Dell S4048T Configuration Manual

Dell Configuration Guide for the S4048T–ON System
9.10(0.1)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how
to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2016 - 05
Rev. A00
Contents
1 About this Guide......................................................................................................................37
Audience.....................................................................................................................................37
Conventions...............................................................................................................................37
Related Documents................................................................................................................. 38
2 Configuration Fundamentals............................................................................................... 39
Accessing the Command Line...............................................................................................39
CLI Modes..................................................................................................................................40
Navigating CLI Modes........................................................................................................41
The do Command....................................................................................................................45
Undoing Commands............................................................................................................... 45
Obtaining Help..........................................................................................................................46
Entering and Editing Commands..........................................................................................46
Command History....................................................................................................................47
Filtering show Command Outputs.......................................................................................48
Example of the grep Keyword......................................................................................... 48
Multiple Users in Configuration Mode.................................................................................49
3 Getting Started........................................................................................................................50
Console Access.........................................................................................................................51
Serial Console...................................................................................................................... 51
Accessing the CLI Interface and Running Scripts Using SSH..........................................52
Entering CLI commands Using an SSH Connection...................................................52
Executing Local CLI Scripts Using an SSH Connection..............................................53
Default Configuration..............................................................................................................53
Configuring a Host Name.......................................................................................................53
Accessing the System Remotely........................................................................................... 54
Accessing the System Remotely..................................................................................... 54
Configure the Management Port IP Address................................................................54
Configure a Management Route.....................................................................................55
Configuring a Username and Password........................................................................ 55
Configuring the Enable Password.........................................................................................55
Configuration File Management........................................................................................... 56
Copy Files to and from the System................................................................................ 56
Mounting an NFS File System...........................................................................................57
Save the Running-Configuration.................................................................................... 59
Configure the Overload Bit for a Startup Scenario..................................................... 59
Viewing Files........................................................................................................................ 59
9.10(0.1)
3
Compressing Configuration Files....................................................................................61
Managing the File System.......................................................................................................64
Enabling Software Features on Devices Using a Command Option............................ 64
View Command History..........................................................................................................65
Upgrading Dell Networking OS.............................................................................................65
Verify Software Images Before Installation.........................................................................66
Using HTTP for File Transfers.................................................................................................67
4 Management........................................................................................................................... 69
Configuring Privilege Levels...................................................................................................69
Creating a Custom Privilege Level..................................................................................70
Removing a Command from EXEC Mode.................................................................... 70
Moving a Command from EXEC Privilege Mode to EXEC Mode............................. 70
Allowing Access to CONFIGURATION Mode Commands........................................ 70
Allowing Access to Different Modes............................................................................... 71
Applying a Privilege Level to a Username......................................................................73
Applying a Privilege Level to a Terminal Line................................................................73
Configuring Logging................................................................................................................73
Audit and Security Logs.....................................................................................................74
Configuring Logging Format ..........................................................................................75
Display the Logging Buffer and the Logging Configuration......................................76
Setting Up a Secure Connection to a Syslog Server................................................... 77
Sending System Messages to a Syslog Server.............................................................. 78
Track Login Activity..................................................................................................................78
Restrictions for Tracking Login Activity......................................................................... 79
Configuring Login Activity Tracking............................................................................... 79
Display Login Statistics...................................................................................................... 79
Limit Concurrent Login Sessions...........................................................................................81
Restrictions for Limiting the Number of Concurrent Sessions................................. 81
Configuring Concurrent Session Limit.......................................................................... 82
Enabling the System to Clear Existing Sessions...........................................................82
Log Messages in the Internal Buffer.....................................................................................83
Configuration Task List for System Log Management............................................... 83
Disabling System Logging...................................................................................................... 83
Sending System Messages to a Syslog Server....................................................................84
Configuring a UNIX System as a Syslog Server............................................................84
Changing System Logging Settings..................................................................................... 84
Display the Logging Buffer and the Logging Configuration........................................... 85
Configuring a UNIX Logging Facility Level......................................................................... 86
Synchronizing Log Messages.................................................................................................87
Enabling Timestamp on Syslog Messages.......................................................................... 88
File Transfer Services...............................................................................................................88
9.10(0.1)
4
Configuration Task List for File Transfer Services........................................................89
Enabling the FTP Server.................................................................................................... 89
Configuring FTP Server Parameters............................................................................... 89
Configuring FTP Client Parameters................................................................................90
Terminal Lines...........................................................................................................................90
Denying and Permitting Access to a Terminal Line.....................................................91
Configuring Login Authentication for Terminal Lines................................................ 92
Setting Timeout for EXEC Privilege Mode...........................................................................93
Using Telnet to get to Another Network Device...............................................................94
Lock CONFIGURATION Mode...............................................................................................94
Viewing the Configuration Lock Status......................................................................... 95
Restoring the Factory Default Settings................................................................................ 95
Important Points to Remember...................................................................................... 96
Restoring Factory Default Environment Variables.......................................................96
5 802.1ag..................................................................................................................................... 99
Ethernet CFM............................................................................................................................ 99
Maintenance Domains.......................................................................................................... 100
Maintenance Points................................................................................................................101
Maintenance End Points........................................................................................................101
Implementation Information............................................................................................... 102
Configuring the CFM............................................................................................................. 102
Related Configuration Tasks.......................................................................................... 103
Enable Ethernet CFM.............................................................................................................103
Creating a Maintenance Domain........................................................................................ 103
Creating a Maintenance Association..................................................................................104
Create Maintenance Points..................................................................................................104
Creating a Maintenance End Point...............................................................................104
Creating a Maintenance Intermediate Point...............................................................105
Displaying the MP Databases.........................................................................................105
Continuity Check Messages.................................................................................................106
Enabling CCM....................................................................................................................107
Enabling Cross-Checking...............................................................................................108
Sending Loopback Messages and Responses..................................................................108
Sending Linktrace Messages and Responses................................................................... 109
Caching Link Trace...........................................................................................................110
Enabling CFM SNMP Traps....................................................................................................111
Displaying Ethernet CFM Statistics......................................................................................112
6 802.1X..................................................................................................................................... 114
Port-Authentication Process................................................................................................116
EAP over RADIUS...............................................................................................................118
9.10(0.1)
5
Configuring 802.1X.................................................................................................................118
Related Configuration Tasks...........................................................................................118
Important Points to Remember...........................................................................................119
Enabling 802.1X...................................................................................................................... 120
Configuring Request Identity Re-Transmissions............................................................. 122
Configuring a Quiet Period after a Failed Authentication........................................122
Forcibly Authorizing or Unauthorizing a Port...................................................................123
Re-Authenticating a Port...................................................................................................... 124
Configuring Timeouts............................................................................................................125
Configuring Dynamic VLAN Assignment with Port Authentication.............................126
Guest and Authentication-Fail VLANs................................................................................127
Configuring a Guest VLAN..............................................................................................128
Configuring an Authentication-Fail VLAN...................................................................128
7 Access Control List (ACL) VLAN Groups and Content Addressable Memory
(CAM)..........................................................................................................................................130
Optimizing CAM Utilization During the Attachment of ACLs to VLANs.....................130
Guidelines for Configuring ACL VLAN Groups................................................................. 131
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.. 132
Configuring ACL VLAN Groups......................................................................................132
Configuring FP Blocks for VLAN Parameters..............................................................133
Viewing CAM Usage...............................................................................................................134
