
Enabling IGMP Immediate-Leave.................................................................................................................................362
IGMP Snooping..............................................................................................................................................................363
IGMP Snooping Implementation Information....................................................................................................... 363
Conguring IGMP Snooping...................................................................................................................................363
Removing a Group-Port Association.....................................................................................................................364
Disabling Multicast Flooding...................................................................................................................................364
Specifying a Port as Connected to a Multicast Router...................................................................................... 364
12
Contents
Conguring the Switch as Querier........................................................................................................................365
Fast Convergence after MSTP Topology Changes................................................................................................... 365
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................365
Protocol Separation................................................................................................................................................. 366
Enabling and Disabling Management Egress Interface Selection...................................................................... 367
Handling of Management Route Conguration................................................................................................... 368
Handling of Switch-Initiated Trac....................................................................................................................... 368
Handling of Switch-Destined Trac......................................................................................................................369
Handling of Transit Trac (Trac Separation).....................................................................................................370
Mapping of Management Applications and Trac Type.....................................................................................370
Behavior of Various Applications for Switch-Initiated Trac ............................................................................. 371
Behavior of Various Applications for Switch-Destined Trac ...........................................................................372
Interworking of EIS With Various Applications..................................................................................................... 372
Designating a Multicast Router Interface................................................................................................................... 373
19 Interfaces................................................................................................................................................. 374
Basic Interface Conguration....................................................................................................................................... 374
Advanced Interface Conguration............................................................................................................................... 374
Interface Types............................................................................................................................................................... 375
View Basic Interface Information.................................................................................................................................375
Resetting an Interface to its Factory Default State................................................................................................... 377
Enabling a Physical Interface........................................................................................................................................378
Physical Interfaces.........................................................................................................................................................378
Conguration Task List for Physical Interfaces.................................................................................................... 378
40G to 1G Breakout Cable Adaptor....................................................................................................................... 378
Overview of Layer Modes.......................................................................................................................................379
Conguring Layer 2 (Data Link) Mode..................................................................................................................380
Conguring Layer 2 (Interface) Mode.................................................................................................................. 380
Conguring Layer 3 (Network) Mode...................................................................................................................380
Conguring Layer 3 (Interface) Mode................................................................................................................... 381
Automatic recovery of an Err-disabled interface.......................................................................................................382
Conguring an automatic recovery for an Err-disabled interface......................................................................382
Egress Interface Selection (EIS).................................................................................................................................. 383
Important Points to Remember............................................................................................................................. 383
Conguring EIS........................................................................................................................................................ 383
Management Interfaces................................................................................................................................................384
Conguring Management Interfaces.....................................................................................................................384
Conguring a Management Interface on an Ethernet Port............................................................................... 385
VLAN Interfaces............................................................................................................................................................ 386
Loopback Interfaces...................................................................................................................................................... 387
Null Interfaces.................................................................................................................................................................387
Port Channel Interfaces................................................................................................................................................ 387
Port Channel Denition and Standards.................................................................................................................388
Port Channel Benets.............................................................................................................................................388
Port Channel Implementation.................................................................................................................................388
Interfaces in Port Channels.................................................................................................................................... 389
Contents
13
Conguration Tasks for Port Channel Interfaces.................................................................................................389
Creating a Port Channel......................................................................................................................................... 389
Adding a Physical Interface to a Port Channel.....................................................................................................390
Reassigning an Interface to a New Port Channel.................................................................................................391
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 392
Adding or Removing a Port Channel from a VLAN............................................................................................. 392
Assigning an IP Address to a Port Channel.......................................................................................................... 394
Deleting or Disabling a Port Channel.....................................................................................................................394
Load Balancing Through Port Channels................................................................................................................394
Changing the Hash Algorithm................................................................................................................................394
Bulk Conguration.........................................................................................................................................................396
Interface Range....................................................................................................................................................... 396
Bulk Conguration Examples..................................................................................................................................396
Dening Interface Range Macros................................................................................................................................ 398
Dene the Interface Range.................................................................................................................................... 398
Choosing an Interface-Range Macro.................................................................................................................... 398
Monitoring and Maintaining Interfaces....................................................................................................................... 398
Maintenance Using TDR.........................................................................................................................................399
Non Dell-Qualied Transceivers...................................................................................................................................400
Splitting 40G Ports without Reload............................................................................................................................ 400
Splitting QSFP Ports to SFP+ Ports........................................................................................................................... 402
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..................................................................................403
Important Points to Remember............................................................................................................................. 403
Example Scenarios.................................................................................................................................................. 404
Link Dampening............................................................................................................................................................. 405
Important Points to Remember............................................................................................................................. 405
Conguration Example of Link Dampening.......................................................................................................... 406
Enabling Link Dampening........................................................................................................................................408
Link Bundle Monitoring................................................................................................................................................. 409
Using Ethernet Pause Frames for Flow Control.........................................................................................................410
Enabling Pause Frames............................................................................................................................................410
Congure the MTU Size on an Interface..................................................................................................................... 411
Port-Pipes........................................................................................................................................................................412
Auto-Negotiation on Ethernet Interfaces....................................................................................................................412
Setting the Speed of Ethernet Interfaces.............................................................................................................412
Set Auto-Negotiation Options................................................................................................................................ 414
View Advanced Interface Information..........................................................................................................................414
Conguring the Interface Sampling Size............................................................................................................... 415
Conguring the Trac Sampling Size Globally........................................................................................................... 416
Dynamic Counters..........................................................................................................................................................418
Clearing Interface Counters.................................................................................................................................... 418
Compressing Conguration Files..................................................................................................................................419
Discard Counters............................................................................................................................................................ 421
Display discard counters......................................................................................................................................... 422
20 IPv4 Routing............................................................................................................................................424
14
Contents
IP Addresses...................................................................................................................................................................425
Implementation Information....................................................................................................................................425
Conguration Tasks for IP Addresses..........................................................................................................................425
