Dell PowerSwitch S6010-ON User Manual

Dell PowerSwitch S6010-ON User Manual

Dell Con€guration Guide for the S6010–ON System

9.14.0.0

Notes, cautions, and warnings

NOTE: A NOTE indicates important information that helps you make better use of your product.

CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

Copyright © 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.

2018 - 07

Rev. A00

Contents

1 About this Guide...........................................................................................................................................

36

Audience...........................................................................................................................................................................

36

Conventions......................................................................................................................................................................

36

Related Documents.........................................................................................................................................................

36

2 Con€guration Fundamentals........................................................................................................................

37

Accessing the Command Line........................................................................................................................................

37

CLI Modes.........................................................................................................................................................................

37

Navigating CLI Modes...............................................................................................................................................

39

The do Command............................................................................................................................................................

42

Undoing Commands........................................................................................................................................................

42

Obtaining Help..................................................................................................................................................................

43

Entering and Editing Commands....................................................................................................................................

43

Command History............................................................................................................................................................

44

Filtering show Command Outputs.................................................................................................................................

44

Example of the grep Keyword..................................................................................................................................

44

Multiple Users in Configuration Mode...........................................................................................................................

45

3 Getting Started............................................................................................................................................

46

Console Access................................................................................................................................................................

47

Serial Console.............................................................................................................................................................

47

Default Configuration......................................................................................................................................................

48

Configuring a Host Name...............................................................................................................................................

48

Accessing the System Remotely....................................................................................................................................

48

Accessing the System Remotely..............................................................................................................................

49

Configure the Management Port IP Address.........................................................................................................

49

Configure a Management Route..............................................................................................................................

49

Configuring a Username and Password..................................................................................................................

49

Configuring the Enable Password..................................................................................................................................

50

Configuration File Management......................................................................................................................................

51

Copy Files to and from the System..........................................................................................................................

51

Mounting an NFS File System..................................................................................................................................

52

Save the Running-Configuration..............................................................................................................................

53

Configure the Overload Bit for a Startup Scenario...............................................................................................

54

Viewing Files...............................................................................................................................................................

54

Managing the File System..............................................................................................................................................

55

View Command History..................................................................................................................................................

55

Upgrading Dell EMC Networking OS............................................................................................................................

56

Using HTTP for File Transfers........................................................................................................................................

56

Verify Software Images Before Installation...................................................................................................................

57

4 Management...............................................................................................................................................

58

Contents 3

Configuring Privilege Levels...........................................................................................................................................

58

Creating a Custom Privilege Level...........................................................................................................................

59

Removing a Command from EXEC Mode..............................................................................................................

59

Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................

59

Allowing Access to CONFIGURATION Mode Commands....................................................................................

59

Allowing Access to Different Modes........................................................................................................................

59

Applying a Privilege Level to a Username................................................................................................................

61

Applying a Privilege Level to a Terminal Line...........................................................................................................

61

Configuring Logging.........................................................................................................................................................

61

Audit and Security Logs............................................................................................................................................

62

Configuring Logging Format ...................................................................................................................................

63

Setting Up a Secure Connection to a Syslog Server.............................................................................................

63

Log Messages in the Internal Buffer..............................................................................................................................

65

Configuration Task List for System Log Management..........................................................................................

65

Disabling System Logging...............................................................................................................................................

65

Sending System Messages to a Syslog Server............................................................................................................

65

Configuring a UNIX System as a Syslog Server.....................................................................................................

65

Track Login Activity.........................................................................................................................................................

66

Restrictions for Tracking Login Activity..................................................................................................................

66

Configuring Login Activity Tracking.........................................................................................................................

66

Display Login Statistics..............................................................................................................................................

67

Limit Concurrent Login Sessions....................................................................................................................................

68

Restrictions for Limiting the Number of Concurrent Sessions............................................................................

68

Configuring Concurrent Session Limit.....................................................................................................................

68

Enabling the System to Clear Existing Sessions....................................................................................................

69

Enabling Secured CLI Mode...........................................................................................................................................

70

Changing System Logging Settings...............................................................................................................................

70

Display the Logging Buffer and the Logging Configuration.........................................................................................

71

Configuring a UNIX Logging Facility Level.....................................................................................................................

71

Synchronizing Log Messages.........................................................................................................................................

72

Enabling Timestamp on Syslog Messages....................................................................................................................

73

File Transfer Services.......................................................................................................................................................

73

Configuration Task List for File Transfer Services..................................................................................................

74

Enabling the FTP Server...........................................................................................................................................

74

Configuring FTP Server Parameters........................................................................................................................

74

Configuring FTP Client Parameters.........................................................................................................................

75

Terminal Lines...................................................................................................................................................................

75

Denying and Permitting Access to a Terminal Line................................................................................................

75

Configuring Login Authentication for Terminal Lines.............................................................................................

76

Setting Timeout for EXEC Privilege Mode....................................................................................................................

77

Using Telnet to get to Another Network Device..........................................................................................................

78

Lock CONFIGURATION Mode.......................................................................................................................................

78

Viewing the Configuration Lock Status...................................................................................................................

78

Restoring the Factory Default Settings.........................................................................................................................

79

Important Points to Remember................................................................................................................................

79

4 Contents

Restoring Factory Default Environment Variables.................................................................................................

80

Viewing the Reason for Last System Reboot...............................................................................................................

81

5 802.1X..........................................................................................................................................................

82

Port-Authentication Process..........................................................................................................................................

84

EAP over RADIUS......................................................................................................................................................

84

Configuring 802.1X...........................................................................................................................................................

85

Related Configuration Tasks.....................................................................................................................................

85

Important Points to Remember......................................................................................................................................

85

Enabling 802.1X................................................................................................................................................................

86

Configuring Request Identity Re-Transmissions...........................................................................................................

87

Configuring a Quiet Period after a Failed Authentication.....................................................................................

88

Forcibly Authorizing or Unauthorizing a Port...............................................................................................................

89

Re-Authenticating a Port................................................................................................................................................

89

Configuring Timeouts......................................................................................................................................................

90

Configuring Dynamic VLAN Assignment with Port Authentication...........................................................................

91

Guest and Authentication-Fail VLANs..........................................................................................................................

92

Configuring a Guest VLAN.......................................................................................................................................

93

Configuring an Authentication-Fail VLAN...............................................................................................................

93

6 Access Control Lists (ACLs)........................................................................................................................

95

IP Access Control Lists (ACLs)......................................................................................................................................

96

CAM Usage.................................................................................................................................................................

97

Implementing ACLs on Dell EMC Networking OS..................................................................................................

97

Important Points to Remember......................................................................................................................................

99

Configuration Task List for Route Maps..................................................................................................................

99

Configuring Match Routes.......................................................................................................................................

101

Configuring Set Conditions.....................................................................................................................................

103

Configure a Route Map for Route Redistribution.................................................................................................

104

Configure a Route Map for Route Tagging...........................................................................................................

104

Continue Clause.......................................................................................................................................................

105

IP Fragment Handling....................................................................................................................................................

105

IP Fragments ACL Examples...................................................................................................................................

105

Layer 4 ACL Rules Examples...................................................................................................................................

106

Configure a Standard IP ACL........................................................................................................................................

106

Configuring a Standard IP ACL Filter.....................................................................................................................

107

Configure an Extended IP ACL.....................................................................................................................................

108

Configuring Filters with a Sequence Number.......................................................................................................

108

Configuring Filters Without a Sequence Number.................................................................................................

110

Configure Layer 2 and Layer 3 ACLs.............................................................................................................................

111

Assign an IP ACL to an Interface...................................................................................................................................

111

Applying an IP ACL..........................................................................................................................................................

111

Counting ACL Hits.....................................................................................................................................................

112

Configure Ingress ACLs..................................................................................................................................................

112

Configure Egress ACLs...................................................................................................................................................

113

Applying Egress Layer 3 ACLs (Control-Plane).....................................................................................................

114

Contents 5

IP Prefix Lists...................................................................................................................................................................

114

Implementation Information.....................................................................................................................................

115

Configuration Task List for Prefix Lists...................................................................................................................

115

ACL Remarks...................................................................................................................................................................

118

Configuring a Remark...............................................................................................................................................

119

Deleting a Remark.....................................................................................................................................................

119

ACL Resequencing.........................................................................................................................................................

120

Resequencing an ACL or Prefix List.......................................................................................................................

120

Route Maps.....................................................................................................................................................................

122

Implementation Information....................................................................................................................................

122

Flow-Based Monitoring..................................................................................................................................................

122

Behavior of Flow-Based Monitoring.......................................................................................................................

122

Enabling Flow-Based Monitoring............................................................................................................................

124

Configuring IP Mirror Access Group............................................................................................................................

125

Sample Configuration...............................................................................................................................................

125

Example of viewing IP mirror–access–group applied to an Interface................................................................

126

7 Bidirectional Forwarding Detection (BFD)...................................................................................................

127

How BFD Works..............................................................................................................................................................

127

BFD Packet Format..................................................................................................................................................

128

BFD Sessions............................................................................................................................................................

129

BFD Three-Way Handshake....................................................................................................................................

130

Session State Changes............................................................................................................................................

132

Important Points to Remember....................................................................................................................................

132

Configure BFD................................................................................................................................................................

132

Configure BFD for Physical Ports...........................................................................................................................

133

Configure BFD for Static Routes............................................................................................................................