Allocating FP Blocks for VLAN Processes..........................................................................135
8 Access Control Lists (ACLs).................................................................................................137
IP Access Control Lists (ACLs)............................................................................................. 138
CAM Usage.........................................................................................................................139
Implementing ACLs on Dell Networking OS..............................................................140
Important Points to Remember...........................................................................................141
Configuration Task List for Route Maps...................................................................... 142
Configuring Match Routes............................................................................................. 144
Configuring Set Conditions............................................................................................146
Configure a Route Map for Route Redistribution...................................................... 147
Configure a Route Map for Route Tagging.................................................................147
Continue Clause............................................................................................................... 148
IP Fragment Handling............................................................................................................148
IP Fragments ACL Examples...........................................................................................149
Layer 4 ACL Rules Examples.......................................................................................... 149
Configure a Standard IP ACL............................................................................................... 150
Configuring a Standard IP ACL Filter.............................................................................151
Configure an Extended IP ACL............................................................................................ 152
Configuring Filters with a Sequence Number............................................................ 152
9.10(0.1)
6
Configuring Filters Without a Sequence Number..................................................... 154
Configure Layer 2 and Layer 3 ACLs.................................................................................. 155
Assign an IP ACL to an Interface......................................................................................... 155
Applying an IP ACL................................................................................................................. 156
Counting ACL Hits............................................................................................................ 157
Configure Ingress ACLs.........................................................................................................157
Configure Egress ACLs..........................................................................................................158
Applying Egress Layer 3 ACLs (Control-Plane)...........................................................159
IP Prefix Lists............................................................................................................................159
Implementation Information......................................................................................... 160
Configuration Task List for Prefix Lists.........................................................................160
ACL Resequencing.................................................................................................................164
Resequencing an ACL or Prefix List..............................................................................165
Route Maps..............................................................................................................................166
Implementation Information..........................................................................................166
Logging of ACL Processes....................................................................................................166
Guidelines for Configuring ACL Logging.................................................................... 168
Configuring ACL Logging............................................................................................... 168
Flow-Based Monitoring Support for ACLs........................................................................169
Behavior of Flow-Based Monitoring............................................................................ 169
Enabling Flow-Based Monitoring.................................................................................. 171
Configuring UDF ACL............................................................................................................ 172
9 Bidirectional Forwarding Detection (BFD).......................................................................176
How BFD Works......................................................................................................................176
BFD Packet Format...........................................................................................................178
BFD Sessions..................................................................................................................... 180
BFD Three-Way Handshake...........................................................................................180
Session State Changes.................................................................................................... 182
Important Points to Remember.......................................................................................... 182
Configure BFD.........................................................................................................................183
Configure BFD for Physical Ports..................................................................................183
Configure BFD for Static Routes................................................................................... 186
Configure BFD for OSPF................................................................................................. 188
Configure BFD for OSPFv3..............................................................................................191
Configure BFD for IS-IS...................................................................................................192
Configure BFD for BGP................................................................................................... 195
Configure BFD for VRRP.................................................................................................202
Configuring Protocol Liveness......................................................................................205
Troubleshooting BFD...................................................................................................... 205
10 Border Gateway Protocol IPv4 (BGPv4)........................................................................ 207
9.10(0.1)
7
Autonomous Systems (AS)................................................................................................... 207
Sessions and Peers.................................................................................................................210
Establish a Session............................................................................................................210
Route Reflectors......................................................................................................................211
BGP Attributes......................................................................................................................... 212
Best Path Selection Criteria............................................................................................ 212
Weight................................................................................................................................. 215
Local Preference...............................................................................................................215
Multi-Exit Discriminators (MEDs)...................................................................................216
Origin...................................................................................................................................217
AS Path................................................................................................................................ 217
Next Hop............................................................................................................................ 218
Multiprotocol BGP..................................................................................................................218
Implement BGP with Dell Networking OS........................................................................219
Additional Path (Add-Path) Support............................................................................. 219
Advertise IGP Cost as MED for Redistributed Routes............................................... 219
Ignore Router-ID in Best-Path Calculation................................................................220
Four-Byte AS Numbers................................................................................................... 220
AS4 Number Representation..........................................................................................221
AS Number Migration...................................................................................................... 222
BGP4 Management Information Base (MIB)...............................................................224
Important Points to Remember.................................................................................... 224
Configuration Information................................................................................................... 225
BGP Configuration.................................................................................................................226
Enabling BGP.....................................................................................................................227
Configuring AS4 Number Representations................................................................ 230
Configuring Peer Groups................................................................................................232
Configuring BGP Fast Fall-Over....................................................................................235
Configuring Passive Peering.......................................................................................... 236
Maintaining Existing AS Numbers During an AS Migration......................................237
Allowing an AS Number to Appear in its Own AS Path............................................ 238
Enabling Graceful Restart...............................................................................................239
Enabling Neighbor Graceful Restart............................................................................ 240
Filtering on an AS-Path Attribute...................................................................................241
Regular Expressions as Filters........................................................................................242
Redistributing Routes...................................................................................................... 244
Enabling Additional Paths...............................................................................................245
Configuring IP Community Lists...................................................................................245
Configuring an IP Extended Community List.............................................................246
Filtering Routes with Community Lists........................................................................247
Manipulating the COMMUNITY Attribute................................................................... 248
Changing MED Attributes...............................................................................................250
9.10(0.1)
8
Changing the LOCAL_PREFERENCE Attribute.......................................................... 250
Configuring the local System or a Different System to be the Next Hop for
BGP-Learned Routes....................................................................................................... 251
Changing the WEIGHT Attribute...................................................................................252
Enabling Multipath........................................................................................................... 252
Filtering BGP Routes........................................................................................................252
Filtering BGP Routes Using Route Maps..................................................................... 254
Filtering BGP Routes Using AS-PATH Information....................................................255
Configuring BGP Route Reflectors...............................................................................256
Aggregating Routes......................................................................................................... 256
Configuring BGP Confederations................................................................................. 257
Enabling Route Flap Dampening...................................................................................257
Changing BGP Timers.....................................................................................................260
Enabling BGP Neighbor Soft-Reconfiguration...........................................................261
Route Map Continue....................................................................................................... 262
Enabling MBGP Configurations...........................................................................................263
BGP Regular Expression Optimization.............................................................................. 263
Debugging BGP......................................................................................................................264
Storing Last and Bad PDUs.............................................................................................265
Capturing PDUs................................................................................................................266
PDU Counters................................................................................................................... 267
Sample Configurations..........................................................................................................267
11 Content Addressable Memory (CAM)............................................................................. 274
CAM Allocation....................................................................................................................... 274
Test CAM Usage..................................................................................................................... 276
View CAM-ACL Settings........................................................................................................277
View CAM Usage.................................................................................................................... 279
CAM Optimization..................................................................................................................279
Troubleshoot CAM Profiling................................................................................................ 279
QoS CAM Region Limitation.......................................................................................... 279
12 Control Plane Policing (CoPP)......................................................................................... 281
Configure Control Plane Policing.......................................................................................283
Configuring CoPP for Protocols...................................................................................283
Configuring CoPP for CPU Queues.............................................................................285
CoPP for OSPFv3 Packets.............................................................................................. 286
Configuring CoPP for OSPFv3...................................................................................... 290