Assigning IP Addresses to an Interface.......................................................................................................................425
Conguring Static Routes.............................................................................................................................................426
Congure Static Routes for the Management Interface.......................................................................................... 427
IPv4 Path MTU Discovery Overview.......................................................................................................................... 428
Packet handling during MTU mismatch................................................................................................................428
Using the Congured Source IP Address in ICMP Messages..................................................................................428
Conguring the ICMP Source Interface............................................................................................................... 428
Conguring the Duration to Establish a TCP Connection........................................................................................ 429
Enabling Directed Broadcast........................................................................................................................................ 429
Resolution of Host Names............................................................................................................................................429
Enabling Dynamic Resolution of Host Names............................................................................................................430
Specifying the Local System Domain and a List of Domains................................................................................... 430
Conguring DNS with Traceroute................................................................................................................................ 431
ARP.................................................................................................................................................................................. 431
Conguration Tasks for ARP........................................................................................................................................ 432
Conguring Static ARP Entries....................................................................................................................................432
Enabling Proxy ARP.......................................................................................................................................................432
Clearing ARP Cache...................................................................................................................................................... 433
ARP Learning via Gratuitous ARP................................................................................................................................433
Enabling ARP Learning via Gratuitous ARP................................................................................................................ 433
ARP Learning via ARP Request................................................................................................................................... 433
Conguring ARP Retries...............................................................................................................................................434
ICMP............................................................................................................................................................................... 435
Conguration Tasks for ICMP...................................................................................................................................... 435
Enabling ICMP Unreachable Messages...................................................................................................................... 435
UDP Helper.....................................................................................................................................................................435
Congure UDP Helper.............................................................................................................................................435
Important Points to Remember............................................................................................................................. 436
Enabling UDP Helper.....................................................................................................................................................436
Congurations Using UDP Helper............................................................................................................................... 436
UDP Helper with Broadcast-All Addresses.................................................................................................................436
UDP Helper with Subnet Broadcast Addresses......................................................................................................... 437
UDP Helper with Congured Broadcast Addresses.................................................................................................. 437
UDP Helper with No Congured Broadcast Addresses............................................................................................438
Troubleshooting UDP Helper........................................................................................................................................438
21 IPv6 Routing............................................................................................................................................ 439
Protocol Overview.........................................................................................................................................................439
Extended Address Space........................................................................................................................................440
Stateless Autoconguration................................................................................................................................... 440
IPv6 Headers............................................................................................................................................................440
Longest Prex Match (LPM) Table and IPv6 /65 – /128 support.................................................................... 441
IPv6 Header Fields...................................................................................................................................................442
Contents
15
Extension Header Fields..........................................................................................................................................444
Addressing................................................................................................................................................................445
Implementing IPv6 with Dell EMC Networking OS...................................................................................................446
ICMPv6........................................................................................................................................................................... 447
Path MTU discovery......................................................................................................................................................448
IPv6 Neighbor Discovery.............................................................................................................................................. 448
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................449
Conguring the IPv6 Recursive DNS Server....................................................................................................... 449
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................450
Displaying IPv6 RDNSS Information......................................................................................................................450
Secure Shell (SSH) Over an IPv6 Transport............................................................................................................... 451
Conguration Tasks for IPv6......................................................................................................................................... 451
Adjusting Your CAM-Prole.....................................................................................................................................451
Assigning an IPv6 Address to an Interface...........................................................................................................452
Assigning a Static IPv6 Route................................................................................................................................453
Conguring Telnet with IPv6..................................................................................................................................453
SNMP over IPv6......................................................................................................................................................454
Displaying IPv6 Information....................................................................................................................................454
Displaying an IPv6 Interface Information.............................................................................................................. 454
Showing IPv6 Routes..............................................................................................................................................455
Showing the Running-Conguration for an Interface.........................................................................................456
Clearing IPv6 Routes...............................................................................................................................................457
Disabling ND Entry Timeout................................................................................................................................... 457
Conguring IPv6 RA Guard.......................................................................................................................................... 457
Conguring IPv6 RA Guard on an Interface.........................................................................................................459
Monitoring IPv6 RA Guard..................................................................................................................................... 460
22 iSCSI Optimization................................................................................................................................... 461
iSCSI Optimization Overview........................................................................................................................................461
Monitoring iSCSI Trac Flows...............................................................................................................................463
Application of Quality of Service to iSCSI Trac Flows..................................................................................... 463
Information Monitored in iSCSI Trac Flows.......................................................................................................463
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 464
Conguring Detection and Ports for Dell Compellent Arrays............................................................................. 464
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................465
Enable and Disable iSCSI Optimization.................................................................................................................465
Default iSCSI Optimization Values...............................................................................................................................466
iSCSI Optimization Prerequisites................................................................................................................................. 466
Conguring iSCSI Optimization................................................................................................................................... 466
Displaying iSCSI Optimization Information................................................................................................................. 468
23 Intermediate System to Intermediate System...........................................................................................470
IS-IS Protocol Overview................................................................................................................................................470
IS-IS Addressing.............................................................................................................................................................470
Multi-Topology IS-IS....................................................................................................................................................... 471
Transition Mode........................................................................................................................................................ 471
16
Contents
Interface Support.....................................................................................................................................................472
Adjacencies...............................................................................................................................................................472
Graceful Restart.............................................................................................................................................................472
Timers........................................................................................................................................................................472
Implementation Information..........................................................................................................................................472
Conguration Information............................................................................................................................................. 473
Conguration Tasks for IS-IS.................................................................................................................................. 474
Conguring the Distance of a Route......................................................................................................................481
Changing the IS-Type.............................................................................................................................................. 482
Redistributing IPv4 Routes.....................................................................................................................................484
Redistributing IPv6 Routes.....................................................................................................................................485
Conguring Authentication Passwords.................................................................................................................486
Setting the Overload Bit.........................................................................................................................................486
Debugging IS-IS....................................................................................................................................................... 487