134

Configure BFD for IPv6 Static Routes...................................................................................................................

138

Configure BFD for OSPF.........................................................................................................................................

140

Configure BFD for OSPFv3.....................................................................................................................................

146

Configure BFD for IS-IS...........................................................................................................................................

149

Configure BFD for BGP............................................................................................................................................

151

Configure BFD for VRRP.........................................................................................................................................

159

Configuring Protocol Liveness.................................................................................................................................

161

8 Border Gateway Protocol (BGP)................................................................................................................

162

Border Gateway Protocol version 4 (BGPv4).............................................................................................................

162

Autonomous Systems (AS)...........................................................................................................................................

162

AS4 Number Representation..................................................................................................................................

164

Four-Byte AS Numbers...........................................................................................................................................

166

Multiprotocol BGP..........................................................................................................................................................

166

MBGP for IPv4 MulticastBGP Address Family modelIPv4 and IPv6 address family........................................

167

Sessions and Peers.........................................................................................................................................................

167

Establish a Session...................................................................................................................................................

167

Implementing BGP global and address family.............................................................................................................

168

BGP global configuration default values................................................................................................................

169

6 Contents

BGP Attributes for selecting Best Path.......................................................................................................................

169

Best Path Selection Criteria....................................................................................................................................

170

Weight.........................................................................................................................................................................

171

Local Preference.......................................................................................................................................................

172

Multi-Exit Discriminators (MEDs)...........................................................................................................................

172

Origin..........................................................................................................................................................................

173

AS Path......................................................................................................................................................................

174

Next Hop....................................................................................................................................................................

174

Implement BGP with Dell EMC Networking OS.........................................................................................................

175

Additional Path (Add-Path) Support......................................................................................................................

175

Advertise IGP Cost as MED for Redistributed Routes........................................................................................

175

Ignore Router-ID in Best-Path Calculation............................................................................................................

176

AS Number Migration...............................................................................................................................................

176

BGP4 Management Information Base (MIB)........................................................................................................

177

Important Points to Remember...............................................................................................................................

177

Configuration Information..............................................................................................................................................

178

Configuring a basic BGP network................................................................................................................................

178

Enabling BGP............................................................................................................................................................

178

Configuring a BGP peer............................................................................................................................................

181

Configuring AS4 Number Representations...........................................................................................................

182

Configuring a BGP VRF address family.................................................................................................................

183

Route-refresh and Soft-reconfiguration................................................................................................................

185

Aggregating Routes..................................................................................................................................................

188

Filtering BGP Routes................................................................................................................................................

188

Filtering BGP Routes Using Route Maps..............................................................................................................

190

Filtering BGP Routes Using AS-PATH Information..............................................................................................

190

Configuring Peer Groups..........................................................................................................................................

191

Configuring BGP Fast Fall-Over.............................................................................................................................

199

Configuring Passive Peering...................................................................................................................................

200

Maintaining Existing AS Numbers During an AS Migration.................................................................................

201

Allowing an AS Number to Appear in its Own AS Path......................................................................................

202

Enabling Graceful Restart.......................................................................................................................................

203

Filtering on an AS-Path Attribute..........................................................................................................................

204

Regular Expressions as Filters................................................................................................................................

205

Redistributing Routes..............................................................................................................................................

206

Enabling Additional Paths........................................................................................................................................

207

Configuring IP Community Lists.............................................................................................................................

207

Configuring an IP Extended Community List.......................................................................................................

208

Filtering Routes with Community Lists.................................................................................................................

209

Manipulating the COMMUNITY Attribute.............................................................................................................

210

Changing MED Attributes........................................................................................................................................

211

Changing the LOCAL_PREFERENCE Attribute...................................................................................................

212

Configuring the local System or a Different System to be the Next Hop for BGP-Learned Routes.............

212

Changing the WEIGHT Attribute............................................................................................................................

213

Enabling Multipath....................................................................................................................................................

213

Contents 7

Route Reflectors.......................................................................................................................................................

214

Configuring BGP Confederations...........................................................................................................................

215

Enabling Route Flap Dampening.............................................................................................................................

215

Changing BGP Timers..............................................................................................................................................

218

Setting the extended timer.....................................................................................................................................

218

Enabling or disabling BGP neighbors.....................................................................................................................

219

Route Map Continue...............................................................................................................................................

220

Enabling MBGP Configurations....................................................................................................................................

221

MBGP support for IPv6.................................................................................................................................................

221

Configuring IPv6 MBGP between peers.....................................................................................................................

221

Example-Configuring IPv4 and IPv6 neighbors.........................................................................................................

222

Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor...............................................

224

BGP Regular Expression Optimization........................................................................................................................

226

Debugging BGP.............................................................................................................................................................

226

Storing Last and Bad PDUs....................................................................................................................................

227

Capturing PDUs.......................................................................................................................................................

228

PDU Counters..........................................................................................................................................................

229

9 Content Addressable Memory (CAM)........................................................................................................

230

CAM Allocation..............................................................................................................................................................

230

Test CAM Usage............................................................................................................................................................

232

View CAM Profiles.........................................................................................................................................................

232

View CAM-ACL Settings..............................................................................................................................................

233

View CAM Usage...........................................................................................................................................................

234

Configuring CAM Threshold and Silence Period........................................................................................................

235

Setting CAM Threshold and Silence Period.........................................................................................................

235

CAM Optimization.........................................................................................................................................................

236

Troubleshoot CAM Profiling..........................................................................................................................................

236

QoS CAM Region Limitation...................................................................................................................................

237

Syslog Error When the Table is Full........................................................................................................................

237

Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................

237

Syslog Warning for Discrepancies Between Configured Extended Prefixes....................................................

237

Unified Forwarding Table (UFT) Modes......................................................................................................................

237

Configuring UFT Modes..........................................................................................................................................

238

10 Control Plane Policing (CoPP).................................................................................................................

239

Configure Control Plane Policing.................................................................................................................................

240

Configuring CoPP for Protocols.............................................................................................................................

241

Configuring CoPP for CPU Queues......................................................................................................................

243

Displaying CoPP Configuration .............................................................................................................................

244

11 Data Center Bridging (DCB)......................................................................................................................

246

Ethernet Enhancements in Data Center Bridging.....................................................................................................

246

Priority-Based Flow Control....................................................................................................................................

247

Enhanced Transmission Selection..........................................................................................................................

248

Data Center Bridging Exchange Protocol (DCBx)...............................................................................................

249

8 Contents

Data Center Bridging in a Traffic Flow..................................................................................................................

250

Enabling Data Center Bridging.....................................................................................................................................

250

DCB Maps and its Attributes..................................................................................................................................

251

Data Center Bridging: Default Configuration..............................................................................................................

252

Configuring Priority-Based Flow Control....................................................................................................................

252

Configuring Lossless Queues.................................................................................................................................

253

Configuring PFC in a DCB Map...................................................................................................................................

254

PFC Configuration Notes........................................................................................................................................

254

PFC Prerequisites and Restrictions.......................................................................................................................

255

Applying a DCB Map on a Port....................................................................................................................................

256

Configuring PFC without a DCB Map.........................................................................................................................

256

Configuring Lossless QueuesExample:..................................................................................................................

257

Priority-Based Flow Control Using Dynamic Buffer Method....................................................................................

258

Pause and Resume of Traffic..................................................................................................................................

258

Buffer Sizes for Lossless or PFC Packets............................................................................................................

258

Behavior of Tagged Packets.........................................................................................................................................

259

Configuration Example for DSCP and PFC Priorities................................................................................................

259

SNMP Support for PFC and Buffer Statistics Tracking...........................................................................................

260

Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................

260

PFC and ETS Configuration Examples........................................................................................................................

261

Using PFC to Manage Converged Ethernet Traffic...................................................................................................

261

Operations on Untagged Packets.................................................................................................................................

261

Generation of PFC for a Priority for Untagged Packets...........................................................................................

262

Configure Enhanced Transmission Selection..............................................................................................................

262

ETS Prerequisites and Restrictions.......................................................................................................................

262

Creating an ETS Priority Group..............................................................................................................................

262

ETS Operation with DCBx......................................................................................................................................

264

Configuring Bandwidth Allocation for DCBx CIN.................................................................................................

264

Configuring ETS in a DCB Map..............................................................................................................................

265

Hierarchical Scheduling in ETS Output Policies.........................................................................................................

266

Using ETS to Manage Converged Ethernet Traffic...................................................................................................

267

Applying DCB Policies in a Switch Stack....................................................................................................................

267

Configure a DCBx Operation........................................................................................................................................

267

DCBx Operation.......................................................................................................................................................

267

DCBx Port Roles......................................................................................................................................................

268

DCB Configuration Exchange................................................................................................................................

269

Configuration Source Election...............................................................................................................................

269

Propagation of DCB Information............................................................................................................................

270

Auto-Detection and Manual Configuration of the DCBx Version.......................................................................

270

DCBx Example..........................................................................................................................................................

271

DCBx Prerequisites and Restrictions......................................................................................................................

271

Configuring DCBx.....................................................................................................................................................

271

Verifying the DCB Configuration..................................................................................................................................

275

QoS dot1p Traffic Classification and Queue Assignment..........................................................................................

283

Configuring the Dynamic Buffer Method....................................................................................................................

284

Contents 9

Sample DCB Configuration...........................................................................................................................................

285

PFC and ETS Configuration Command Examples...............................................................................................