Displaying CoPP Configuration ....................................................................................291
13 Data Center Bridging (DCB)............................................................................................. 293
Ethernet Enhancements in Data Center Bridging...........................................................293
9.10(0.1)
9
Priority-Based Flow Control.......................................................................................... 295
Enhanced Transmission Selection................................................................................296
Data Center Bridging Exchange Protocol (DCBx).....................................................297
Data Center Bridging in a Traffic Flow........................................................................ 298
Enabling Data Center Bridging............................................................................................298
DCB Maps and its Attributes.......................................................................................... 299
Data Center Bridging: Default Configuration.................................................................. 300
Configuring Priority-Based Flow Control......................................................................... 301
Configuring Lossless Queues........................................................................................302
Configuring PFC in a DCB Map...........................................................................................303
PFC Configuration Notes............................................................................................... 303
PFC Prerequisites and Restrictions...............................................................................304
Applying a DCB Map on a Port............................................................................................305
Configuring PFC without a DCB Map................................................................................305
Configuring Lossless QueuesExample:.......................................................................306
Priority-Based Flow Control Using Dynamic Buffer Method....................................... 308
Pause and Resume of Traffic.........................................................................................308
Buffer Sizes for Lossless or PFC Packets.....................................................................309
Behavior of Tagged Packets................................................................................................309
Configuration Example for DSCP and PFC Priorities......................................................310
Using PFC to Manage Converged Ethernet Traffic..........................................................311
Configure Enhanced Transmission Selection...................................................................311
ETS Prerequisites and Restrictions................................................................................ 311
Creating an ETS Priority Group......................................................................................312
ETS Operation with DCBx...............................................................................................313
Configuring Bandwidth Allocation for DCBx CIN..................................................... 314
Configuring ETS in a DCB Map......................................................................................315
Hierarchical Scheduling in ETS Output Policies.............................................................. 316
Using ETS to Manage Converged Ethernet Traffic..........................................................317
Applying DCB Policies in a Switch Stack........................................................................... 317
Configure a DCBx Operation...............................................................................................318
DCBx Operation................................................................................................................318
DCBx Port Roles................................................................................................................318
DCB Configuration Exchange....................................................................................... 320
Configuration Source Election...................................................................................... 321
Propagation of DCB Information.................................................................................. 321
Auto-Detection and Manual Configuration of the DCBx Version......................... 322
DCBx Example.................................................................................................................. 322
DCBx Prerequisites and Restrictions............................................................................323
Configuring DCBx............................................................................................................ 323
Verifying the DCB Configuration........................................................................................ 327
QoS dot1p Traffic Classification and Queue Assignment............................................. 338
9.10(0.1)
10
Configuring the Dynamic Buffer Method......................................................................... 339
Sample DCB Configuration................................................................................................. 340
PFC and ETS Configuration Command Examples.................................................... 342
14 Dynamic Host Configuration Protocol (DHCP)............................................................343
DHCP Packet Format and Options.....................................................................................343
Assign an IP Address using DHCP...................................................................................... 345
Implementation Information...............................................................................................346
Configure the System to be a DHCP Server.....................................................................347
Configuring the Server for Automatic Address Allocation...................................... 348
Specifying a Default Gateway........................................................................................349
Configure a Method of Hostname Resolution.......................................................... 349
Using DNS for Address Resolution............................................................................... 350
Using NetBIOS WINS for Address Resolution............................................................ 350
Creating Manual Binding Entries...................................................................................350
Debugging the DHCP Server..........................................................................................351
Using DHCP Clear Commands......................................................................................351
Configure the System to be a Relay Agent....................................................................... 351
Configure the System to be a DHCP Client..................................................................... 353
Configuring the DHCP Client System..........................................................................354
DHCP Client on a Management Interface.................................................................. 355
DHCP Client Operation with Other Features.............................................................356
Configure the System for User Port Stacking (Option 230)..........................................357
Configure Secure DHCP.......................................................................................................357
Option 82........................................................................................................................... 357
DHCP Snooping............................................................................................................... 358
Drop DHCP Packets on Snooped VLANs Only..........................................................362
Dynamic ARP Inspection................................................................................................ 362
Configuring Dynamic ARP Inspection......................................................................... 363
Source Address Validation....................................................................................................365
Enabling IP Source Address Validation........................................................................ 365
DHCP MAC Source Address Validation....................................................................... 366
Enabling IP+MAC Source Address Validation............................................................ 366
Viewing the Number of SAV Dropped Packets..........................................................367
Clearing the Number of SAV Dropped Packets......................................................... 367
15 Equal Cost Multi-Path (ECMP)......................................................................................... 368
ECMP for Flow-Based Affinity.............................................................................................368
Configuring the Hash Algorithm...................................................................................368
Enabling Deterministic ECMP Next Hop.....................................................................368
Configuring the Hash Algorithm Seed.........................................................................369
Link Bundle Monitoring........................................................................................................ 369
9.10(0.1)
11
Managing ECMP Group Paths....................................................................................... 370
Creating an ECMP Group Bundle..................................................................................371
Modifying the ECMP Group Threshold........................................................................ 371
RTAG7....................................................................................................................................... 372
Flow-based Hashing for ECMP........................................................................................... 373
16 FIP Snooping........................................................................................................................377
Fibre Channel over Ethernet................................................................................................ 377
Ensure Robustness in a Converged Ethernet Network.................................................. 377
FIP Snooping on Ethernet Bridges......................................................................................379
FIP Snooping in a Switch Stack...........................................................................................382
Using FIP Snooping................................................................................................................382
FIP Snooping Prerequisites.............................................................................................382
Important Points to Remember.................................................................................... 383
Enabling the FCoE Transit Feature............................................................................... 384
Enable FIP Snooping on VLANs.....................................................................................384
Configure the FC-MAP Value........................................................................................ 384
Configure a Port for a Bridge-to-Bridge Link............................................................ 385
Configure a Port for a Bridge-to-FCF Link................................................................. 385
Impact on Other Software Features.............................................................................385
FIP Snooping Restrictions.............................................................................................. 386
Configuring FIP Snooping..............................................................................................386
Displaying FIP Snooping Information................................................................................ 387
FCoE Transit Configuration Example.................................................................................393
17 FIPS Cryptography............................................................................................................. 395
Configuration Tasks...............................................................................................................395
Preparing the System............................................................................................................ 396
Enabling FIPS Mode...............................................................................................................396
Generating Host-Keys...........................................................................................................397
Monitoring FIPS Mode Status...............................................................................................397
Disabling FIPS Mode.............................................................................................................. 397
18 Force10 Resilient Ring Protocol (FRRP).........................................................................399
Protocol Overview.................................................................................................................399
Ring Status.........................................................................................................................400
Multiple FRRP Rings......................................................................................................... 401
Important FRRP Points....................................................................................................402
Important FRRP Concepts............................................................................................. 403
Implementing FRRP...............................................................................................................404
FRRP Configuration...............................................................................................................405
Creating the FRRP Group...............................................................................................405
9.10(0.1)
12
Configuring the Control VLAN......................................................................................405
Configuring and Adding the Member VLANs.............................................................406
Setting the FRRP Timers................................................................................................. 408
Clearing the FRRP Counters..........................................................................................408
Viewing the FRRP Configuration.................................................................................. 408
Viewing the FRRP Information......................................................................................408
Troubleshooting FRRP..........................................................................................................409
Configuration Checks.....................................................................................................409
Sample Configuration and Topology................................................................................409
19 GARP VLAN Registration Protocol (GVRP).................................................................... 412
Important Points to Remember.......................................................................................... 412
Configure GVRP......................................................................................................................414
Related Configuration Tasks.......................................................................................... 415
Enabling GVRP Globally........................................................................................................ 415
Enabling GVRP on a Layer 2 Interface............................................................................... 415
Configure GVRP Registration...............................................................................................416
Configure a GARP Timer.......................................................................................................416