IS-IS Metric Styles.........................................................................................................................................................488
Congure Metric Values............................................................................................................................................... 488
Maximum Values in the Routing Table.................................................................................................................. 488
Change the IS-IS Metric Style in One Level Only................................................................................................488
Leaks from One Level to Another..........................................................................................................................490
Sample Congurations...................................................................................................................................................491
24 Link Aggregation Control Protocol (LACP).............................................................................................. 493
Introduction to Dynamic LAGs and LACP.................................................................................................................. 493
Important Points to Remember............................................................................................................................. 493
LACP Modes............................................................................................................................................................ 494
Conguring LACP Commands............................................................................................................................... 494
LACP Conguration Tasks............................................................................................................................................ 495
Creating a LAG.........................................................................................................................................................495
Conguring the LAG Interfaces as Dynamic........................................................................................................495
Setting the LACP Long Timeout........................................................................................................................... 496
Monitoring and Debugging LACP..........................................................................................................................496
Shared LAG State Tracking...........................................................................................................................................497
Conguring Shared LAG State Tracking............................................................................................................... 497
Important Points about Shared LAG State Tracking...........................................................................................499
LACP Basic Conguration Example............................................................................................................................ 499
Congure a LAG on ALPHA...................................................................................................................................499
25 Layer 2.................................................................................................................................................... 508
Manage the MAC Address Table................................................................................................................................. 508
Clearing the MAC Address Table........................................................................................................................... 508
Setting the Aging Time for Dynamic Entries........................................................................................................508
Conguring a Static MAC Address........................................................................................................................509
Displaying the MAC Address Table........................................................................................................................509
MAC Learning Limit.......................................................................................................................................................509
Setting the MAC Learning Limit............................................................................................................................. 510
mac learning-limit Dynamic..................................................................................................................................... 510
Contents
17
mac learning-limit mac-address-sticky..................................................................................................................510
mac learning-limit station-move..............................................................................................................................511
mac learning-limit no-station-move........................................................................................................................511
Learning Limit Violation Actions...............................................................................................................................511
Setting Station Move Violation Actions.................................................................................................................512
Recovering from Learning Limit and Station Move Violations............................................................................512
NIC Teaming....................................................................................................................................................................513
Congure Redundant Pairs........................................................................................................................................... 514
Important Points about Conguring Redundant Pairs.........................................................................................516
Far-End Failure Detection.............................................................................................................................................. 517
FEFD State Changes................................................................................................................................................518
Conguring FEFD.....................................................................................................................................................519
Enabling FEFD on an Interface............................................................................................................................... 519
Debugging FEFD......................................................................................................................................................520
26 Link Layer Discovery Protocol (LLDP)..................................................................................................... 522
802.1AB (LLDP) Overview............................................................................................................................................522
Protocol Data Units................................................................................................................................................. 522
Optional TLVs.................................................................................................................................................................523
Management TLVs...................................................................................................................................................523
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 525
TIA Organizationally Specic TLVs........................................................................................................................ 525
Congure LLDP............................................................................................................................................................. 529
Related Conguration Tasks...................................................................................................................................529
Important Points to Remember............................................................................................................................. 529
LLDP Compatibility..................................................................................................................................................530
CONFIGURATION versus INTERFACE Congurations............................................................................................530
Enabling LLDP................................................................................................................................................................530
Disabling and Undoing LLDP...................................................................................................................................531
Enabling LLDP on Management Ports.........................................................................................................................531
Disabling and Undoing LLDP on Management Ports...........................................................................................531
Advertising TLVs.............................................................................................................................................................531
Storing and Viewing Unrecognized LLDP TLVs......................................................................................................... 533
Reserved Unrecognized LLDP TLVs..................................................................................................................... 533
Organizational Specic Unrecognized LLDP TLVs.............................................................................................. 533
Viewing Unrecognized LLDP TLVs........................................................................................................................533
Viewing the LLDP Conguration................................................................................................................................. 534
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................534
Examples of Viewing Information Advertised by Neighbors...............................................................................534
Conguring LLDPDU Intervals.....................................................................................................................................536
Conguring LLDP Notication Interval....................................................................................................................... 537
Conguring LLDP Notication Interval....................................................................................................................... 537
Conguring Transmit and Receive Mode....................................................................................................................537
Conguring the Time to Live Value............................................................................................................................. 538
Debugging LLDP............................................................................................................................................................539
Relevant Management Objects................................................................................................................................... 540
18
Contents
27 Microsoft Network Load Balancing.......................................................................................................... 545
NLB Unicast Mode Scenario........................................................................................................................................545
NLB Multicast Mode Scenario.....................................................................................................................................545
Limitations of the NLB Feature....................................................................................................................................546
Microsoft Clustering......................................................................................................................................................546
Enable and Disable VLAN Flooding ............................................................................................................................ 546
Conguring a Switch for NLB .....................................................................................................................................546
Enabling a Switch for Multicast NLB.................................................................................................................... 547
28 Multicast Source Discovery Protocol (MSDP)......................................................................................... 548
Protocol Overview.........................................................................................................................................................548
Anycast RP.....................................................................................................................................................................549
Implementation Information......................................................................................................................................... 550
Congure Multicast Source Discovery Protocol........................................................................................................550
Related Conguration Tasks...................................................................................................................................550
Enable MSDP.................................................................................................................................................................554
Manage the Source-Active Cache..............................................................................................................................555
Viewing the Source-Active Cache........................................................................................................................ 555
Limiting the Source-Active Cache........................................................................................................................ 555
Clearing the Source-Active Cache........................................................................................................................556
Enabling the Rejected Source-Active Cache.......................................................................................................556
Accept Source-Active Messages that Fail the RFP Check..................................................................................... 556
Specifying Source-Active Messages...........................................................................................................................559
Limiting the Source-Active Messages from a Peer...................................................................................................560
Preventing MSDP from Caching a Local Source.......................................................................................................560
Preventing MSDP from Caching a Remote Source...................................................................................................561
