Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell™, the DELL logo, Dell Precision™, OptiPlex™, Latitude™, PowerEdge™, PowerVault™,
PowerConnect™, OpenManage™, EqualLogic™, KACE™, FlexAddress™ and V ostro™ are trademarks of Dell Inc. Intel
Core™ and Celeron
Opteron™, AMD Phenom™, and AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft
®
Server
, MS-DOS® and Windows V ista® are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or
other countries. Red Hat Enterprise Linux
countries. Novell
registered trademark of Oracle Corporation and/or its affiliates. Citrix
or trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware
®
are registered trademarks of Intel Corporation in the U.S. and other countries. AMD® is a registered trademark and AMD
®
®
is a registered trademark and SUSE ™ is a trademark of Novell Inc. in the United States and other countries. Oracle® is a
and Enterprise Linux® are registered trademarks of Red Hat, Inc. in the United S tates and/or other
®
, Xen®, XenServer® and XenMotion® are either registered trademarks
®
, Virtual SMP®, vMotion®, vCenter®, and vSphere®
®
, Pentium®, Xeon®,
®
, Windows®, Windows
are registered trademarks or trademarks of VMWare, Inc. in the United States or other countrie s .
Other trademarks and trade names may be used in this publication to refer to either the entities claimi ng the marks and names or their products.
Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
This guide describes the protocols and features supported on Dell Networking switches and routers by the
Dell Networking Operating System (FTOS) and provides configuration instructions and examples for
implementing them. It supports the S5000 platform.
The S5000 switch is available with FTOS version 9.0(1.3) and supports stacking.
Though this guide contains information on protocols, it is not intended to be a complete reference. This
guide is a reference for configuring protocols on Dell Networking systems. For complete information on
protocols, refer to other documentation including IETF Requests for Comment (RFCs). The instructions in
this guide cite relevant RFCs, and Chapter 57, Standards Compliance contains a complete list of the
supported RFCs and Management Information Base files (MIBs).
1
Audience
This document is intended for system administrators who are responsible for configuring and maintaining
networks and assumes you are knowledgeable in Layer 2 and Layer 3 networking technologies.
Conventions
This document uses the following conventions to describe command syntax:
ConventionDescription
keyword
parameter
{X}Keywords and parameters within braces must be entered in the CLI.
[X]Keywords and parameters within brackets are optional.
x | y Keywords and parameters separated by bar require you to choose one.
Keywords are in bold and should be entered in the CLI as listed.
Parameters are in italics and require a number or word to be entered in the CLI.
About this Guide | 29
Related Documents
For more information about the S5000 switch, refer to the following documents:
•Dell Networking S5000 Getting Started Guide FTOS Version 9.0(1.3)
•Dell Networking S5000 Installation Guide FTOS Version 9.0(1.3)
•FTOS Command Line Reference Guide for the S5000 Switch, FTOS 9.0(1.3)
www.dell.com | support.dell.com
30|About this Guide
Configuration Fundamentals
The FTOS Command Line Interface (CLI) is a text-based interface through which you can configure
interfaces and protocols. The CLI is structured in modes for security and management purposes. Different
sets of commands are available in each mode, and you can limit user access to modes using privilege
levels.
In FTOS, after a command is enabled, it is entered into the running configuration file. You can view the
current configuration for the whole system or for a particular CLI mode. To save the current configuration
copy the running configuration to another location. For more information, refer to Saving the
Running-configuration.
This chapter contains the following major sections:
•Accessing the Command Line
•CLI Modes
•Navigating CLI Modes
•Port Numbering Convention
•The do Command
•The no Command
•Obtaining Help
•Entering and Editing Commands
•Command History
•Filtering show Command Outputs
•Multiple Users in Configuration mode
2
Accessing the Command Line
Access the command line through a serial console port or a Telnet session as shown in the example below.
When the system successfully boots, you enter the command line in the EXEC mode.
Note: You must have a password configured on a virtual terminal line before you can Telnet into the
system. Therefore, you must use a console connection when connecting to the system for the first time.
Configuration Fundamentals | 31
www.dell.com | support.dell.com
telnet 172.31.1.53
Trying 172.31.1.53...
Connected to 172.31.1.53.
Escape character is '^]'.