RPM Redundancy................................................................................................................... 417
20 High Availability (HA).........................................................................................................418
Component Redundancy..................................................................................................... 418
Automatic and Manual Stack Unit Failover................................................................. 419
Synchronization between Management and Standby Units.................................. 420
Forcing an Stack Unit Failover.......................................................................................420
Specifying an Auto-Failover Limit.................................................................................420
Disabling Auto-Reboot....................................................................................................421
Manually Synchronizing Management and Standby Units...................................... 421
Pre-Configuring a Stack Unit Slot.......................................................................................421
Removing a Provisioned Logical Stack Unit..................................................................... 421
Hitless Behavior...................................................................................................................... 422
Graceful Restart......................................................................................................................422
Software Resiliency................................................................................................................423
Software Component Health Monitoring................................................................... 423
System Health Monitoring..............................................................................................423
Failure and Event Logging..............................................................................................423
Hot-Lock Behavior................................................................................................................ 424
21 Internet Group Management Protocol (IGMP).............................................................425
IGMP Implementation Information....................................................................................425
IGMP Protocol Overview......................................................................................................426
IGMP Version 2................................................................................................................. 426
9.10(0.1)
13
IGMP Version 3................................................................................................................. 427
Configure IGMP...................................................................................................................... 431
Related Configuration Tasks.......................................................................................... 431
Viewing IGMP Enabled Interfaces.......................................................................................431
Selecting an IGMP Version...................................................................................................432
Viewing IGMP Groups...........................................................................................................432
Adjusting Timers.....................................................................................................................433
Adjusting Query and Response Timers....................................................................... 433
Preventing a Host from Joining a Group..........................................................................434
Enabling IGMP Immediate-Leave....................................................................................... 437
IGMP Snooping.......................................................................................................................437
IGMP Snooping Implementation Information............................................................437
Configuring IGMP Snooping..........................................................................................438
Removing a Group-Port Association...........................................................................438
Disabling Multicast Flooding..........................................................................................439
Specifying a Port as Connected to a Multicast Router............................................ 439
Configuring the Switch as Querier...............................................................................439
Fast Convergence after MSTP Topology Changes.........................................................440
Egress Interface Selection (EIS) for HTTP and IGMP Applications..............................440
Protocol Separation......................................................................................................... 441
Enabling and Disabling Management Egress Interface Selection......................... 442
Handling of Management Route Configuration........................................................444
Handling of Switch-Initiated Traffic.............................................................................444
Handling of Switch-Destined Traffic........................................................................... 445
Handling of Transit Traffic (Traffic Separation)..........................................................446
Mapping of Management Applications and Traffic Type........................................ 446
Behavior of Various Applications for Switch-Initiated Traffic ................................447
Behavior of Various Applications for Switch-Destined Traffic ..............................448
Interworking of EIS With Various Applications.......................................................... 449
Designating a Multicast Router Interface......................................................................... 450
22 Interfaces............................................................................................................................. 451
Basic Interface Configuration.............................................................................................. 451
Advanced Interface Configuration......................................................................................451
Interface Types....................................................................................................................... 452
View Basic Interface Information........................................................................................453
Resetting an Interface to its Factory Default State......................................................... 455
Enabling a Physical Interface...............................................................................................455
Physical Interfaces................................................................................................................. 456
Configuration Task List for Physical Interfaces..........................................................456
Overview of Layer Modes...............................................................................................456
Configuring Layer 2 (Data Link) Mode......................................................................... 457
9.10(0.1)
14
Configuring Layer 2 (Interface) Mode..........................................................................457
Configuring Layer 3 (Network) Mode.......................................................................... 458
Configuring Layer 3 (Interface) Mode..........................................................................458
Egress Interface Selection (EIS)...........................................................................................459
Important Points to Remember.................................................................................... 459
Configuring EIS.................................................................................................................460
Management Interfaces....................................................................................................... 460
Configuring Management Interfaces...........................................................................460
Configuring a Management Interface on an Ethernet Port.................................... 462
VLAN Interfaces......................................................................................................................463
Loopback Interfaces..............................................................................................................464
Null Interfaces........................................................................................................................ 464
Port Channel Interfaces........................................................................................................465
Port Channel Definition and Standards.......................................................................465
Port Channel Benefits..................................................................................................... 465
Port Channel Implementation.......................................................................................465
Interfaces in Port Channels............................................................................................466
Configuration Tasks for Port Channel Interfaces......................................................466
Creating a Port Channel................................................................................................. 467
Adding a Physical Interface to a Port Channel.......................................................... 467
Reassigning an Interface to a New Port Channel..................................................... 469
Configuring the Minimum Oper Up Links in a Port Channel..................................470
Adding or Removing a Port Channel from a VLAN...................................................470
Assigning an IP Address to a Port Channel.................................................................472
Deleting or Disabling a Port Channel...........................................................................472
Load Balancing Through Port Channels..................................................................... 472
Changing the Hash Algorithm....................................................................................... 473
Bulk Configuration.................................................................................................................473
Interface Range.................................................................................................................473
Bulk Configuration Examples........................................................................................ 474
Defining Interface Range Macros....................................................................................... 476
Define the Interface Range............................................................................................ 476
Choosing an Interface-Range Macro.......................................................................... 476
Monitoring and Maintaining Interfaces............................................................................. 476
Maintenance Using TDR................................................................................................. 478
Non Dell-Qualified Transceivers........................................................................................ 478
Splitting QSFP Ports to SFP+ Ports.....................................................................................479
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..........................................480
Important Points to Remember....................................................................................480
Example Scenarios........................................................................................................... 481
Link Dampening..................................................................................................................... 482
Important Points to Remember....................................................................................482
9.10(0.1)
15
Enabling Link Dampening.............................................................................................. 482
Link Bundle Monitoring........................................................................................................ 484
Using Ethernet Pause Frames for Flow Control..............................................................485
Enabling Pause Frames...................................................................................................486
Configure the MTU Size on an Interface.......................................................................... 486
Port-Pipes................................................................................................................................487
Auto-Negotiation on Ethernet Interfaces.........................................................................488
Setting the Speed and Duplex Mode of Ethernet Interfaces.................................. 488
Set Auto-Negotiation Options...................................................................................... 490
View Advanced Interface Information...............................................................................490
Configuring the Interface Sampling Size.....................................................................491
Dynamic Counters.................................................................................................................493
Clearing Interface Counters.......................................................................................... 493
23 Internet Protocol Security (IPSec).................................................................................. 495
Configuring IPSec .................................................................................................................496
24 IPv4 Routing....................................................................................................................... 497
IP Addresses............................................................................................................................498
Implementation Information.........................................................................................498
Configuration Tasks for IP Addresses................................................................................498
Assigning IP Addresses to an Interface............................................................................. 499
Configuring Static Routes....................................................................................................500
Configure Static Routes for the Management Interface................................................501
IPv4 Path MTU Discovery Overview...................................................................................501
Using the Configured Source IP Address in ICMP Messages....................................... 502
Configuring the ICMP Source Interface......................................................................502
Configuring the Duration to Establish a TCP Connection............................................503
Enabling Directed Broadcast...............................................................................................503
Resolution of Host Names...................................................................................................504
Enabling Dynamic Resolution of Host Names................................................................ 504
Specifying the Local System Domain and a List of Domains....................................... 505
Configuring DNS with Traceroute......................................................................................505
ARP............................................................................................................................................506
Configuration Tasks for ARP................................................................................................506
Configuring Static ARP Entries............................................................................................ 507
Enabling Proxy ARP................................................................................................................507
Clearing ARP Cache.............................................................................................................. 508