Preventing MSDP from Advertising a Local Source.................................................................................................. 561
Logging Changes in Peership States...........................................................................................................................562
Terminating a Peership..................................................................................................................................................562
Clearing Peer Statistics.................................................................................................................................................563
Debugging MSDP..........................................................................................................................................................563
MSDP with Anycast RP................................................................................................................................................564
Conguring Anycast RP............................................................................................................................................... 565
Reducing Source-Active Message Flooding........................................................................................................ 566
Specifying the RP Address Used in SA Messages..............................................................................................566
MSDP Sample Congurations..................................................................................................................................... 568
32 Multicast Listener Discovery Protocol...................................................................................................... 571
MLD Version 1.................................................................................................................................................................571
MLD Querier Router.......................................................................................................................................................571
Joining a Multicast Group.............................................................................................................................................572
Leaving a Multicast Group............................................................................................................................................ 572
MLD version 2................................................................................................................................................................ 572
MLD timers..................................................................................................................................................................... 574
Reducing Host Response Burstiness.................................................................................................................... 575
Contents
19
Clearing MLD groups.....................................................................................................................................................575
Debugging MLD............................................................................................................................................................. 575
Explicit Tracking............................................................................................................................................................. 575
Reducing Leave Latency...............................................................................................................................................575
Displaying MLD groups table........................................................................................................................................576
Displaying MLD Interfaces............................................................................................................................................ 576
30 Multiple Spanning Tree Protocol (MSTP)................................................................................................. 577
Protocol Overview......................................................................................................................................................... 577
Spanning Tree Variations...............................................................................................................................................578
Implementation Information....................................................................................................................................578
Congure Multiple Spanning Tree Protocol................................................................................................................ 578
Related Conguration Tasks................................................................................................................................... 579
Enable Multiple Spanning Tree Globally.......................................................................................................................579
Adding and Removing Interfaces................................................................................................................................. 579
Creating Multiple Spanning Tree Instances................................................................................................................580
Inuencing MSTP Root Selection................................................................................................................................ 581
Interoperate with Non-Dell Bridges............................................................................................................................. 582
Changing the Region Name or Revision.....................................................................................................................582
Modifying Global Parameters....................................................................................................................................... 582
Modifying the Interface Parameters........................................................................................................................... 584
Conguring an EdgePort..............................................................................................................................................585
Flush MAC Addresses after a Topology Change....................................................................................................... 585
MSTP Sample Congurations......................................................................................................................................586
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................586
Debugging and Verifying MSTP Congurations........................................................................................................590
31 Multicast Features....................................................................................................................................592
Enabling IP Multicast.....................................................................................................................................................592
Implementation Information..........................................................................................................................................592
Multicast Policies...........................................................................................................................................................593
IPv4 Multicast Policies............................................................................................................................................ 593
Understanding Multicast Traceroute (mtrace)..........................................................................................................600
Important Points to Remember.............................................................................................................................. 601
Printing Multicast Traceroute (mtrace) Paths............................................................................................................601
Supported Error Codes.................................................................................................................................................602
mtrace Scenarios...........................................................................................................................................................603
32 Multicast Listener Discovery Protocol..................................................................................................... 609
MLD Version 1................................................................................................................................................................609
MLD Querier Router......................................................................................................................................................609
Joining a Multicast Group..............................................................................................................................................610
Leaving a Multicast Group............................................................................................................................................ 610
MLD version 2.................................................................................................................................................................610
MLD timers......................................................................................................................................................................612
20
Contents
Reducing Host Response Burstiness.....................................................................................................................613
Clearing MLD groups..................................................................................................................................................... 613
Debugging MLD..............................................................................................................................................................613
Explicit Tracking.............................................................................................................................................................. 613
Reducing Leave Latency................................................................................................................................................613
Displaying MLD groups table.........................................................................................................................................614
Displaying MLD Interfaces.............................................................................................................................................614
MLD Snooping................................................................................................................................................................ 614
Enable MLD Snooping............................................................................................................................................. 614
Disable MLD Snooping.............................................................................................................................................615
Congure the switch as a querier.......................................................................................................................... 615
Specify port as connected to multicast router..................................................................................................... 615
Enable Snooping Explicit Tracking..........................................................................................................................616
Display the MLD Snooping Table............................................................................................................................616
33 Object Tracking........................................................................................................................................ 617
Object Tracking Overview............................................................................................................................................. 617
Track Layer 2 Interfaces.......................................................................................................................................... 618
Track Layer 3 Interfaces.......................................................................................................................................... 618
Track IPv4 and IPv6 Routes....................................................................................................................................619
Set Tracking Delays................................................................................................................................................. 620
VRRP Object Tracking............................................................................................................................................ 620
Object Tracking Conguration..................................................................................................................................... 620
Tracking a Layer 2 Interface................................................................................................................................... 620
Tracking a Layer 3 Interface....................................................................................................................................621
Track an IPv4/IPv6 Route...................................................................................................................................... 623
Displaying Tracked Objects...........................................................................................................................................626
34 Open Shortest Path First (OSPFv2 and OSPFv3)....................................................................................628
Protocol Overview.........................................................................................................................................................628
Autonomous System (AS) Areas........................................................................................................................... 628
Area Types................................................................................................................................................................ 629
Networks and Neighbors........................................................................................................................................630
Router Types............................................................................................................................................................ 630
Designated and Backup Designated Routers.......................................................................................................632
Link-State Advertisements (LSAs)........................................................................................................................632
Router Priority and Cost.........................................................................................................................................633
OSPF with Dell EMC Networking OS.........................................................................................................................634
Graceful Restart...................................................................................................................................................... 635