287

12 Dynamic Host Con€guration Protocol (DHCP).........................................................................................

288

DHCP Packet Format and Options.............................................................................................................................

288

Assign an IP Address using DHCP...............................................................................................................................

290

Implementation Information..........................................................................................................................................

291

Configure the System to be a DHCP Server..............................................................................................................

291

Configuring the Server for Automatic Address Allocation..................................................................................

292

Specifying a Default Gateway................................................................................................................................

293

Configure a Method of Hostname Resolution.....................................................................................................

293

Using DNS for Address Resolution........................................................................................................................

293

Using NetBIOS WINS for Address Resolution.....................................................................................................

294

Creating Manual Binding Entries............................................................................................................................

294

Debugging the DHCP Server.................................................................................................................................

294

Using DHCP Clear Commands..............................................................................................................................

295

Configure the System to be a DHCP Client...............................................................................................................

295

Configuring the DHCP Client System...................................................................................................................

295

DHCP Client on a Management Interface............................................................................................................

297

DHCP Client Operation with Other Features.......................................................................................................

297

DHCP Relay When DHCP Server and Client are in Different VRFs........................................................................

298

Configuring Route Leaking between VRFs on DHCP Relay Agent...................................................................

298

Configure the System for User Port Stacking (Option 230)...................................................................................

300

Configure Secure DHCP...............................................................................................................................................

300

Option 82..................................................................................................................................................................

300

DHCP Snooping........................................................................................................................................................

301

Drop DHCP Packets on Snooped VLANs Only....................................................................................................

305

Dynamic ARP Inspection........................................................................................................................................

306

Configuring Dynamic ARP Inspection...................................................................................................................

307

Source Address Validation............................................................................................................................................

308

Enabling IP Source Address Validation..................................................................................................................

308

DHCP MAC Source Address Validation................................................................................................................

309

Enabling IP+MAC Source Address Validation.......................................................................................................

309

Viewing the Number of SAV Dropped Packets....................................................................................................

310

Clearing the Number of SAV Dropped Packets....................................................................................................

310

13 Equal Cost Multi-Path (ECMP).................................................................................................................

311

ECMP for Flow-Based Affinity.......................................................................................................................................

311

Configuring the Hash Algorithm..............................................................................................................................

311

Enabling Deterministic ECMP Next Hop................................................................................................................

311

Configuring the Hash Algorithm Seed...................................................................................................................

312

Link Bundle Monitoring..................................................................................................................................................

312

Managing ECMP Group Paths................................................................................................................................

313

Creating an ECMP Group Bundle...........................................................................................................................

313

Modifying the ECMP Group Threshold.................................................................................................................

313

Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table.......................................

314

10 Contents

Support for ECMP in host table.............................................................................................................................

315

Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes .........................................................................

315

14 FIP Snooping............................................................................................................................................

316

Fibre Channel over Ethernet.........................................................................................................................................

316

Ensure Robustness in a Converged Ethernet Network.............................................................................................

316

FIP Snooping on Ethernet Bridges...............................................................................................................................

318

FIP Snooping in a Switch Stack...................................................................................................................................

320

Using FIP Snooping.......................................................................................................................................................

320

FIP Snooping Prerequisites.....................................................................................................................................

320

Important Points to Remember.............................................................................................................................

320

Enabling the FCoE Transit Feature.........................................................................................................................

321

Enable FIP Snooping on VLANs.............................................................................................................................

322

Configure the FC-MAP Value................................................................................................................................

322

Configure a Port for a Bridge-to-Bridge Link.......................................................................................................

322

Configure a Port for a Bridge-to-FCF Link...........................................................................................................

322

Impact on Other Software Features.....................................................................................................................

322

FIP Snooping Restrictions......................................................................................................................................

323

Configuring FIP Snooping.......................................................................................................................................

323

Displaying FIP Snooping Information...........................................................................................................................

324

FCoE Transit Configuration Example...........................................................................................................................

329

15 Flex Hash and Optimized Boot-Up............................................................................................................

331

Flex Hash Capability Overview.....................................................................................................................................

331

Configuring the Flex Hash Mechanism........................................................................................................................

331

Configuring Fast Boot and LACP Fast Switchover...................................................................................................

332

Optimizing the Boot Time.............................................................................................................................................

332

Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................

332

Guidelines for Configuring Optimized Booting Mechanism................................................................................

333

Interoperation of Applications with Fast Boot and System States..........................................................................

334

LACP and IPv4 Routing..........................................................................................................................................

334

LACP and IPv6 Routing..........................................................................................................................................

334

BGP Graceful Restart.............................................................................................................................................

335

Cold Boot Caused by Power Cycling the System................................................................................................

335

Unexpected Reload of the System........................................................................................................................

335

Software Upgrade...................................................................................................................................................

335

LACP Fast Switchover............................................................................................................................................

335

Changes to BGP Multipath....................................................................................................................................

336

Delayed Installation of ECMP Routes Into BGP...................................................................................................

336

RDMA Over Converged Ethernet (RoCE) Overview...............................................................................................

336

Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces......................................................................................

337

16 Force10 Resilient Ring Protocol (FRRP)...................................................................................................

338

Protocol Overview.........................................................................................................................................................

338

Ring Status...............................................................................................................................................................

339

Multiple FRRP Rings...............................................................................................................................................

339

Contents 11

Important FRRP Points...........................................................................................................................................

340

Important FRRP Concepts......................................................................................................................................

341

Implementing FRRP.......................................................................................................................................................

342

FRRP Configuration.......................................................................................................................................................

342

Creating the FRRP Group.......................................................................................................................................

342

Configuring the Control VLAN...............................................................................................................................

343

Configuring and Adding the Member VLANs.......................................................................................................

344

Setting the FRRP Timers........................................................................................................................................

345

Clearing the FRRP Counters..................................................................................................................................

345

Viewing the FRRP Configuration...........................................................................................................................

345

Viewing the FRRP Information..............................................................................................................................

345

Troubleshooting FRRP..................................................................................................................................................

346

Configuration Checks..............................................................................................................................................

346

Sample Configuration and Topology............................................................................................................................

346

FRRP Support on VLT...................................................................................................................................................

347

Example Scenario....................................................................................................................................................

348

Important Points to Remember.............................................................................................................................

349

17 GARP VLAN Registration Protocol (GVRP)..............................................................................................

350

Important Points to Remember...................................................................................................................................

350

Configure GVRP.............................................................................................................................................................

351

Related Configuration Tasks....................................................................................................................................

351

Enabling GVRP Globally................................................................................................................................................

352

Enabling GVRP on a Layer 2 Interface........................................................................................................................

352

Configure GVRP Registration......................................................................................................................................

352

Configure a GARP Timer..............................................................................................................................................

353

18 Internet Group Management Protocol (IGMP).........................................................................................

354

IGMP Implementation Information..............................................................................................................................

354

IGMP Protocol Overview..............................................................................................................................................

354

IGMP Version 2........................................................................................................................................................

354

IGMP Version 3........................................................................................................................................................

356

Configure IGMP.............................................................................................................................................................

359

Related Configuration Tasks...................................................................................................................................

359

Viewing IGMP Enabled Interfaces...............................................................................................................................

360

Selecting an IGMP Version...........................................................................................................................................

360

Viewing IGMP Groups....................................................................................................................................................

361

Adjusting Timers.............................................................................................................................................................

361

Adjusting Query and Response Timers..................................................................................................................

361

Enabling IGMP Immediate-Leave.................................................................................................................................

362

IGMP Snooping..............................................................................................................................................................

363

IGMP Snooping Implementation Information.......................................................................................................

363

Configuring IGMP Snooping...................................................................................................................................

363

Removing a Group-Port Association.....................................................................................................................

364

Disabling Multicast Flooding...................................................................................................................................

364

Specifying a Port as Connected to a Multicast Router......................................................................................

364

12 Contents

Configuring the Switch as Querier........................................................................................................................

365

Fast Convergence after MSTP Topology Changes...................................................................................................

365

Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................

365

Protocol Separation.................................................................................................................................................

366

Enabling and Disabling Management Egress Interface Selection......................................................................

367

Handling of Management Route Configuration...................................................................................................

368

Handling of Switch-Initiated Traffic.......................................................................................................................

368

Handling of Switch-Destined Traffic......................................................................................................................

369

Handling of Transit Traffic (Traffic Separation).....................................................................................................

370

Mapping of Management Applications and Traffic Type.....................................................................................

370

Behavior of Various Applications for Switch-Initiated Traffic .............................................................................

371

Behavior of Various Applications for Switch-Destined Traffic ...........................................................................

372

Interworking of EIS With Various Applications.....................................................................................................

372

Designating a Multicast Router Interface...................................................................................................................

373

19 Interfaces.................................................................................................................................................

374

Basic Interface Configuration.......................................................................................................................................

374

Advanced Interface Configuration...............................................................................................................................

374

Interface Types...............................................................................................................................................................

375

View Basic Interface Information.................................................................................................................................

375

Resetting an Interface to its Factory Default State...................................................................................................

377

Enabling a Physical Interface........................................................................................................................................

378

Physical Interfaces.........................................................................................................................................................

378

Configuration Task List for Physical Interfaces....................................................................................................

378

40G to 1G Breakout Cable Adaptor.......................................................................................................................

378

Overview of Layer Modes.......................................................................................................................................

379

Configuring Layer 2 (Data Link) Mode..................................................................................................................