ARP Learning via Gratuitous ARP........................................................................................508
Enabling ARP Learning via Gratuitous ARP.......................................................................509
ARP Learning via ARP Request............................................................................................ 509
Configuring ARP Retries........................................................................................................510
9.10(0.1)
16
ICMP.......................................................................................................................................... 511
Configuration Tasks for ICMP.............................................................................................. 511
Enabling ICMP Unreachable Messages.............................................................................. 511
UDP Helper.............................................................................................................................. 512
Configure UDP Helper.....................................................................................................512
Important Points to Remember.....................................................................................512
Enabling UDP Helper............................................................................................................. 512
Configuring a Broadcast Address........................................................................................513
Configurations Using UDP Helper...................................................................................... 513
UDP Helper with Broadcast-All Addresses....................................................................... 514
UDP Helper with Subnet Broadcast Addresses................................................................515
UDP Helper with Configured Broadcast Addresses........................................................515
UDP Helper with No Configured Broadcast Addresses................................................. 516
Troubleshooting UDP Helper.............................................................................................. 516
25 IPv6 Routing........................................................................................................................518
Protocol Overview................................................................................................................. 518
Extended Address Space.................................................................................................519
Stateless Autoconfiguration........................................................................................... 519
IPv6 Headers..................................................................................................................... 520
IPv6 Header Fields............................................................................................................520
Extension Header Fields..................................................................................................522
Addressing..........................................................................................................................523
Implementing IPv6 with Dell Networking OS..................................................................524
ICMPv6..................................................................................................................................... 527
Path MTU Discovery.............................................................................................................. 527
IPv6 Neighbor Discovery......................................................................................................528
IPv6 Neighbor Discovery of MTU Packets.................................................................. 529
Configuration Task List for IPv6 RDNSS............................................................................529
Configuring the IPv6 Recursive DNS Server...............................................................530
Debugging IPv6 RDNSS Information Sent to the Host ...........................................530
Displaying IPv6 RDNSS Information............................................................................. 531
Secure Shell (SSH) Over an IPv6 Transport.......................................................................532
Configuration Tasks for IPv6................................................................................................532
Adjusting Your CAM-Profile........................................................................................... 532
Assigning an IPv6 Address to an Interface.................................................................. 533
Assigning a Static IPv6 Route.........................................................................................534
Configuring Telnet with IPv6.........................................................................................534
SNMP over IPv6................................................................................................................ 535
Displaying IPv6 Information...........................................................................................535
Displaying an IPv6 Interface Information....................................................................536
Showing IPv6 Routes.......................................................................................................536
9.10(0.1)
17
Showing the Running-Configuration for an Interface.............................................538
Clearing IPv6 Routes....................................................................................................... 538
Configuring IPv6 RA Guard..................................................................................................539
Configuring IPv6 RA Guard on an Interface............................................................... 541
Monitoring IPv6 RA Guard.............................................................................................. 541
26 iSCSI Optimization.............................................................................................................542
iSCSI Optimization Overview...............................................................................................542
Monitoring iSCSI Traffic Flows...................................................................................... 544
Application of Quality of Service to iSCSI Traffic Flows...........................................545
Information Monitored in iSCSI Traffic Flows............................................................ 545
Detection and Auto-Configuration for Dell EqualLogic Arrays............................. 546
Configuring Detection and Ports for Dell Compellent Arrays................................547
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.....................547
Enable and Disable iSCSI Optimization.......................................................................548
Default iSCSI Optimization Values..................................................................................... 549
iSCSI Optimization Prerequisites........................................................................................ 549
Configuring iSCSI Optimization..........................................................................................549
Displaying iSCSI Optimization Information...................................................................... 552
27 Intermediate System to Intermediate System.............................................................. 554
IS-IS Protocol Overview....................................................................................................... 554
IS-IS Addressing......................................................................................................................555
Multi-Topology IS-IS............................................................................................................. 555
Transition Mode................................................................................................................556
Interface Support..............................................................................................................556
Adjacencies........................................................................................................................556
Graceful Restart......................................................................................................................556
Timers................................................................................................................................. 557
Implementation Information............................................................................................... 557
Configuration Information...................................................................................................558
Configuration Tasks for IS-IS.........................................................................................559
Configuring the Distance of a Route........................................................................... 567
Changing the IS-Type..................................................................................................... 568
Redistributing IPv4 Routes............................................................................................. 570
Redistributing IPv6 Routes..............................................................................................571
Configuring Authentication Passwords....................................................................... 572
Setting the Overload Bit.................................................................................................. 573
Debugging IS-IS................................................................................................................573
IS-IS Metric Styles...................................................................................................................575
Configure Metric Values....................................................................................................... 575
Maximum Values in the Routing Table........................................................................ 575
9.10(0.1)
18
Change the IS-IS Metric Style in One Level Only...................................................... 575
Leaks from One Level to Another................................................................................. 577
Sample Configurations..........................................................................................................578
28 Link Aggregation Control Protocol (LACP)...................................................................581
Introduction to Dynamic LAGs and LACP.........................................................................581
Important Points to Remember.....................................................................................581
LACP Modes...................................................................................................................... 582
Configuring LACP Commands......................................................................................582
LACP Configuration Tasks....................................................................................................583
Creating a LAG..................................................................................................................583
Configuring the LAG Interfaces as Dynamic..............................................................584
Setting the LACP Long Timeout................................................................................... 584
Monitoring and Debugging LACP.................................................................................585
Shared LAG State Tracking...................................................................................................585
Configuring Shared LAG State Tracking......................................................................586
Important Points about Shared LAG State Tracking.................................................588
LACP Basic Configuration Example................................................................................... 588
Configure a LAG on ALPHA........................................................................................... 588
29 Layer 2.................................................................................................................................. 597
Manage the MAC Address Table......................................................................................... 597
Clearing the MAC Address Table...................................................................................597
Setting the Aging Time for Dynamic Entries...............................................................597
Configuring a Static MAC Address............................................................................... 598
Displaying the MAC Address Table...............................................................................598
MAC Learning Limit............................................................................................................... 598
Setting the MAC Learning Limit.................................................................................... 599
mac learning-limit Dynamic.......................................................................................... 599
mac learning-limit mac-address-sticky......................................................................600
mac learning-limit station-move................................................................................. 600
mac learning-limit no-station-move.......................................................................... 600
Learning Limit Violation Actions....................................................................................601
Setting Station Move Violation Actions........................................................................601
Recovering from Learning Limit and Station Move Violations...............................602
NIC Teaming...........................................................................................................................602
Configure Redundant Pairs..................................................................................................604
Important Points about Configuring Redundant Pairs............................................ 606
Far-End Failure Detection.................................................................................................... 607
FEFD State Changes........................................................................................................ 608
Configuring FEFD............................................................................................................. 610
Enabling FEFD on an Interface.......................................................................................611
9.10(0.1)
19
Debugging FEFD............................................................................................................... 612
30 Link Layer Discovery Protocol (LLDP)............................................................................ 613
802.1AB (LLDP) Overview..................................................................................................... 613
Protocol Data Units..........................................................................................................613
Optional TLVs..........................................................................................................................614
Management TLVs............................................................................................................615
TIA-1057 (LLDP-MED) Overview.........................................................................................617
TIA Organizationally Specific TLVs................................................................................617
Configure LLDP...................................................................................................................... 622
Related Configuration Tasks..........................................................................................622
Important Points to Remember.................................................................................... 622
LLDP Compatibility.......................................................................................................... 622
CONFIGURATION versus INTERFACE Configurations...................................................622