Fast Convergence (OSPFv2, IPv4 Only)..............................................................................................................636
Multi-Process OSPFv2 with VRF..........................................................................................................................636
RFC-2328 Compliant OSPF Flooding................................................................................................................... 636
OSPF ACK Packing..................................................................................................................................................637
Setting OSPF Adjacency with Cisco Routers.......................................................................................................637
Conguration Information.............................................................................................................................................638
Conguration Task List for OSPFv2 (OSPF for IPv4)........................................................................................ 638
Contents
21
OSPFv3 NSSA...............................................................................................................................................................652
NSSA Options.......................................................................................................................................................... 652
Conguration Task List for OSPFv3 (OSPF for IPv6).............................................................................................. 653
Enabling IPv6 Unicast Routing...............................................................................................................................653
Applying cost for OSPFv3......................................................................................................................................654
Assigning IPv6 Addresses on an Interface........................................................................................................... 654
Assigning Area ID on an Interface..........................................................................................................................654
Assigning OSPFv3 Process ID and Router ID Globally........................................................................................655
Assigning OSPFv3 Process ID and Router ID to a VRF......................................................................................655
Conguring Stub Areas...........................................................................................................................................656
Conguring Passive-Interface................................................................................................................................656
Redistributing Routes..............................................................................................................................................656
Conguring a Default Route................................................................................................................................... 657
Enabling OSPFv3 Graceful Restart....................................................................................................................... 657
OSPFv3 Authentication Using IPsec.....................................................................................................................659
Troubleshooting OSPFv3........................................................................................................................................665
35 Policy-based Routing (PBR).................................................................................................................... 667
Overview.........................................................................................................................................................................667
Implementing PBR.........................................................................................................................................................668
Conguration Task List for Policy-based Routing......................................................................................................668
PBR Exceptions (Permit)....................................................................................................................................... 669
Create a Redirect List............................................................................................................................................. 669
Create a Rule for a Redirect-list.............................................................................................................................669
Apply a Redirect-list to an Interface using a Redirect-group.............................................................................. 671
Sample Conguration....................................................................................................................................................673
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View Redirect-List GOLD...... 674
36 PIM Sparse-Mode (PIM-SM).................................................................................................................. 678
Implementation Information..........................................................................................................................................678
Protocol Overview......................................................................................................................................................... 678
Requesting Multicast Trac...................................................................................................................................678
Refuse Multicast Trac.......................................................................................................................................... 679
Send Multicast Trac............................................................................................................................................. 679
Conguring PIM-SM..................................................................................................................................................... 679
Related Conguration Tasks...................................................................................................................................680
Enable PIM-SM..............................................................................................................................................................680
Conguring S,G Expiry Timers..................................................................................................................................... 682
Conguring a Static Rendezvous Point...................................................................................................................... 682
Overriding Bootstrap Router Updates.................................................................................................................. 683
Conguring a Designated Router.................................................................................................................................683
Creating Multicast Boundaries and Domains............................................................................................................. 685
37 PIM Source-Specic Mode (PIM-SSM).................................................................................................. 686
Implementation Information......................................................................................................................................... 686
Important Points to Remember............................................................................................................................. 686
22
Contents
Congure PIM-SSM......................................................................................................................................................687
Related Conguration Tasks................................................................................................................................... 687
Enabling PIM-SSM........................................................................................................................................................ 687
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................ 687
Conguring PIM-SSM with IGMPv2.....................................................................................................................688
Electing an RP using the BSR Mechanism.................................................................................................................689
Enabling RP to Server Specic Multicast Groups...............................................................................................689
38 Port Monitoring........................................................................................................................................691
Important Points to Remember.................................................................................................................................... 691
Port Monitoring..............................................................................................................................................................692
Conguring Port Monitoring........................................................................................................................................ 693
Conguring Monitor Multicast Queue........................................................................................................................ 694
Enabling Flow-Based Monitoring.................................................................................................................................695
Remote Port Mirroring.................................................................................................................................................. 696
Remote Port Mirroring Example............................................................................................................................ 696
Conguring Remote Port Mirroring.......................................................................................................................697
Displaying Remote-Port Mirroring Congurations...............................................................................................699
Conguring the Sample Remote Port Mirroring..................................................................................................699
Encapsulated Remote Port Monitoring.......................................................................................................................702
ERPM Behavior on a typical Dell EMC Networking OS ...........................................................................................704
Decapsulation of ERPM packets at the Destination IP/ Analyzer..................................................................... 704
Port Monitoring on VLT.................................................................................................................................................705
VLT Non-fail over Scenario.....................................................................................................................................705
VLT Fail-over Scenario............................................................................................................................................ 706
RPM over VLT Scenarios........................................................................................................................................706
39 Per-VLAN Spanning Tree Plus (PVST+)................................................................................................... 708
Protocol Overview......................................................................................................................................................... 708
Implementation Information..........................................................................................................................................709
Congure Per-VLAN Spanning Tree Plus....................................................................................................................709
Related Conguration Tasks................................................................................................................................... 709
Enabling PVST+............................................................................................................................................................. 709
Disabling PVST+............................................................................................................................................................. 710
Inuencing PVST+ Root Selection............................................................................................................................... 710
Modifying Global PVST+ Parameters...........................................................................................................................712
Modifying Interface PVST+ Parameters...................................................................................................................... 713
Conguring an EdgePort............................................................................................................................................... 714
PVST+ in Multi-Vendor Networks................................................................................................................................ 714
Enabling PVST+ Extend System ID.............................................................................................................................. 714
PVST+ Sample Congurations......................................................................................................................................715
40 Quality of Service (QoS).......................................................................................................................... 718
Implementation Information..........................................................................................................................................720
Port-Based QoS Congurations.................................................................................................................................. 720
Setting dot1p Priorities for Incoming Trac......................................................................................................... 720
Contents
23
Honoring dot1p Priorities on Ingress Trac...........................................................................................................721
Conguring Port-Based Rate Policing...................................................................................................................722
Conguring Port-Based Rate Shaping.................................................................................................................. 722
Policy-Based QoS Congurations................................................................................................................................ 723
Classify Trac.......................................................................................................................................................... 723
Dot1p to Queue Mapping Requirement................................................................................................................. 727