380

Configuring Layer 2 (Interface) Mode..................................................................................................................

380

Configuring Layer 3 (Network) Mode...................................................................................................................

380

Configuring Layer 3 (Interface) Mode...................................................................................................................

381

Automatic recovery of an Err-disabled interface.......................................................................................................

382

Configuring an automatic recovery for an Err-disabled interface......................................................................

382

Egress Interface Selection (EIS)..................................................................................................................................

383

Important Points to Remember.............................................................................................................................

383

Configuring EIS........................................................................................................................................................

383

Management Interfaces................................................................................................................................................

384

Configuring Management Interfaces.....................................................................................................................

384

Configuring a Management Interface on an Ethernet Port...............................................................................

385

VLAN Interfaces............................................................................................................................................................

386

Loopback Interfaces......................................................................................................................................................

387

Null Interfaces.................................................................................................................................................................

387

Port Channel Interfaces................................................................................................................................................

387

Port Channel Definition and Standards.................................................................................................................

388

Port Channel Benefits.............................................................................................................................................

388

Port Channel Implementation.................................................................................................................................

388

Interfaces in Port Channels....................................................................................................................................

389

Contents 13

Configuration Tasks for Port Channel Interfaces.................................................................................................

389

Creating a Port Channel.........................................................................................................................................

389

Adding a Physical Interface to a Port Channel.....................................................................................................

390

Reassigning an Interface to a New Port Channel.................................................................................................

391

Configuring the Minimum Oper Up Links in a Port Channel..............................................................................

392

Adding or Removing a Port Channel from a VLAN.............................................................................................

392

Assigning an IP Address to a Port Channel..........................................................................................................

394

Deleting or Disabling a Port Channel.....................................................................................................................

394

Load Balancing Through Port Channels................................................................................................................

394

Changing the Hash Algorithm................................................................................................................................

394

Bulk Configuration.........................................................................................................................................................

396

Interface Range.......................................................................................................................................................

396

Bulk Configuration Examples..................................................................................................................................

396

Defining Interface Range Macros................................................................................................................................

398

Define the Interface Range....................................................................................................................................

398

Choosing an Interface-Range Macro....................................................................................................................

398

Monitoring and Maintaining Interfaces.......................................................................................................................

398

Maintenance Using TDR.........................................................................................................................................

399

Non Dell-Qualified Transceivers...................................................................................................................................

400

Splitting 40G Ports without Reload............................................................................................................................

400

Splitting QSFP Ports to SFP+ Ports...........................................................................................................................

402

Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..................................................................................

403

Important Points to Remember.............................................................................................................................

403

Example Scenarios..................................................................................................................................................

404

Link Dampening.............................................................................................................................................................

405

Important Points to Remember.............................................................................................................................

405

Configuration Example of Link Dampening..........................................................................................................

406

Enabling Link Dampening........................................................................................................................................

408

Link Bundle Monitoring.................................................................................................................................................

409

Using Ethernet Pause Frames for Flow Control.........................................................................................................

410

Enabling Pause Frames............................................................................................................................................

410

Configure the MTU Size on an Interface.....................................................................................................................

411

Port-Pipes........................................................................................................................................................................

412

Auto-Negotiation on Ethernet Interfaces....................................................................................................................

412

Setting the Speed of Ethernet Interfaces.............................................................................................................

412

Set Auto-Negotiation Options................................................................................................................................

414

View Advanced Interface Information..........................................................................................................................

414

Configuring the Interface Sampling Size...............................................................................................................

415

Configuring the Traffic Sampling Size Globally...........................................................................................................

416

Dynamic Counters..........................................................................................................................................................

418

Clearing Interface Counters....................................................................................................................................

418

Compressing Configuration Files..................................................................................................................................

419

Discard Counters............................................................................................................................................................

421

Display discard counters.........................................................................................................................................

422

20 IPv4 Routing............................................................................................................................................

424

14 Contents

IP Addresses...................................................................................................................................................................

425

Implementation Information....................................................................................................................................

425

Configuration Tasks for IP Addresses..........................................................................................................................

425

Assigning IP Addresses to an Interface.......................................................................................................................

425

Configuring Static Routes.............................................................................................................................................

426

Configure Static Routes for the Management Interface..........................................................................................

427

IPv4 Path MTU Discovery Overview..........................................................................................................................

428

Packet handling during MTU mismatch................................................................................................................

428

Using the Configured Source IP Address in ICMP Messages..................................................................................

428

Configuring the ICMP Source Interface...............................................................................................................

428

Configuring the Duration to Establish a TCP Connection........................................................................................

429

Enabling Directed Broadcast........................................................................................................................................

429

Resolution of Host Names............................................................................................................................................

429

Enabling Dynamic Resolution of Host Names............................................................................................................

430

Specifying the Local System Domain and a List of Domains...................................................................................

430

Configuring DNS with Traceroute................................................................................................................................

431

ARP..................................................................................................................................................................................

431

Configuration Tasks for ARP........................................................................................................................................

432

Configuring Static ARP Entries....................................................................................................................................

432

Enabling Proxy ARP.......................................................................................................................................................

432

Clearing ARP Cache......................................................................................................................................................

433

ARP Learning via Gratuitous ARP................................................................................................................................

433

Enabling ARP Learning via Gratuitous ARP................................................................................................................

433

ARP Learning via ARP Request...................................................................................................................................

433

Configuring ARP Retries...............................................................................................................................................

434

ICMP...............................................................................................................................................................................

435

Configuration Tasks for ICMP......................................................................................................................................

435

Enabling ICMP Unreachable Messages......................................................................................................................

435

UDP Helper.....................................................................................................................................................................

435

Configure UDP Helper.............................................................................................................................................

435

Important Points to Remember.............................................................................................................................

436

Enabling UDP Helper.....................................................................................................................................................

436

Configurations Using UDP Helper...............................................................................................................................

436

UDP Helper with Broadcast-All Addresses.................................................................................................................

436

UDP Helper with Subnet Broadcast Addresses.........................................................................................................

437

UDP Helper with Configured Broadcast Addresses..................................................................................................

437

UDP Helper with No Configured Broadcast Addresses............................................................................................

438

Troubleshooting UDP Helper........................................................................................................................................

438

21 IPv6 Routing............................................................................................................................................

439

Protocol Overview.........................................................................................................................................................

439

Extended Address Space........................................................................................................................................

440

Stateless Autoconfiguration...................................................................................................................................

440

IPv6 Headers............................................................................................................................................................

440

Longest Prefix Match (LPM) Table and IPv6 /65 – /128 support....................................................................

441

IPv6 Header Fields...................................................................................................................................................

442

Contents 15

Extension Header Fields..........................................................................................................................................

444

Addressing................................................................................................................................................................

445

Implementing IPv6 with Dell EMC Networking OS...................................................................................................

446

ICMPv6...........................................................................................................................................................................

447

Path MTU discovery......................................................................................................................................................

448

IPv6 Neighbor Discovery..............................................................................................................................................

448

IPv6 Neighbor Discovery of MTU Packets...........................................................................................................

449

Configuring the IPv6 Recursive DNS Server.......................................................................................................

449

Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................

450

Displaying IPv6 RDNSS Information......................................................................................................................

450

Secure Shell (SSH) Over an IPv6 Transport...............................................................................................................

451

Configuration Tasks for IPv6.........................................................................................................................................

451

Adjusting Your CAM-Profile.....................................................................................................................................

451

Assigning an IPv6 Address to an Interface...........................................................................................................

452

Assigning a Static IPv6 Route................................................................................................................................

453

Configuring Telnet with IPv6..................................................................................................................................

453

SNMP over IPv6......................................................................................................................................................

454

Displaying IPv6 Information....................................................................................................................................

454

Displaying an IPv6 Interface Information..............................................................................................................

454

Showing IPv6 Routes..............................................................................................................................................

455

Showing the Running-Configuration for an Interface.........................................................................................

456

Clearing IPv6 Routes...............................................................................................................................................

457

Disabling ND Entry Timeout...................................................................................................................................

457

Configuring IPv6 RA Guard..........................................................................................................................................

457

Configuring IPv6 RA Guard on an Interface.........................................................................................................

459

Monitoring IPv6 RA Guard.....................................................................................................................................

460

22 iSCSI Optimization...................................................................................................................................

461

iSCSI Optimization Overview........................................................................................................................................

461

Monitoring iSCSI Traffic Flows...............................................................................................................................

463

Application of Quality of Service to iSCSI Traffic Flows.....................................................................................

463

Information Monitored in iSCSI Traffic Flows.......................................................................................................

463

Detection and Auto-Configuration for Dell EqualLogic Arrays...........................................................................

464

Configuring Detection and Ports for Dell Compellent Arrays.............................................................................

464

Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................

465

Enable and Disable iSCSI Optimization.................................................................................................................

465

Default iSCSI Optimization Values...............................................................................................................................

466

iSCSI Optimization Prerequisites.................................................................................................................................

466

Configuring iSCSI Optimization...................................................................................................................................

466

Displaying iSCSI Optimization Information.................................................................................................................

468

23 Intermediate System to Intermediate System...........................................................................................

470

IS-IS Protocol Overview................................................................................................................................................

470

IS-IS Addressing.............................................................................................................................................................

470

Multi-Topology IS-IS.......................................................................................................................................................

471

Transition Mode........................................................................................................................................................

471

16 Contents

Interface Support.....................................................................................................................................................

472

Adjacencies...............................................................................................................................................................