Enabling LLDP.........................................................................................................................623
Disabling and Undoing LLDP.........................................................................................623
Enabling LLDP on Management Ports...............................................................................624
Disabling and Undoing LLDP on Management Ports...............................................624
Advertising TLVs..................................................................................................................... 624
Viewing the LLDP Configuration........................................................................................ 626
Viewing Information Advertised by Adjacent LLDP Agents.......................................... 626
Configuring LLDPDU Intervals.............................................................................................627
Configuring Transmit and Receive Mode.........................................................................628
Configuring the Time to Live Value................................................................................... 629
Debugging LLDP.................................................................................................................... 630
Relevant Management Objects........................................................................................... 631
31 Microsoft Network Load Balancing................................................................................ 637
NLB Unicast Mode Scenario................................................................................................ 637
NLB Multicast Mode Scenario............................................................................................. 638
Limitations of the NLB Feature........................................................................................... 638
Microsoft Clustering..............................................................................................................638
Enable and Disable VLAN Flooding ...................................................................................639
Configuring a Switch for NLB .............................................................................................639
Enabling a Switch for Multicast NLB............................................................................ 639
32 Multicast Source Discovery Protocol (MSDP)...............................................................641
Protocol Overview................................................................................................................. 641
Anycast RP...............................................................................................................................644
Implementation Information...............................................................................................644
Configure Multicast Source Discovery Protocol.............................................................644
Related Configuration Tasks..........................................................................................645
9.10(0.1)
20
Enable MSDP...........................................................................................................................649
Manage the Source-Active Cache..................................................................................... 650
Viewing the Source-Active Cache............................................................................... 650
Limiting the Source-Active Cache................................................................................651
Clearing the Source-Active Cache............................................................................... 651
Enabling the Rejected Source-Active Cache..............................................................651
Accept Source-Active Messages that Fail the RFP Check.............................................652
Specifying Source-Active Messages.................................................................................. 655
Limiting the Source-Active Messages from a Peer.........................................................656
Preventing MSDP from Caching a Local Source.............................................................656
Preventing MSDP from Caching a Remote Source........................................................ 657
Preventing MSDP from Advertising a Local Source........................................................658
Logging Changes in Peership States..................................................................................659
Terminating a Peership.........................................................................................................659
Clearing Peer Statistics......................................................................................................... 660
Debugging MSDP...................................................................................................................660
MSDP with Anycast RP.......................................................................................................... 661
Configuring Anycast RP........................................................................................................662
Reducing Source-Active Message Flooding.............................................................. 663
Specifying the RP Address Used in SA Messages...................................................... 663
MSDP Sample Configurations.............................................................................................666
33 Multiple Spanning Tree Protocol (MSTP)...................................................................... 669
Protocol Overview.................................................................................................................669
Spanning Tree Variations...................................................................................................... 671
Implementation Information..........................................................................................671
Configure Multiple Spanning Tree Protocol.....................................................................671
Related Configuration Tasks.......................................................................................... 671
Enable Multiple Spanning Tree Globally............................................................................672
Adding and Removing Interfaces........................................................................................672
Creating Multiple Spanning Tree Instances......................................................................673
Influencing MSTP Root Selection.......................................................................................674
Interoperate with Non-Dell Bridges...................................................................................675
Changing the Region Name or Revision...........................................................................675
Modifying Global Parameters.............................................................................................. 676
Modifying the Interface Parameters...................................................................................677
Configuring an EdgePort......................................................................................................678
Flush MAC Addresses after a Topology Change............................................................. 679
MSTP Sample Configurations............................................................................................. 680
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3
Running-ConfigurationSFTOS Example Running-Configuration......................... 680
Debugging and Verifying MSTP Configurations..............................................................683
9.10(0.1)
21
34 Multicast Features............................................................................................................. 686
Enabling IP Multicast.............................................................................................................686
Implementation Information...............................................................................................686
Multicast Policies....................................................................................................................687
IPv4 Multicast Policies.....................................................................................................687
35 Object Tracking..................................................................................................................695
Object Tracking Overview................................................................................................... 695
Track Layer 2 Interfaces..................................................................................................696
Track Layer 3 Interfaces..................................................................................................697
Track IPv4 and IPv6 Routes............................................................................................697
Set Tracking Delays......................................................................................................... 698
VRRP Object Tracking.....................................................................................................698
Object Tracking Configuration........................................................................................... 699
Tracking a Layer 2 Interface.......................................................................................... 699
Tracking a Layer 3 Interface...........................................................................................700
Track an IPv4/IPv6 Route............................................................................................... 702
Displaying Tracked Objects................................................................................................. 706
36 Open Shortest Path First (OSPFv2 and OSPFv3).......................................................... 708
Protocol Overview.................................................................................................................708
Autonomous System (AS) Areas....................................................................................709
Area Types..........................................................................................................................710
Networks and Neighbors................................................................................................ 710
Router Types......................................................................................................................710
Designated and Backup Designated Routers..............................................................712
Link-State Advertisements (LSAs).................................................................................. 713
Router Priority and Cost..................................................................................................714
OSPF with Dell Networking OS............................................................................................715
Graceful Restart.................................................................................................................716
Fast Convergence (OSPFv2, IPv4 Only)........................................................................717
Multi-Process OSPFv2 with VRF.................................................................................... 717
OSPF ACK Packing............................................................................................................718
Setting OSPF Adjacency with Cisco Routers.............................................................. 718
Configuration Information....................................................................................................719
Configuration Task List for OSPFv2 (OSPF for IPv4)................................................. 719
Configuration Task List for OSPFv3 (OSPF for IPv6)................................................. 735
Configuration Task List for OSPFv3 (OSPF for IPv6).......................................................750
Enabling IPv6 Unicast Routing....................................................................................... 751
Applying cost for OSPFv3................................................................................................751
Assigning IPv6 Addresses on an Interface................................................................... 751
9.10(0.1)
22
Assigning Area ID on an Interface.................................................................................752
Assigning OSPFv3 Process ID and Router ID Globally..............................................752
Assigning OSPFv3 Process ID and Router ID to a VRF............................................. 753
Configuring Stub Areas................................................................................................... 753
Configuring Passive-Interface....................................................................................... 754
Redistributing Routes...................................................................................................... 754
Configuring a Default Route.......................................................................................... 755
Enabling OSPFv3 Graceful Restart................................................................................755
OSPFv3 Authentication Using IPsec............................................................................. 757
Troubleshooting OSPFv3................................................................................................765
37 Policy-based Routing (PBR)..............................................................................................767
Overview.................................................................................................................................. 767
Implementing PBR................................................................................................................. 768
Configuration Task List for Policy-based Routing.......................................................... 769
PBR Exceptions (Permit)................................................................................................. 769
Create a Redirect List.......................................................................................................770
Create a Rule for a Redirect-list....................................................................................770
Apply a Redirect-list to an Interface using a Redirect-group................................. 772
Sample Configuration............................................................................................................774
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface
2/11View Redirect-List GOLD........................................................................................ 775
38 PIM Sparse-Mode (PIM-SM)............................................................................................. 779
Implementation Information............................................................................................... 779
Protocol Overview................................................................................................................. 779
Requesting Multicast Traffic...........................................................................................779
Refuse Multicast Traffic...................................................................................................780
Send Multicast Traffic......................................................................................................780
Configuring PIM-SM.............................................................................................................. 781
Related Configuration Tasks.......................................................................................... 781
Enable PIM-SM........................................................................................................................781
Configuring S,G Expiry Timers.............................................................................................782
Configuring a Static Rendezvous Point.............................................................................783
Overriding Bootstrap Router Updates......................................................................... 784