Create a QoS Policy................................................................................................................................................. 727
DSCP Color Maps....................................................................................................................................................730
Create Policy Maps.................................................................................................................................................. 732
Enabling QoS Rate Adjustment....................................................................................................................................735
Enabling Strict-Priority Queueing................................................................................................................................ 736
Queue Classication Requirements for PFC Functionality.......................................................................................736
Support for marking dot1p value in L3 Input Qos Policy...........................................................................................736
Weighted Random Early Detection.............................................................................................................................. 737
Creating WRED Proles.......................................................................................................................................... 738
Applying a WRED Prole to Trac........................................................................................................................ 738
Displaying Default and Congured WRED Proles.............................................................................................. 739
Displaying WRED Drop Statistics...........................................................................................................................739
Displaying egress–queue Statistics....................................................................................................................... 739
Pre-Calculating Available QoS CAM Space................................................................................................................ 740
Specifying Policy-Based Rate Shaping in Packets Per Second................................................................................ 741
Conguring Policy-Based Rate Shaping...................................................................................................................... 741
Conguring Weights and ECN for WRED ..................................................................................................................742
Global Service Pools With WRED and ECN Settings..........................................................................................742
Conguring WRED and ECN Attributes......................................................................................................................743
Guidelines for Conguring ECN for Classifying and Color-Marking Packets......................................................... 744
Sample conguration to mark non-ecn packets as “yellow” with Multiple trac class.................................. 745
Classifying Incoming Packets Using ECN and Color-Marking............................................................................745
Sample conguration to mark non-ecn packets as “yellow” with single trac class...................................... 747
Applying Layer 2 Match Criteria on a Layer 3 Interface............................................................................................748
Managing Hardware Buer Statistics....................................................................................................................748
Enabling Buer Statistics Tracking ............................................................................................................................. 749
41 Routing Information Protocol (RIP).......................................................................................................... 752
Protocol Overview......................................................................................................................................................... 752
RIPv1..........................................................................................................................................................................752
RIPv2.........................................................................................................................................................................752
Implementation Information..........................................................................................................................................753
Conguration Information.............................................................................................................................................753
Conguration Task List............................................................................................................................................753
RIP Conguration Example.....................................................................................................................................760
42 Remote Monitoring (RMON)................................................................................................................... 765
Implementation Information..........................................................................................................................................765
Fault Recovery...............................................................................................................................................................765
Setting the RMON Alarm........................................................................................................................................766
24
Contents
Conguring an RMON Event................................................................................................................................. 766
Conguring RMON Collection Statistics...............................................................................................................767
Conguring the RMON Collection History............................................................................................................767
43 Rapid Spanning Tree Protocol (RSTP)..................................................................................................... 769
Protocol Overview......................................................................................................................................................... 769
Conguring Rapid Spanning Tree.................................................................................................................................769
Related Conguration Tasks................................................................................................................................... 769
Important Points to Remember....................................................................................................................................769
RSTP and VLT.......................................................................................................................................................... 770
Conguring Interfaces for Layer 2 Mode.................................................................................................................... 770
Enabling Rapid Spanning Tree Protocol Globally.........................................................................................................771
Adding and Removing Interfaces................................................................................................................................. 773
Modifying Global Parameters........................................................................................................................................773
Enabling SNMP Traps for Root Elections and Topology Changes..................................................................... 775
Modifying Interface Parameters...................................................................................................................................775
Enabling SNMP Traps for Root Elections and Topology Changes........................................................................... 775
Inuencing RSTP Root Selection.................................................................................................................................775
Conguring an EdgePort...............................................................................................................................................776
Conguring Fast Hellos for Link State Detection.......................................................................................................777
44 Software-Dened Networking (SDN)...................................................................................................... 778
45 Security................................................................................................................................................... 779
AAA Accounting............................................................................................................................................................. 779
Conguration Task List for AAA Accounting........................................................................................................ 779
AAA Authentication........................................................................................................................................................ 781
Conguration Task List for AAA Authentication...................................................................................................782
Obscuring Passwords and Keys...................................................................................................................................785
AAA Authorization......................................................................................................................................................... 785
Privilege Levels Overview.......................................................................................................................................785
Conguration Task List for Privilege Levels..........................................................................................................786
RADIUS........................................................................................................................................................................... 790
RADIUS Authentication...........................................................................................................................................790
Conguration Task List for RADIUS....................................................................................................................... 791
Support for Change of Authorization and Disconnect Messages packets...................................................... 795
TACACS+........................................................................................................................................................................806
Conguration Task List for TACACS+................................................................................................................... 806
TACACS+ Remote Authentication........................................................................................................................ 808
Command Authorization.........................................................................................................................................809
Protection from TCP Tiny and Overlapping Fragment Attacks............................................................................... 809
Enabling SCP and SSH................................................................................................................................................. 809
Using SCP with SSH to Copy a Software Image................................................................................................. 810
Removing the RSA Host Keys and Zeroizing Storage .........................................................................................811
Conguring When to Re-generate an SSH Key ...................................................................................................811
Conguring the SSH Server Key Exchange Algorithm........................................................................................812
Contents
25
Conguring the HMAC Algorithm for the SSH Server........................................................................................812
Conguring the SSH Server Cipher List................................................................................................................813
Conguring DNS in the SSH Server...................................................................................................................... 813
Secure Shell Authentication....................................................................................................................................814
Troubleshooting SSH................................................................................................................................................816
Telnet................................................................................................................................................................................816
VTY Line and Access-Class Conguration.................................................................................................................. 817
VTY Line Local Authentication and Authorization................................................................................................ 817
VTY Line Remote Authentication and Authorization........................................................................................... 818
VTY MAC-SA Filter Support...................................................................................................................................818
Role-Based Access Control...........................................................................................................................................818
Overview of RBAC...................................................................................................................................................819
User Roles................................................................................................................................................................. 821
AAA Authentication and Authorization for Roles.................................................................................................824
Role Accounting....................................................................................................................................................... 827
Display Information About User Roles...................................................................................................................828
Two Factor Authentication (2FA)................................................................................................................................ 829
Handling Access-Challenge Message................................................................................................................... 829
Conguring Challenge Response Authentication for SSHv2............................................................................. 829
SMS-OTP Mechanism............................................................................................................................................830