472

Graceful Restart.............................................................................................................................................................

472

Timers........................................................................................................................................................................

472

Implementation Information..........................................................................................................................................

472

Configuration Information.............................................................................................................................................

473

Configuration Tasks for IS-IS..................................................................................................................................

474

Configuring the Distance of a Route......................................................................................................................

481

Changing the IS-Type..............................................................................................................................................

482

Redistributing IPv4 Routes.....................................................................................................................................

484

Redistributing IPv6 Routes.....................................................................................................................................

485

Configuring Authentication Passwords.................................................................................................................

486

Setting the Overload Bit.........................................................................................................................................

486

Debugging IS-IS.......................................................................................................................................................

487

IS-IS Metric Styles.........................................................................................................................................................

488

Configure Metric Values...............................................................................................................................................

488

Maximum Values in the Routing Table..................................................................................................................

488

Change the IS-IS Metric Style in One Level Only................................................................................................

488

Leaks from One Level to Another..........................................................................................................................

490

Sample Configurations...................................................................................................................................................

491

24 Link Aggregation Control Protocol (LACP)..............................................................................................

493

Introduction to Dynamic LAGs and LACP..................................................................................................................

493

Important Points to Remember.............................................................................................................................

493

LACP Modes............................................................................................................................................................

494

Configuring LACP Commands...............................................................................................................................

494

LACP Configuration Tasks............................................................................................................................................

495

Creating a LAG.........................................................................................................................................................

495

Configuring the LAG Interfaces as Dynamic........................................................................................................

495

Setting the LACP Long Timeout...........................................................................................................................

496

Monitoring and Debugging LACP..........................................................................................................................

496

Shared LAG State Tracking...........................................................................................................................................

497

Configuring Shared LAG State Tracking...............................................................................................................

497

Important Points about Shared LAG State Tracking...........................................................................................

499

LACP Basic Configuration Example............................................................................................................................

499

Configure a LAG on ALPHA...................................................................................................................................

499

25 Layer 2....................................................................................................................................................

508

Manage the MAC Address Table.................................................................................................................................

508

Clearing the MAC Address Table...........................................................................................................................

508

Setting the Aging Time for Dynamic Entries........................................................................................................

508

Configuring a Static MAC Address........................................................................................................................

509

Displaying the MAC Address Table........................................................................................................................

509

MAC Learning Limit.......................................................................................................................................................

509

Setting the MAC Learning Limit.............................................................................................................................

510

mac learning-limit Dynamic.....................................................................................................................................

510

Contents 17

mac learning-limit mac-address-sticky..................................................................................................................

510

mac learning-limit station-move..............................................................................................................................

511

mac learning-limit no-station-move........................................................................................................................

511

Learning Limit Violation Actions...............................................................................................................................

511

Setting Station Move Violation Actions.................................................................................................................

512

Recovering from Learning Limit and Station Move Violations............................................................................

512

NIC Teaming....................................................................................................................................................................

513

Configure Redundant Pairs...........................................................................................................................................

514

Important Points about Configuring Redundant Pairs.........................................................................................

516

Far-End Failure Detection..............................................................................................................................................

517

FEFD State Changes................................................................................................................................................

518

Configuring FEFD.....................................................................................................................................................

519

Enabling FEFD on an Interface...............................................................................................................................

519

Debugging FEFD......................................................................................................................................................

520

26 Link Layer Discovery Protocol (LLDP).....................................................................................................

522

802.1AB (LLDP) Overview............................................................................................................................................

522

Protocol Data Units.................................................................................................................................................

522

Optional TLVs.................................................................................................................................................................

523

Management TLVs...................................................................................................................................................

523

TIA-1057 (LLDP-MED) Overview................................................................................................................................

525

TIA Organizationally Specific TLVs........................................................................................................................

525

Configure LLDP.............................................................................................................................................................

529

Related Configuration Tasks...................................................................................................................................

529

Important Points to Remember.............................................................................................................................

529

LLDP Compatibility..................................................................................................................................................

530

CONFIGURATION versus INTERFACE Configurations............................................................................................

530

Enabling LLDP................................................................................................................................................................

530

Disabling and Undoing LLDP...................................................................................................................................

531

Enabling LLDP on Management Ports.........................................................................................................................

531

Disabling and Undoing LLDP on Management Ports...........................................................................................

531

Advertising TLVs.............................................................................................................................................................

531

Storing and Viewing Unrecognized LLDP TLVs.........................................................................................................

533

Reserved Unrecognized LLDP TLVs.....................................................................................................................

533

Organizational Specific Unrecognized LLDP TLVs..............................................................................................

533

Viewing Unrecognized LLDP TLVs........................................................................................................................

533

Viewing the LLDP Configuration.................................................................................................................................

534

Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................

534

Examples of Viewing Information Advertised by Neighbors...............................................................................

534

Configuring LLDPDU Intervals.....................................................................................................................................

536

Configuring LLDP Notification Interval.......................................................................................................................

537

Configuring LLDP Notification Interval.......................................................................................................................

537

Configuring Transmit and Receive Mode....................................................................................................................

537

Configuring the Time to Live Value.............................................................................................................................

538

Debugging LLDP............................................................................................................................................................

539

Relevant Management Objects...................................................................................................................................

540

18 Contents

27 Microsoft Network Load Balancing..........................................................................................................

545

NLB Unicast Mode Scenario........................................................................................................................................

545

NLB Multicast Mode Scenario.....................................................................................................................................

545

Limitations of the NLB Feature....................................................................................................................................

546

Microsoft Clustering......................................................................................................................................................

546

Enable and Disable VLAN Flooding ............................................................................................................................

546

Configuring a Switch for NLB .....................................................................................................................................

546

Enabling a Switch for Multicast NLB....................................................................................................................

547

28 Multicast Source Discovery Protocol (MSDP).........................................................................................

548

Protocol Overview.........................................................................................................................................................

548

Anycast RP.....................................................................................................................................................................

549

Implementation Information.........................................................................................................................................

550

Configure Multicast Source Discovery Protocol........................................................................................................

550

Related Configuration Tasks...................................................................................................................................

550

Enable MSDP.................................................................................................................................................................

554

Manage the Source-Active Cache..............................................................................................................................

555

Viewing the Source-Active Cache........................................................................................................................

555

Limiting the Source-Active Cache........................................................................................................................

555

Clearing the Source-Active Cache........................................................................................................................

556

Enabling the Rejected Source-Active Cache.......................................................................................................

556

Accept Source-Active Messages that Fail the RFP Check.....................................................................................

556

Specifying Source-Active Messages...........................................................................................................................

559

Limiting the Source-Active Messages from a Peer...................................................................................................

560

Preventing MSDP from Caching a Local Source.......................................................................................................

560

Preventing MSDP from Caching a Remote Source...................................................................................................

561

Preventing MSDP from Advertising a Local Source..................................................................................................

561

Logging Changes in Peership States...........................................................................................................................

562

Terminating a Peership..................................................................................................................................................

562

Clearing Peer Statistics.................................................................................................................................................

563

Debugging MSDP..........................................................................................................................................................

563

MSDP with Anycast RP................................................................................................................................................

564

Configuring Anycast RP...............................................................................................................................................

565

Reducing Source-Active Message Flooding........................................................................................................

566

Specifying the RP Address Used in SA Messages..............................................................................................

566

MSDP Sample Configurations.....................................................................................................................................

568

32 Multicast Listener Discovery Protocol......................................................................................................

571

MLD Version 1.................................................................................................................................................................

571

MLD Querier Router.......................................................................................................................................................

571

Joining a Multicast Group.............................................................................................................................................

572

Leaving a Multicast Group............................................................................................................................................

572

MLD version 2................................................................................................................................................................

572

MLD timers.....................................................................................................................................................................

574

Reducing Host Response Burstiness....................................................................................................................

575

Contents 19

Clearing MLD groups.....................................................................................................................................................

575

Debugging MLD.............................................................................................................................................................

575

Explicit Tracking.............................................................................................................................................................

575

Reducing Leave Latency...............................................................................................................................................

575

Displaying MLD groups table........................................................................................................................................

576

Displaying MLD Interfaces............................................................................................................................................

576

30 Multiple Spanning Tree Protocol (MSTP).................................................................................................

577

Protocol Overview.........................................................................................................................................................

577

Spanning Tree Variations...............................................................................................................................................

578

Implementation Information....................................................................................................................................

578

Configure Multiple Spanning Tree Protocol................................................................................................................

578

Related Configuration Tasks...................................................................................................................................

579

Enable Multiple Spanning Tree Globally.......................................................................................................................

579

Adding and Removing Interfaces.................................................................................................................................

579

Creating Multiple Spanning Tree Instances................................................................................................................

580

Influencing MSTP Root Selection................................................................................................................................

581

Interoperate with Non-Dell Bridges.............................................................................................................................

582

Changing the Region Name or Revision.....................................................................................................................

582

Modifying Global Parameters.......................................................................................................................................

582

Modifying the Interface Parameters...........................................................................................................................

584

Configuring an EdgePort..............................................................................................................................................

585

Flush MAC Addresses after a Topology Change.......................................................................................................

585

MSTP Sample Configurations......................................................................................................................................

586

Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-

 

ConfigurationSFTOS Example Running-Configuration.......................................................................................

586

Debugging and Verifying MSTP Configurations........................................................................................................

590

31 Multicast Features....................................................................................................................................