Configuring a Designated Router.......................................................................................784
Creating Multicast Boundaries and Domains...................................................................785
39 PIM Source-Specific Mode (PIM-SSM)...........................................................................786
Implementation Information............................................................................................... 786
Important Points to Remember.....................................................................................787
Configure PIM-SSM............................................................................................................... 787
9.10(0.1)
23
Related Configuration Tasks.......................................................................................... 787
Enabling PIM-SSM..................................................................................................................787
Use PIM-SSM with IGMP Version 2 Hosts.........................................................................788
Configuring PIM-SSM with IGMPv2............................................................................. 788
40 Port Monitoring..................................................................................................................791
Important Points to Remember...........................................................................................791
Port Monitoring...................................................................................................................... 792
Configuring Port Monitoring............................................................................................... 794
Configuring Monitor Multicast Queue...............................................................................795
Enabling Flow-Based Monitoring....................................................................................... 796
Remote Port Mirroring.......................................................................................................... 797
Remote Port Mirroring Example....................................................................................797
Configuring Remote Port Mirroring............................................................................. 798
Displaying Remote-Port Mirroring Configurations.................................................. 800
Configuring the Sample Remote Port Mirroring....................................................... 801
Encapsulated Remote Port Monitoring............................................................................ 804
ERPM Behavior on a typical Dell Networking OS .......................................................... 806
Decapsulation of ERPM packets at the Destination IP/ Analyzer.......................... 807
41 Private VLANs (PVLAN)......................................................................................................809
Private VLAN Concepts........................................................................................................ 809
Using the Private VLAN Commands...................................................................................810
Configuration Task List..........................................................................................................811
Creating PVLAN ports......................................................................................................812
Creating a Primary VLAN.................................................................................................813
Creating a Community VLAN.........................................................................................814
Creating an Isolated VLAN..............................................................................................814
Private VLAN Configuration Example.................................................................................816
Inspecting the Private VLAN Configuration...................................................................... 817
42 Per-VLAN Spanning Tree Plus (PVST+)..........................................................................820
Protocol Overview.................................................................................................................820
Implementation Information............................................................................................... 821
Configure Per-VLAN Spanning Tree Plus......................................................................... 822
Related Configuration Tasks..........................................................................................822
Enabling PVST+...................................................................................................................... 822
Disabling PVST+..................................................................................................................... 823
Influencing PVST+ Root Selection.....................................................................................824
Modifying Global PVST+ Parameters.................................................................................825
Modifying Interface PVST+ Parameters............................................................................ 826
Configuring an EdgePort......................................................................................................827
9.10(0.1)
24
PVST+ in Multi-Vendor Networks...................................................................................... 828
Enabling PVST+ Extend System ID.....................................................................................828
PVST+ Sample Configurations............................................................................................829
43 Quality of Service (QoS)....................................................................................................832
Implementation Information............................................................................................... 835
Port-Based QoS Configurations.........................................................................................835
Setting dot1p Priorities for Incoming Traffic.............................................................. 835
Honoring dot1p Priorities on Ingress Traffic.............................................................. 836
Configuring Port-Based Rate Policing.........................................................................837
Configuring Port-Based Rate Shaping.........................................................................837
Policy-Based QoS Configurations..................................................................................... 838
Classify Traffic...................................................................................................................838
Create a QoS Policy.........................................................................................................842
Create Policy Maps.......................................................................................................... 845
DSCP Color Maps.................................................................................................................. 849
Creating a DSCP Color Map.......................................................................................... 849
Displaying DSCP Color Maps........................................................................................ 850
Displaying a DSCP Color Policy Configuration ........................................................ 850
Enabling QoS Rate Adjustment........................................................................................... 851
Enabling Strict-Priority Queueing.......................................................................................852
Weighted Random Early Detection....................................................................................852
Creating WRED Profiles.................................................................................................. 853
Applying a WRED Profile to Traffic...............................................................................854
Displaying Default and Configured WRED Profiles...................................................854
Displaying WRED Drop Statistics.................................................................................. 854
Displaying egress-queue Statistics...............................................................................855
Pre-Calculating Available QoS CAM Space......................................................................855
Configuring Weights and ECN for WRED ........................................................................856
Global Service Pools With WRED and ECN Settings.................................................857
Configuring WRED and ECN Attributes............................................................................ 858
Guidelines for Configuring ECN for Classifying and Color-Marking Packets...........859
Sample configuration to mark non-ecn packets as “yellow” with Multiple
traffic class.........................................................................................................................860
Classifying Incoming Packets Using ECN and Color-Marking...............................860
Sample configuration to mark non-ecn packets as “yellow” with single
traffic class.........................................................................................................................862
Applying Layer 2 Match Criteria on a Layer 3 Interface.................................................864
Applying DSCP and VLAN Match Criteria on a Service Queue....................................864
Classifying Incoming Packets Using ECN and Color-Marking.....................................865
Guidelines for Configuring ECN for Classifying and Color-Marking Packets.......... 868
9.10(0.1)
25
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic
class.......................................................................................................................................... 868
Sample configuration to mark non-ecn packets as “yellow” with single traffic
class.......................................................................................................................................... 869
Enabling Buffer Statistics Tracking ....................................................................................870
44 Routing Information Protocol (RIP)............................................................................... 873
Protocol Overview................................................................................................................. 873
RIPv1....................................................................................................................................873
RIPv2................................................................................................................................... 874
Implementation Information............................................................................................... 874
Configuration Information...................................................................................................874
Configuration Task List....................................................................................................875
RIP Configuration Example............................................................................................ 881
45 Remote Monitoring (RMON)............................................................................................887
Implementation Information............................................................................................... 887
Fault Recovery........................................................................................................................888
Setting the RMON Alarm................................................................................................ 888
Configuring an RMON Event.........................................................................................889
Configuring RMON Collection Statistics.................................................................... 890
Configuring the RMON Collection History................................................................ 890
46 Rapid Spanning Tree Protocol (RSTP)........................................................................... 892
Protocol Overview.................................................................................................................892
Configuring Rapid Spanning Tree...................................................................................... 892
Related Configuration Tasks..........................................................................................892
Important Points to Remember..........................................................................................893
RSTP and VLT....................................................................................................................893
Configuring Interfaces for Layer 2 Mode..........................................................................893
Enabling Rapid Spanning Tree Protocol Globally...........................................................894
Adding and Removing Interfaces....................................................................................... 896
Modifying Global Parameters.............................................................................................. 897
Enabling SNMP Traps for Root Elections and Topology Changes........................898
Modifying Interface Parameters......................................................................................... 898
Enabling SNMP Traps for Root Elections and Topology Changes..............................899
Influencing RSTP Root Selection........................................................................................899
Configuring an EdgePort..................................................................................................... 900
Configuring Fast Hellos for Link State Detection............................................................901
47 Software-Defined Networking (SDN)............................................................................ 902
9.10(0.1)
26
48 Security................................................................................................................................903
AAA Accounting..................................................................................................................... 903
Configuration Task List for AAA Accounting..............................................................903
AAA Authentication............................................................................................................... 906
Configuration Task List for AAA Authentication........................................................906
Obscuring Passwords and Keys..........................................................................................909
AAA Authorization.................................................................................................................. 910
Privilege Levels Overview............................................................................................... 910
Configuration Task List for Privilege Levels................................................................ 910
RADIUS......................................................................................................................................915
RADIUS Authentication....................................................................................................915
Configuration Task List for RADIUS..............................................................................916
TACACS+.................................................................................................................................920
Configuration Task List for TACACS+......................................................................... 920
TACACS+ Remote Authentication................................................................................922
Command Authorization................................................................................................923
Protection from TCP Tiny and Overlapping Fragment Attacks....................................923
Enabling SCP and SSH.......................................................................................................... 923
Using SCP with SSH to Copy a Software Image........................................................924