Conguring the System to Drop Certain ICMP Reply Messages............................................................................830
Dell EMC Networking OS Security Hardening...........................................................................................................832
Dell EMC Networking OS Image Verication.......................................................................................................832
Startup Conguration Verication......................................................................................................................... 833
Conguring the root User Password.....................................................................................................................834
Locking Access to GRUB Interface.......................................................................................................................835
Enabling User Lockout for Failed Login Attempts............................................................................................... 836
46 Service Provider Bridging........................................................................................................................ 837
VLAN Stacking............................................................................................................................................................... 837
Important Points to Remember............................................................................................................................. 838
Congure VLAN Stacking.......................................................................................................................................838
Creating Access and Trunk Ports.......................................................................................................................... 839
Enable VLAN-Stacking for a VLAN.......................................................................................................................840
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 840
Conguring Dell EMC Networking OS Options for Trunk Ports........................................................................ 840
Debugging VLAN Stacking......................................................................................................................................841
VLAN Stacking in Multi-Vendor Networks........................................................................................................... 842
VLAN Stacking Packet Drop Precedence.................................................................................................................. 845
Enabling Drop Eligibility........................................................................................................................................... 845
Honoring the Incoming DEI Value..........................................................................................................................846
Marking Egress Packets with a DEI Value............................................................................................................ 847
Dynamic Mode CoS for VLAN Stacking..................................................................................................................... 847
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................848
Layer 2 Protocol Tunneling........................................................................................................................................... 849
Implementation Information.................................................................................................................................... 851
26
Contents
Enabling Layer 2 Protocol Tunneling...................................................................................................................... 851
Specifying a Destination MAC Address for BPDUs.............................................................................................852
Setting Rate-Limit BPDUs......................................................................................................................................852
Debugging Layer 2 Protocol Tunneling..................................................................................................................853
Provider Backbone Bridging.........................................................................................................................................853
47 sFlow....................................................................................................................................................... 854
Overview.........................................................................................................................................................................854
Implementation Information..........................................................................................................................................854
Important Points to Remember............................................................................................................................. 855
Enabling Extended sFlow..............................................................................................................................................855
Enabling and Disabling sFlow on an Interface............................................................................................................856
Enabling sFlow Max-Header Size Extended.............................................................................................................. 856
sFlow Show Commands............................................................................................................................................... 857
Displaying Show sFlow Global................................................................................................................................857
Displaying Show sFlow on an Interface................................................................................................................ 858
Displaying Show sFlow on a Stack-unit................................................................................................................ 858
Conguring Specify Collectors.................................................................................................................................... 859
Changing the Polling Intervals......................................................................................................................................859
Back-O Mechanism.................................................................................................................................................... 859
sFlow on LAG ports.......................................................................................................................................................860
Enabling Extended sFlow..............................................................................................................................................860
Important Points to Remember.............................................................................................................................. 861
48 Simple Network Management Protocol (SNMP)..................................................................................... 862
Protocol Overview.........................................................................................................................................................863
Implementation Information..........................................................................................................................................863
SNMPv3 Compliance With FIPS................................................................................................................................. 863
Conguration Task List for SNMP...............................................................................................................................864
Related Conguration Tasks...................................................................................................................................864
Important Points to Remember................................................................................................................................... 865
Set up SNMP.................................................................................................................................................................865
Creating a Community............................................................................................................................................865
Setting Up User-Based Security (SNMPv3)....................................................................................................... 865
Reading Managed Object Values................................................................................................................................. 867
Writing Managed Object Values...................................................................................................................................867
Conguring Contact and Location Information using SNMP...................................................................................868
Subscribing to Managed Object Value Updates using SNMP................................................................................. 868
Enabling a Subset of SNMP Traps.............................................................................................................................. 869
Enabling an SNMP Agent to Notify Syslog Server Failure........................................................................................873
Copy Conguration Files Using SNMP........................................................................................................................874
Copying a Conguration File...................................................................................................................................875
Copying Conguration Files via SNMP................................................................................................................. 876
Copying the Startup-Cong Files to the Running-Cong.................................................................................. 876
Copying the Startup-Cong Files to the Server via FTP.................................................................................... 877
Copying the Startup-Cong Files to the Server via TFTP..................................................................................877
Contents
27
Copy a Binary File to the Startup-Conguration..................................................................................................878
Additional MIB Objects to View Copy Statistics.................................................................................................. 878
Obtaining a Value for MIB Objects.........................................................................................................................879
MIB Support to Display Reason for Last System Reboot.........................................................................................879
Viewing the Reason for Last System Reboot Using SNMP...............................................................................880
MIB Support for Power Monitoring.............................................................................................................................880
MIB Support to Display the Available Memory Size on Flash................................................................................... 881
Viewing the Available Flash Memory Size............................................................................................................. 881
MIB Support to Display the Software Core Files Generated by the System.......................................................... 881
Viewing the Software Core Files Generated by the System..............................................................................882
SNMP Support for WRED Green/Yellow/Red Drop Counters................................................................................882
MIB Support to Display the Available Partitions on Flash.........................................................................................883
Viewing the Available Partitions on Flash............................................................................................................. 884
MIB Support to Display Egress Queue Statistics.......................................................................................................885
MIB Support to ECMP Group Count..........................................................................................................................885
Viewing the ECMP Group Count Information......................................................................................................885
MIB Support for entAliasMappingTable ..................................................................................................................... 888
Viewing the entAliasMappingTable MIB................................................................................................................888
MIB Support for LAG.................................................................................................................................................... 888
Viewing the LAG MIB..............................................................................................................................................890
MIB Support to Display Unrecognized LLDP TLVs................................................................................................... 890
MIB Support to Display Reserved Unrecognized LLDP TLVs............................................................................890
MIB Support to Display Organizational Specic Unrecognized LLDP TLVs......................................................891
MIB Support to Display Unrecognized LLDP TLVs....................................................................................................892
Viewing the Details of Reserved Unrecognized LLDP TLVs.............................................................................. 892
MIB Support for LLDP Notication Interval............................................................................................................... 893
Manage VLANs using SNMP....................................................................................................................................... 893
Creating a VLAN......................................................................................................................................................893
Assigning a VLAN Alias........................................................................................................................................... 893
Displaying the Ports in a VLAN..............................................................................................................................894
Add Tagged and Untagged Ports to a VLAN....................................................................................................... 894
Managing Overload on Startup....................................................................................................................................895
Enabling and Disabling a Port using SNMP................................................................................................................895