592

Enabling IP Multicast.....................................................................................................................................................

592

Implementation Information..........................................................................................................................................

592

Multicast Policies...........................................................................................................................................................

593

IPv4 Multicast Policies............................................................................................................................................

593

Understanding Multicast Traceroute (mtrace)..........................................................................................................

600

Important Points to Remember..............................................................................................................................

601

Printing Multicast Traceroute (mtrace) Paths............................................................................................................

601

Supported Error Codes.................................................................................................................................................

602

mtrace Scenarios...........................................................................................................................................................

603

32 Multicast Listener Discovery Protocol.....................................................................................................

609

MLD Version 1................................................................................................................................................................

609

MLD Querier Router......................................................................................................................................................

609

Joining a Multicast Group..............................................................................................................................................

610

Leaving a Multicast Group............................................................................................................................................

610

MLD version 2.................................................................................................................................................................

610

MLD timers......................................................................................................................................................................

612

20 Contents

Reducing Host Response Burstiness.....................................................................................................................

613

Clearing MLD groups.....................................................................................................................................................

613

Debugging MLD..............................................................................................................................................................

613

Explicit Tracking..............................................................................................................................................................

613

Reducing Leave Latency................................................................................................................................................

613

Displaying MLD groups table.........................................................................................................................................

614

Displaying MLD Interfaces.............................................................................................................................................

614

MLD Snooping................................................................................................................................................................

614

Enable MLD Snooping.............................................................................................................................................

614

Disable MLD Snooping.............................................................................................................................................

615

Configure the switch as a querier..........................................................................................................................

615

Specify port as connected to multicast router.....................................................................................................

615

Enable Snooping Explicit Tracking..........................................................................................................................

616

Display the MLD Snooping Table............................................................................................................................

616

33 Object Tracking........................................................................................................................................

617

Object Tracking Overview.............................................................................................................................................

617

Track Layer 2 Interfaces..........................................................................................................................................

618

Track Layer 3 Interfaces..........................................................................................................................................

618

Track IPv4 and IPv6 Routes....................................................................................................................................

619

Set Tracking Delays.................................................................................................................................................

620

VRRP Object Tracking............................................................................................................................................

620

Object Tracking Configuration.....................................................................................................................................

620

Tracking a Layer 2 Interface...................................................................................................................................

620

Tracking a Layer 3 Interface....................................................................................................................................

621

Track an IPv4/IPv6 Route......................................................................................................................................

623

Displaying Tracked Objects...........................................................................................................................................

626

34 Open Shortest Path First (OSPFv2 and OSPFv3)....................................................................................

628

Protocol Overview.........................................................................................................................................................

628

Autonomous System (AS) Areas...........................................................................................................................

628

Area Types................................................................................................................................................................

629

Networks and Neighbors........................................................................................................................................

630

Router Types............................................................................................................................................................

630

Designated and Backup Designated Routers.......................................................................................................

632

Link-State Advertisements (LSAs)........................................................................................................................

632

Router Priority and Cost.........................................................................................................................................

633

OSPF with Dell EMC Networking OS.........................................................................................................................

634

Graceful Restart......................................................................................................................................................

635

Fast Convergence (OSPFv2, IPv4 Only)..............................................................................................................

636

Multi-Process OSPFv2 with VRF..........................................................................................................................

636

RFC-2328 Compliant OSPF Flooding...................................................................................................................

636

OSPF ACK Packing..................................................................................................................................................

637

Setting OSPF Adjacency with Cisco Routers.......................................................................................................

637

Configuration Information.............................................................................................................................................

638

Configuration Task List for OSPFv2 (OSPF for IPv4)........................................................................................

638

Contents 21

OSPFv3 NSSA...............................................................................................................................................................

652

NSSA Options..........................................................................................................................................................

652

Configuration Task List for OSPFv3 (OSPF for IPv6)..............................................................................................

653

Enabling IPv6 Unicast Routing...............................................................................................................................

653

Applying cost for OSPFv3......................................................................................................................................

654

Assigning IPv6 Addresses on an Interface...........................................................................................................

654

Assigning Area ID on an Interface..........................................................................................................................

654

Assigning OSPFv3 Process ID and Router ID Globally........................................................................................

655

Assigning OSPFv3 Process ID and Router ID to a VRF......................................................................................

655

Configuring Stub Areas...........................................................................................................................................

656

Configuring Passive-Interface................................................................................................................................

656

Redistributing Routes..............................................................................................................................................

656

Configuring a Default Route...................................................................................................................................

657

Enabling OSPFv3 Graceful Restart.......................................................................................................................

657

OSPFv3 Authentication Using IPsec.....................................................................................................................

659

Troubleshooting OSPFv3........................................................................................................................................

665

35 Policy-based Routing (PBR)....................................................................................................................

667

Overview.........................................................................................................................................................................

667

Implementing PBR.........................................................................................................................................................

668

Configuration Task List for Policy-based Routing......................................................................................................

668

PBR Exceptions (Permit).......................................................................................................................................

669

Create a Redirect List.............................................................................................................................................

669

Create a Rule for a Redirect-list.............................................................................................................................

669

Apply a Redirect-list to an Interface using a Redirect-group..............................................................................

671

Sample Configuration....................................................................................................................................................

673

Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View Redirect-List GOLD......

674

36 PIM Sparse-Mode (PIM-SM)..................................................................................................................

678

Implementation Information..........................................................................................................................................

678

Protocol Overview.........................................................................................................................................................

678

Requesting Multicast Traffic...................................................................................................................................

678

Refuse Multicast Traffic..........................................................................................................................................

679

Send Multicast Traffic.............................................................................................................................................

679

Configuring PIM-SM.....................................................................................................................................................

679

Related Configuration Tasks...................................................................................................................................

680

Enable PIM-SM..............................................................................................................................................................

680

Configuring S,G Expiry Timers.....................................................................................................................................

682

Configuring a Static Rendezvous Point......................................................................................................................

682

Overriding Bootstrap Router Updates..................................................................................................................

683

Configuring a Designated Router.................................................................................................................................

683

Creating Multicast Boundaries and Domains.............................................................................................................

685

37 PIM Source-Speci€c Mode (PIM-SSM)..................................................................................................

686

Implementation Information.........................................................................................................................................

686

Important Points to Remember.............................................................................................................................

686

22 Contents

Configure PIM-SSM......................................................................................................................................................

687

Related Configuration Tasks...................................................................................................................................

687

Enabling PIM-SSM........................................................................................................................................................

687

Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................

687

Configuring PIM-SSM with IGMPv2.....................................................................................................................

688

Electing an RP using the BSR Mechanism.................................................................................................................

689

Enabling RP to Server Specific Multicast Groups...............................................................................................

689

38 Port Monitoring........................................................................................................................................

691

Important Points to Remember....................................................................................................................................

691

Port Monitoring..............................................................................................................................................................

692

Configuring Port Monitoring........................................................................................................................................

693

Configuring Monitor Multicast Queue........................................................................................................................

694

Enabling Flow-Based Monitoring.................................................................................................................................

695

Remote Port Mirroring..................................................................................................................................................

696

Remote Port Mirroring Example............................................................................................................................

696

Configuring Remote Port Mirroring.......................................................................................................................

697

Displaying Remote-Port Mirroring Configurations...............................................................................................

699

Configuring the Sample Remote Port Mirroring..................................................................................................

699

Encapsulated Remote Port Monitoring.......................................................................................................................

702

ERPM Behavior on a typical Dell EMC Networking OS ...........................................................................................

704

Decapsulation of ERPM packets at the Destination IP/ Analyzer.....................................................................

704

Port Monitoring on VLT.................................................................................................................................................

705

VLT Non-fail over Scenario.....................................................................................................................................

705

VLT Fail-over Scenario............................................................................................................................................

706

RPM over VLT Scenarios........................................................................................................................................

706

39 Per-VLAN Spanning Tree Plus (PVST+)...................................................................................................

708

Protocol Overview.........................................................................................................................................................

708

Implementation Information..........................................................................................................................................

709

Configure Per-VLAN Spanning Tree Plus....................................................................................................................

709

Related Configuration Tasks...................................................................................................................................

709

Enabling PVST+.............................................................................................................................................................

709

Disabling PVST+.............................................................................................................................................................

710

Influencing PVST+ Root Selection...............................................................................................................................

710

Modifying Global PVST+ Parameters...........................................................................................................................

712

Modifying Interface PVST+ Parameters......................................................................................................................

713

Configuring an EdgePort...............................................................................................................................................

714

PVST+ in Multi-Vendor Networks................................................................................................................................

714

Enabling PVST+ Extend System ID..............................................................................................................................

714

PVST+ Sample Configurations......................................................................................................................................

715

40 Quality of Service (QoS)..........................................................................................................................

718

Implementation Information..........................................................................................................................................

720

Port-Based QoS Configurations..................................................................................................................................

720

Setting dot1p Priorities for Incoming Traffic.........................................................................................................

720

Contents 23

Honoring dot1p Priorities on Ingress Traffic...........................................................................................................

721

Configuring Port-Based Rate Policing...................................................................................................................

722

Configuring Port-Based Rate Shaping..................................................................................................................

722

Policy-Based QoS Configurations................................................................................................................................

723

Classify Traffic..........................................................................................................................................................

723

Dot1p to Queue Mapping Requirement.................................................................................................................

727

Create a QoS Policy.................................................................................................................................................