Removing the RSA Host Keys and Zeroizing Storage ............................................. 926
Configuring When to Re-generate an SSH Key ........................................................926
Configuring the SSH Server Key Exchange Algorithm............................................. 926
Configuring the HMAC Algorithm for the SSH Server..............................................927
Configuring the SSH Server Cipher List.......................................................................928
Secure Shell Authentication...........................................................................................928
Troubleshooting SSH.......................................................................................................931
Telnet........................................................................................................................................ 931
VTY Line and Access-Class Configuration....................................................................... 932
VTY Line Local Authentication and Authorization.................................................... 932
VTY Line Remote Authentication and Authorization................................................933
VTY MAC-SA Filter Support............................................................................................934
Role-Based Access Control.................................................................................................934
Overview of RBAC............................................................................................................935
User Roles.......................................................................................................................... 937
AAA Authentication and Authorization for Roles.......................................................941
Role Accounting...............................................................................................................944
Display Information About User Roles.........................................................................945
49 Service Provider Bridging.................................................................................................947
VLAN Stacking.........................................................................................................................947
Important Points to Remember....................................................................................948
9.10(0.1)
27
Configure VLAN Stacking...............................................................................................949
Creating Access and Trunk Ports................................................................................. 949
Enable VLAN-Stacking for a VLAN............................................................................... 950
Configuring the Protocol Type Value for the Outer VLAN Tag............................. 950
Configuring Dell Networking OS Options for Trunk Ports......................................951
Debugging VLAN Stacking............................................................................................. 952
VLAN Stacking in Multi-Vendor Networks..................................................................952
VLAN Stacking Packet Drop Precedence..........................................................................957
Enabling Drop Eligibility.................................................................................................. 957
Honoring the Incoming DEI Value............................................................................... 958
Marking Egress Packets with a DEI Value................................................................... 959
Dynamic Mode CoS for VLAN Stacking............................................................................960
Mapping C-Tag to S-Tag dot1p Values....................................................................... 961
Layer 2 Protocol Tunneling................................................................................................. 962
Implementation Information......................................................................................... 965
Enabling Layer 2 Protocol Tunneling.......................................................................... 966
Specifying a Destination MAC Address for BPDUs................................................... 966
Setting Rate-Limit BPDUs.............................................................................................. 966
Debugging Layer 2 Protocol Tunneling...................................................................... 967
Provider Backbone Bridging................................................................................................ 967
50 sFlow.................................................................................................................................... 969
Overview..................................................................................................................................969
Implementation Information............................................................................................... 970
Important Points to Remember.................................................................................... 970
Enabling Extended sFlow......................................................................................................971
Enabling and Disabling sFlow on an Interface.................................................................972
Enabling sFlow Max-Header Size Extended.....................................................................972
sFlow Show Commands.......................................................................................................973
Displaying Show sFlow Global.......................................................................................973
Displaying Show sFlow on an Interface.......................................................................974
Displaying Show sFlow on a Stack-unit.......................................................................975
Configuring Specify Collectors........................................................................................... 975
Changing the Polling Intervals............................................................................................ 975
Back-Off Mechanism............................................................................................................ 976
sFlow on LAG ports................................................................................................................976
Enabling Extended sFlow......................................................................................................976
Important Points to Remember.....................................................................................977
51 Simple Network Management Protocol (SNMP).......................................................... 979
Protocol Overview.................................................................................................................980
Implementation Information...............................................................................................980
9.10(0.1)
28
SNMPv3 Compliance With FIPS..........................................................................................980
Configuration Task List for SNMP.......................................................................................981
Related Configuration Tasks..........................................................................................982
Important Points to Remember..........................................................................................982
Set up SNMP........................................................................................................................... 982
Creating a Community................................................................................................... 982
Setting Up User-Based Security (SNMPv3)................................................................. 983
Reading Managed Object Values....................................................................................... 984
Writing Managed Object Values......................................................................................... 985
Configuring Contact and Location Information using SNMP......................................986
Subscribing to Managed Object Value Updates using SNMP.......................................987
Enabling a Subset of SNMP Traps...................................................................................... 988
Enabling an SNMP Agent to Notify Syslog Server Failure............................................. 990
Copy Configuration Files Using SNMP.............................................................................. 991
Copying a Configuration File.........................................................................................993
Copying Configuration Files via SNMP........................................................................994
Copying the Startup-Config Files to the Running-Config......................................994
Copying the Startup-Config Files to the Server via FTP.......................................... 995
Copying the Startup-Config Files to the Server via TFTP........................................995
Copy a Binary File to the Startup-Configuration.......................................................996
Additional MIB Objects to View Copy Statistics........................................................ 996
Obtaining a Value for MIB Objects............................................................................... 997
MIB Support to Display the Available Memory Size on Flash....................................... 998
Viewing the Available Flash Memory Size...................................................................998
MIB Support to Display the Software Core Files Generated by the System..............999
Viewing the Software Core Files Generated by the System................................... 999
Manage VLANs using SNMP.............................................................................................. 1000
Creating a VLAN.............................................................................................................1000
Assigning a VLAN Alias..................................................................................................1000
Displaying the Ports in a VLAN.................................................................................... 1001
Add Tagged and Untagged Ports to a VLAN............................................................1002
Managing Overload on Startup.........................................................................................1003
Enabling and Disabling a Port using SNMP....................................................................1004
Fetch Dynamic MAC Entries using SNMP.......................................................................1004
Deriving Interface Indices.................................................................................................. 1006
Monitor Port-Channels.......................................................................................................1007
Enabling an SNMP Agent to Notify Syslog Server Failure........................................... 1008
Troubleshooting SNMP Operation.................................................................................. 1009
52 Stacking..............................................................................................................................1011
Stacking Overview................................................................................................................ 1011
Stack Management Roles..............................................................................................1011
9.10(0.1)
29
Stack Master Election.....................................................................................................1012
Virtual IP............................................................................................................................1014
Failover Roles...................................................................................................................1015
MAC Addressing on Stacks........................................................................................... 1015
Stacking LAG....................................................................................................................1016
Supported Stacking Topologies...................................................................................1017
High Availability on Stacks............................................................................................ 1017
Management Access on Stacks...................................................................................1018
Mixed-mode Stacking................................................................................................... 1019
Important Points to Remember........................................................................................ 1021
Stacking Installation Tasks..................................................................................................1021
Create a Stack..................................................................................................................1021
Add Units to an Existing Stack.....................................................................................1026
Split a Stack..................................................................................................................... 1029
Stacking Configuration Tasks............................................................................................1029
Assigning Unit Numbers to Units in an Stack...........................................................1030
Creating a Virtual Stack Unit on a Stack....................................................................1030
Displaying Information about a Stack........................................................................1030
Influencing Management Unit Selection on a Stack.............................................. 1033
Managing Redundancy on a Stack.............................................................................1034
Resetting a Unit on a Stack.......................................................................................... 1034
Enabling Mixed-mode Stacking.................................................................................. 1035
Verify a Stack Configuration.............................................................................................. 1035
Displaying the Status of Stacking Ports..................................................................... 1035
Remove Units or Front End Ports from a Stack.............................................................1037
Removing a Unit from a Stack.....................................................................................1037
Removing Front End Port Stacking............................................................................ 1038
Troubleshoot a Stack.......................................................................................................... 1039
Recover from Stack Link Flaps.................................................................................... 1039
Recover from a Card Problem State on a Stack......................................................1039
53 Storm Control...................................................................................................................1041
Configure Storm Control....................................................................................................1041
Configuring Storm Control from INTERFACE Mode..............................................1042
Configuring Storm Control from CONFIGURATION Mode..................................1042
54 Spanning Tree Protocol (STP)....................................................................................... 1044
Protocol Overview...............................................................................................................1044
Configure Spanning Tree................................................................................................... 1045
Related Configuration Tasks........................................................................................1045
Important Points to Remember........................................................................................1045
Configuring Interfaces for Layer 2 Mode........................................................................1046
9.10(0.1)
30
Loading...
+ 1247 hidden pages