Fetch Dynamic MAC Entries using SNMP................................................................................................................. 896
Example of Deriving the Interface Index Number......................................................................................................897
MIB Objects for Viewing the System Image on Flash Partitions....................................................................... 897
Monitoring BGP sessions via SNMP........................................................................................................................... 897
Monitor Port-Channels.................................................................................................................................................899
Troubleshooting SNMP Operation.............................................................................................................................. 900
Transceiver Monitoring.................................................................................................................................................. 901
49 Stacking.................................................................................................................................................. 903
Stacking Overview........................................................................................................................................................ 903
Stack Management Roles.......................................................................................................................................903
Stack Master Election.............................................................................................................................................904
Virtual IP................................................................................................................................................................... 905
28
Contents
Failover Roles...........................................................................................................................................................905
MAC Addressing on Stacks....................................................................................................................................905
Stacking LAG........................................................................................................................................................... 906
Supported Stacking Topologies............................................................................................................................. 906
High Availability on Stacks......................................................................................................................................907
Management Access on Stacks.............................................................................................................................907
Important Points to Remember................................................................................................................................... 908
Stacking Installation Tasks............................................................................................................................................ 908
Create a Stack......................................................................................................................................................... 908
Add Units to an Existing Stack............................................................................................................................... 912
Split a Stack.............................................................................................................................................................. 914
Stacking Conguration Tasks........................................................................................................................................914
Assigning Unit Numbers to Units in an Stack.......................................................................................................915
Creating a Virtual Stack Unit on a Stack...............................................................................................................915
Displaying Information about a Stack.....................................................................................................................915
Inuencing Management Unit Selection on a Stack............................................................................................ 917
Managing Redundancy on a Stack.........................................................................................................................917
Resetting a Unit on a Stack.................................................................................................................................... 918
Verify a Stack Conguration......................................................................................................................................... 918
Displaying the Status of Stacking Ports................................................................................................................ 918
Remove Units or Front End Ports from a Stack.........................................................................................................919
Removing a Unit from a Stack................................................................................................................................919
Removing Front End Port Stacking....................................................................................................................... 919
Troubleshoot a Stack.....................................................................................................................................................920
Recover from Stack Link Flaps.............................................................................................................................. 920
Recover from a Card Problem State on a Stack..................................................................................................920
50 Storm Control.......................................................................................................................................... 921
Congure Storm Control............................................................................................................................................... 921
Conguring Storm Control from INTERFACE Mode............................................................................................921
Conguring Storm Control from CONFIGURATION Mode................................................................................922
Detect PFC Storm.........................................................................................................................................................922
Restore Queue Drop State........................................................................................................................................... 923
PFC Storm......................................................................................................................................................................923
View Details of Storm Control PFC.............................................................................................................................923
51 Spanning Tree Protocol (STP)..................................................................................................................925
Protocol Overview.........................................................................................................................................................925
Congure Spanning Tree...............................................................................................................................................926
Related Conguration Tasks...................................................................................................................................926
Important Points to Remember................................................................................................................................... 926
Conguring Interfaces for Layer 2 Mode....................................................................................................................927
Enabling Spanning Tree Protocol Globally...................................................................................................................928
Adding an Interface to the Spanning Tree Group...................................................................................................... 930
Modifying Global Parameters.......................................................................................................................................930
Modifying Interface STP Parameters...........................................................................................................................931
Contents
29
Enabling PortFast........................................................................................................................................................... 931
Prevent Network Disruptions with BPDU Guard.................................................................................................932
Selecting STP Root....................................................................................................................................................... 934
STP Root Guard.............................................................................................................................................................934
Root Guard Scenario...............................................................................................................................................934
Conguring Root Guard..........................................................................................................................................935
Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................936
Conguring Spanning Trees as Hitless........................................................................................................................936
STP Loop Guard.............................................................................................................................................................936
Conguring Loop Guard..........................................................................................................................................938
Displaying STP Guard Conguration........................................................................................................................... 938
52 SupportAssist..........................................................................................................................................940
Conguring SupportAssist Using a Conguration Wizard.........................................................................................941
Conguring SupportAssist Manually............................................................................................................................941
Conguring SupportAssist Activity............................................................................................................................. 943
Conguring SupportAssist Company..........................................................................................................................944
Conguring SupportAssist Person.............................................................................................................................. 945
Conguring SupportAssist Server...............................................................................................................................945
Viewing SupportAssist Conguration......................................................................................................................... 946
53 System Time and Date.............................................................................................................................948
Network Time Protocol................................................................................................................................................. 948
Protocol Overview...................................................................................................................................................949
Congure the Network Time Protocol..................................................................................................................949
Enabling NTP........................................................................................................................................................... 950
Conguring NTP Broadcasts................................................................................................................................. 950
Disabling NTP on an Interface................................................................................................................................ 951
Conguring a Source IP Address for NTP Packets..............................................................................................951
Conguring NTP Authentication............................................................................................................................ 951
Conguring NTP control key password................................................................................................................954
Dell EMC Networking OS Time and Date...................................................................................................................954
Conguration Task List .......................................................................................................................................... 954
Setting the Time and Date for the Switch Software Clock............................................................................... 954
Setting the Timezone..............................................................................................................................................955
Set Daylight Saving Time........................................................................................................................................955
Setting Daylight Saving Time Once.......................................................................................................................955
Setting Recurring Daylight Saving Time............................................................................................................... 956
54 Tunneling................................................................................................................................................. 958
Conguring a Tunnel..................................................................................................................................................... 958
Conguring Tunnel Keepalive Settings........................................................................................................................959
Conguring a Tunnel Interface.....................................................................................................................................960
Conguring Tunnel Allow-Remote Decapsulation......................................................................................................960
Conguring Tunnel source anylocal Decapsulation.................................................................................................... 961
Guidelines for Conguring Multipoint Receive-Only Tunnels.................................................................................... 961
30
Contents
Loading...
+ 1145 hidden pages