727

DSCP Color Maps....................................................................................................................................................

730

Create Policy Maps..................................................................................................................................................

732

Enabling QoS Rate Adjustment....................................................................................................................................

735

Enabling Strict-Priority Queueing................................................................................................................................

736

Queue Classification Requirements for PFC Functionality.......................................................................................

736

Support for marking dot1p value in L3 Input Qos Policy...........................................................................................

736

Weighted Random Early Detection..............................................................................................................................

737

Creating WRED Profiles..........................................................................................................................................

738

Applying a WRED Profile to Traffic........................................................................................................................

738

Displaying Default and Configured WRED Profiles..............................................................................................

739

Displaying WRED Drop Statistics...........................................................................................................................

739

Displaying egress–queue Statistics.......................................................................................................................

739

Pre-Calculating Available QoS CAM Space................................................................................................................

740

Specifying Policy-Based Rate Shaping in Packets Per Second................................................................................

741

Configuring Policy-Based Rate Shaping......................................................................................................................

741

Configuring Weights and ECN for WRED ..................................................................................................................

742

Global Service Pools With WRED and ECN Settings..........................................................................................

742

Configuring WRED and ECN Attributes......................................................................................................................

743

Guidelines for Configuring ECN for Classifying and Color-Marking Packets.........................................................

744

Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class..................................

745

Classifying Incoming Packets Using ECN and Color-Marking............................................................................

745

Sample configuration to mark non-ecn packets as “yellow” with single traffic class......................................

747

Applying Layer 2 Match Criteria on a Layer 3 Interface............................................................................................

748

Managing Hardware Buffer Statistics....................................................................................................................

748

Enabling Buffer Statistics Tracking .............................................................................................................................

749

41 Routing Information Protocol (RIP)..........................................................................................................

752

Protocol Overview.........................................................................................................................................................

752

RIPv1..........................................................................................................................................................................

752

RIPv2.........................................................................................................................................................................

752

Implementation Information..........................................................................................................................................

753

Configuration Information.............................................................................................................................................

753

Configuration Task List............................................................................................................................................

753

RIP Configuration Example.....................................................................................................................................

760

42 Remote Monitoring (RMON)...................................................................................................................

765

Implementation Information..........................................................................................................................................

765

Fault Recovery...............................................................................................................................................................

765

Setting the RMON Alarm........................................................................................................................................

766

24 Contents

Configuring an RMON Event.................................................................................................................................

766

Configuring RMON Collection Statistics...............................................................................................................

767

Configuring the RMON Collection History............................................................................................................

767

43 Rapid Spanning Tree Protocol (RSTP).....................................................................................................

769

Protocol Overview.........................................................................................................................................................

769

Configuring Rapid Spanning Tree.................................................................................................................................

769

Related Configuration Tasks...................................................................................................................................

769

Important Points to Remember....................................................................................................................................

769

RSTP and VLT..........................................................................................................................................................

770

Configuring Interfaces for Layer 2 Mode....................................................................................................................

770

Enabling Rapid Spanning Tree Protocol Globally.........................................................................................................

771

Adding and Removing Interfaces.................................................................................................................................

773

Modifying Global Parameters........................................................................................................................................

773

Enabling SNMP Traps for Root Elections and Topology Changes.....................................................................

775

Modifying Interface Parameters...................................................................................................................................

775

Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................

775

Influencing RSTP Root Selection.................................................................................................................................

775

Configuring an EdgePort...............................................................................................................................................

776

Configuring Fast Hellos for Link State Detection.......................................................................................................

777

44 Software-De€ned Networking (SDN)......................................................................................................

778

45 Security...................................................................................................................................................

779

AAA Accounting.............................................................................................................................................................

779

Configuration Task List for AAA Accounting........................................................................................................

779

AAA Authentication........................................................................................................................................................

781

Configuration Task List for AAA Authentication...................................................................................................

782

Obscuring Passwords and Keys...................................................................................................................................

785

AAA Authorization.........................................................................................................................................................

785

Privilege Levels Overview.......................................................................................................................................

785

Configuration Task List for Privilege Levels..........................................................................................................

786

RADIUS...........................................................................................................................................................................

790

RADIUS Authentication...........................................................................................................................................

790

Configuration Task List for RADIUS.......................................................................................................................

791

Support for Change of Authorization and Disconnect Messages packets......................................................

795

TACACS+........................................................................................................................................................................

806

Configuration Task List for TACACS+...................................................................................................................

806

TACACS+ Remote Authentication........................................................................................................................

808

Command Authorization.........................................................................................................................................

809

Protection from TCP Tiny and Overlapping Fragment Attacks...............................................................................

809

Enabling SCP and SSH.................................................................................................................................................

809

Using SCP with SSH to Copy a Software Image.................................................................................................

810

Removing the RSA Host Keys and Zeroizing Storage .........................................................................................

811

Configuring When to Re-generate an SSH Key ...................................................................................................

811

Configuring the SSH Server Key Exchange Algorithm........................................................................................

812

Contents 25

Configuring the HMAC Algorithm for the SSH Server........................................................................................

812

Configuring the SSH Server Cipher List................................................................................................................

813

Configuring DNS in the SSH Server......................................................................................................................

813

Secure Shell Authentication....................................................................................................................................

814

Troubleshooting SSH................................................................................................................................................

816

Telnet................................................................................................................................................................................

816

VTY Line and Access-Class Configuration..................................................................................................................

817

VTY Line Local Authentication and Authorization................................................................................................

817

VTY Line Remote Authentication and Authorization...........................................................................................

818

VTY MAC-SA Filter Support...................................................................................................................................

818

Role-Based Access Control...........................................................................................................................................

818

Overview of RBAC...................................................................................................................................................

819

User Roles.................................................................................................................................................................

821

AAA Authentication and Authorization for Roles.................................................................................................

824

Role Accounting.......................................................................................................................................................

827

Display Information About User Roles...................................................................................................................

828

Two Factor Authentication (2FA)................................................................................................................................

829

Handling Access-Challenge Message...................................................................................................................

829

Configuring Challenge Response Authentication for SSHv2.............................................................................

829

SMS-OTP Mechanism............................................................................................................................................

830

Configuring the System to Drop Certain ICMP Reply Messages............................................................................

830

Dell EMC Networking OS Security Hardening...........................................................................................................

832

Dell EMC Networking OS Image Verification.......................................................................................................

832

Startup Configuration Verification.........................................................................................................................

833

Configuring the root User Password.....................................................................................................................

834

Locking Access to GRUB Interface.......................................................................................................................

835

Enabling User Lockout for Failed Login Attempts...............................................................................................

836

46 Service Provider Bridging........................................................................................................................

837

VLAN Stacking...............................................................................................................................................................

837

Important Points to Remember.............................................................................................................................

838

Configure VLAN Stacking.......................................................................................................................................

838

Creating Access and Trunk Ports..........................................................................................................................

839

Enable VLAN-Stacking for a VLAN.......................................................................................................................

840

Configuring the Protocol Type Value for the Outer VLAN Tag..........................................................................

840

Configuring Dell EMC Networking OS Options for Trunk Ports........................................................................

840

Debugging VLAN Stacking......................................................................................................................................

841

VLAN Stacking in Multi-Vendor Networks...........................................................................................................

842

VLAN Stacking Packet Drop Precedence..................................................................................................................

845

Enabling Drop Eligibility...........................................................................................................................................

845

Honoring the Incoming DEI Value..........................................................................................................................

846

Marking Egress Packets with a DEI Value............................................................................................................

847

Dynamic Mode CoS for VLAN Stacking.....................................................................................................................

847

Mapping C-Tag to S-Tag dot1p Values...................................................................................................................

848

Layer 2 Protocol Tunneling...........................................................................................................................................

849

Implementation Information....................................................................................................................................

851

26 Contents

Enabling Layer 2 Protocol Tunneling......................................................................................................................

851

Specifying a Destination MAC Address for BPDUs.............................................................................................

852

Setting Rate-Limit BPDUs......................................................................................................................................

852

Debugging Layer 2 Protocol Tunneling..................................................................................................................

853

Provider Backbone Bridging.........................................................................................................................................

853

47 sFlow.......................................................................................................................................................

854

Overview.........................................................................................................................................................................

854

Implementation Information..........................................................................................................................................

854

Important Points to Remember.............................................................................................................................

855

Enabling Extended sFlow..............................................................................................................................................

855

Enabling and Disabling sFlow on an Interface............................................................................................................

856

Enabling sFlow Max-Header Size Extended..............................................................................................................

856

sFlow Show Commands...............................................................................................................................................

857

Displaying Show sFlow Global................................................................................................................................

857

Displaying Show sFlow on an Interface................................................................................................................

858

Displaying Show sFlow on a Stack-unit................................................................................................................

858

Configuring Specify Collectors....................................................................................................................................

859

Changing the Polling Intervals......................................................................................................................................

859

Back-Off Mechanism....................................................................................................................................................

859

sFlow on LAG ports.......................................................................................................................................................

860

Enabling Extended sFlow..............................................................................................................................................

860

Important Points to Remember..............................................................................................................................

861

48 Simple Network Management Protocol (SNMP).....................................................................................

862

Protocol Overview.........................................................................................................................................................

863

Implementation Information..........................................................................................................................................

863

SNMPv3 Compliance With FIPS.................................................................................................................................

863

Configuration Task List for SNMP...............................................................................................................................

864

Related Configuration Tasks...................................................................................................................................

864

Important Points to Remember...................................................................................................................................

865

Set up SNMP.................................................................................................................................................................

865

Creating a Community............................................................................................................................................

865

Setting Up User-Based Security (SNMPv3).......................................................................................................

865

Reading Managed Object Values.................................................................................................................................

867

Writing Managed Object Values...................................................................................................................................

867

Configuring Contact and Location Information using SNMP...................................................................................

868

Subscribing to Managed Object Value Updates using SNMP.................................................................................

868

Enabling a Subset of SNMP Traps..............................................................................................................................

869

Enabling an SNMP Agent to Notify Syslog Server Failure........................................................................................

873

Copy Configuration Files Using SNMP........................................................................................................................

874

Copying a Configuration File...................................................................................................................................

875

Copying Configuration Files via SNMP.................................................................................................................

876

Copying the Startup-Config Files to the Running-Config..................................................................................

876

Copying the Startup-Config Files to the Server via FTP....................................................................................

877

Copying the Startup-Config Files to the Server via TFTP..................................................................................

877

Contents 27

Copy a Binary File to the Startup-Configuration..................................................................................................

878

Additional MIB Objects to View Copy Statistics..................................................................................................

878

Obtaining a Value for MIB Objects.........................................................................................................................

879

MIB Support to Display Reason for Last System Reboot.........................................................................................

879

Viewing the Reason for Last System Reboot Using SNMP...............................................................................

880

MIB Support for Power Monitoring.............................................................................................................................

880

MIB Support to Display the Available Memory Size on Flash...................................................................................

881

Viewing the Available Flash Memory Size.............................................................................................................

881

MIB Support to Display the Software Core Files Generated by the System..........................................................

881

Viewing the Software Core Files Generated by the System..............................................................................

882

SNMP Support for WRED Green/Yellow/Red Drop Counters................................................................................

882

MIB Support to Display the Available Partitions on Flash.........................................................................................

883

Viewing the Available Partitions on Flash.............................................................................................................

884

MIB Support to Display Egress Queue Statistics.......................................................................................................

885

MIB Support to ECMP Group Count..........................................................................................................................

885

Viewing the ECMP Group Count Information......................................................................................................

885

MIB Support for entAliasMappingTable .....................................................................................................................

888

Viewing the entAliasMappingTable MIB................................................................................................................

888

MIB Support for LAG....................................................................................................................................................

888

Viewing the LAG MIB..............................................................................................................................................

890

MIB Support to Display Unrecognized LLDP TLVs...................................................................................................

890

MIB Support to Display Reserved Unrecognized LLDP TLVs............................................................................

890

MIB Support to Display Organizational Specific Unrecognized LLDP TLVs......................................................

891

MIB Support to Display Unrecognized LLDP TLVs....................................................................................................

892

Viewing the Details of Reserved Unrecognized LLDP TLVs..............................................................................

892

MIB Support for LLDP Notification Interval...............................................................................................................

893

Manage VLANs using SNMP.......................................................................................................................................

893

Creating a VLAN......................................................................................................................................................

893

Assigning a VLAN Alias...........................................................................................................................................

893

Displaying the Ports in a VLAN..............................................................................................................................

894

Add Tagged and Untagged Ports to a VLAN.......................................................................................................

894

Managing Overload on Startup....................................................................................................................................

895

Enabling and Disabling a Port using SNMP................................................................................................................

895

Fetch Dynamic MAC Entries using SNMP.................................................................................................................

896

Example of Deriving the Interface Index Number......................................................................................................

897

MIB Objects for Viewing the System Image on Flash Partitions.......................................................................

897

Monitoring BGP sessions via SNMP...........................................................................................................................

897

Monitor Port-Channels.................................................................................................................................................

899

Troubleshooting SNMP Operation..............................................................................................................................

900

Transceiver Monitoring..................................................................................................................................................

901

49 Stacking..................................................................................................................................................

903

Stacking Overview........................................................................................................................................................

903

Stack Management Roles.......................................................................................................................................

903

Stack Master Election.............................................................................................................................................

904

Virtual IP...................................................................................................................................................................

905

28 Contents

Failover Roles...........................................................................................................................................................

905

MAC Addressing on Stacks....................................................................................................................................

905

Stacking LAG...........................................................................................................................................................

906

Supported Stacking Topologies.............................................................................................................................

906

High Availability on Stacks......................................................................................................................................

907

Management Access on Stacks.............................................................................................................................

907

Important Points to Remember...................................................................................................................................

908

Stacking Installation Tasks............................................................................................................................................

908

Create a Stack.........................................................................................................................................................

908

Add Units to an Existing Stack...............................................................................................................................

912

Split a Stack..............................................................................................................................................................

914

Stacking Configuration Tasks........................................................................................................................................

914

Assigning Unit Numbers to Units in an Stack.......................................................................................................

915

Creating a Virtual Stack Unit on a Stack...............................................................................................................

915

Displaying Information about a Stack.....................................................................................................................

915

Influencing Management Unit Selection on a Stack............................................................................................

917

Managing Redundancy on a Stack.........................................................................................................................

917

Resetting a Unit on a Stack....................................................................................................................................

918

Verify a Stack Configuration.........................................................................................................................................

918

Displaying the Status of Stacking Ports................................................................................................................

918

Remove Units or Front End Ports from a Stack.........................................................................................................

919

Removing a Unit from a Stack................................................................................................................................

919

Removing Front End Port Stacking.......................................................................................................................

919

Troubleshoot a Stack.....................................................................................................................................................

920

Recover from Stack Link Flaps..............................................................................................................................

920

Recover from a Card Problem State on a Stack..................................................................................................

920

50 Storm Control..........................................................................................................................................

921

Configure Storm Control...............................................................................................................................................

921

Configuring Storm Control from INTERFACE Mode............................................................................................

921

Configuring Storm Control from CONFIGURATION Mode................................................................................

922

Detect PFC Storm.........................................................................................................................................................

922

Restore Queue Drop State...........................................................................................................................................

923

PFC Storm......................................................................................................................................................................

923

View Details of Storm Control PFC.............................................................................................................................

923

51 Spanning Tree Protocol (STP)..................................................................................................................

925

Protocol Overview.........................................................................................................................................................

925

Configure Spanning Tree...............................................................................................................................................

926

Related Configuration Tasks...................................................................................................................................

926

Important Points to Remember...................................................................................................................................

926

Configuring Interfaces for Layer 2 Mode....................................................................................................................

927

Enabling Spanning Tree Protocol Globally...................................................................................................................

928

Adding an Interface to the Spanning Tree Group......................................................................................................

930

Modifying Global Parameters.......................................................................................................................................

930

Modifying Interface STP Parameters...........................................................................................................................

931

Contents 29

Enabling PortFast...........................................................................................................................................................

931

Prevent Network Disruptions with BPDU Guard.................................................................................................

932

Selecting STP Root.......................................................................................................................................................

934

STP Root Guard.............................................................................................................................................................

934

Root Guard Scenario...............................................................................................................................................

934

Configuring Root Guard..........................................................................................................................................

935

Enabling SNMP Traps for Root Elections and Topology Changes...........................................................................

936

Configuring Spanning Trees as Hitless........................................................................................................................

936

STP Loop Guard.............................................................................................................................................................

936

Configuring Loop Guard..........................................................................................................................................

938

Displaying STP Guard Configuration...........................................................................................................................

938

52 SupportAssist..........................................................................................................................................

940

Configuring SupportAssist Using a Configuration Wizard.........................................................................................

941

Configuring SupportAssist Manually............................................................................................................................

941

Configuring SupportAssist Activity.............................................................................................................................

943

Configuring SupportAssist Company..........................................................................................................................

944

Configuring SupportAssist Person..............................................................................................................................

945

Configuring SupportAssist Server...............................................................................................................................

945

Viewing SupportAssist Configuration.........................................................................................................................

946

53 System Time and Date.............................................................................................................................

948

Network Time Protocol.................................................................................................................................................

948

Protocol Overview...................................................................................................................................................

949

Configure the Network Time Protocol..................................................................................................................

949

Enabling NTP...........................................................................................................................................................

950

Configuring NTP Broadcasts.................................................................................................................................

950

Disabling NTP on an Interface................................................................................................................................

951

Configuring a Source IP Address for NTP Packets..............................................................................................

951

Configuring NTP Authentication............................................................................................................................

951

Configuring NTP control key password................................................................................................................

954

Dell EMC Networking OS Time and Date...................................................................................................................

954

Configuration Task List ..........................................................................................................................................

954

Setting the Time and Date for the Switch Software Clock...............................................................................

954

Setting the Timezone..............................................................................................................................................

955

Set Daylight Saving Time........................................................................................................................................

955

Setting Daylight Saving Time Once.......................................................................................................................

955

Setting Recurring Daylight Saving Time...............................................................................................................

956

54 Tunneling.................................................................................................................................................

958

Configuring a Tunnel.....................................................................................................................................................

958

Configuring Tunnel Keepalive Settings........................................................................................................................

959

Configuring a Tunnel Interface.....................................................................................................................................

960

Configuring Tunnel Allow-Remote Decapsulation......................................................................................................

960

Configuring Tunnel source anylocal Decapsulation....................................................................................................

961

Guidelines for Configuring Multipoint Receive-Only Tunnels....................................................................................

961

30 Contents

Loading...
+ 1145 hidden pages