Login: username
Password:
FTOS>
EXEC mode prompt
Figure 2-1. Logging into the System using Telnet
CLI Modes
Different sets of commands are available in each mode. A command found in one mode cannot be
executed from another mode (with the exception of EXEC mode commands preceded by the command
for more information, refer to The do Command and EXEC Privilege Mode commands). You can set user
access rights to commands and command modes using privilege levels; for more information on privilege
levels and security options, refer to Privilege Levels Overview.
The FTOS CLI is divided into three major mode levels:
•EXEC mode is the default mode and has a privilege level of 1, which is the most restricted level. Only
a limited selection of commands is available, notably
show commands, which allow you to view
system information.
•EXEC Privilege mode has commands to view configurations, clear counters, manage configuration
files, run diagnostics, and enable or disable debug operations. The privilege level is 15, which is
unrestricted. You can configure a password for this mode; refer to Configuring the Enable Password.
•CONFIGURATION mode enables you to configure security features, time settings, set logging and
simple network management protocol (SNMP) functions, and static address resolution protocol (ARP)
and MAC addresses on the system.
do;
Beneath CONFIGURATION mode are sub-modes that apply to interfaces, protocols, and features. The
example below shows this sub-mode command structure. When configuring the chassis for the first time,
two sub-CONFIGURATION modes are important:
•INTERFACE sub-mode is the mode in which you configure Layer 2 and Layer 3 protocols and IP
services specific to an interface. An interface can be physical (management interface, 10-Gigabit
Ethernet, 40-Gigabit Ethernet, or 2/4/8-Gigabit Fibre Channel) or logical (Loopback, Null, po rt
channel, or VLAN).
•LINE sub-mode is the mode in which you to configure the console and virtual terminal lines.
Note: At any time, entering a question mark (?) will display the available command options. For example,
when you are in CONFIGURATION mode, entering the question mark first will list all available commands,
including the possible sub-modes.
32|Configuration Fundamentals
EXEC
EXEC Privilege
CONFIGURATION
AS-PATH ACL
INTERFACE
GIGABIT ETHERNET
TEN GIGABIT ETHERNET
FORTY GIGABIT ETHERNET
FIBRE CHANNEL
INTERFACE RANGE
LOOPBACK
MANAGEMENT ETHERNET
NULL
PORT-CHANNEL
VLAN
IP
IPv6
IP COMMUNITY-LIST
IP ACCESS-LIST
STANDARD ACCESS-LIST
EXTENDED ACCESS-LIST
LINE
CONSOLE
VIRTUAL TERMINAL
MAC ACCESS-LIST
MAC CONTROL-PLANE
MONITOR SESSION
MULTIPLE SPANNING TREE
Per-VLAN SPANNING TREE
RAPID SPANNING TREE
GVRP
LLDP
FIBRE CHANNEL
PREFIX-LIST
REDIRECT
ROUTE-MAP
ROUTER BGP
ROUTER ISIS
ROUTER OSPF
ROUTER RIP
SPANNING TREE
TRACE-LIST
Configuration Fundamentals | 33
Navigating CLI Modes
The FTOS prompt changes to indicate the CLI mode. Table 2-1 lists the CLI mode, its prompt, and
information on how to access and exit this CLI mode. You must move linearly through the command
modes, with the exception of the
command moves you up one command mode level.
Note: Sub-CONFIGURATION modes all have the letters “conf” in the prompt with additional modifier s to
identify the mode and slot/port information (see Table 2-1).
Table 2-1. FTOS Command Modes
www.dell.com | support.dell.com
CLI Command Mode Prompt
end command which takes you directly to EXEC Privilege mode; the exit
Access Command
EXEC
EXEC Privilege
CONFIGURATION
Note: Access all of the following modes from CONFIGURATION mode.
AS-PATH ACL
Gigabit Ethernet
Interface
10 Gigabit Ethernet
Interface
40 Gigabit Ethernet
Interface
Fibre Channel Interface
Interface Range
Loopback Interface
FTOS>
Access the router through the console or Telnet.
FTOS#•From EXEC mode, enter the command enable.
•From any other mode, use the command
end.
FTOS(conf)#•From EXEC privilege mode, enter the command
-- Stack Info -Unit UnitType Status ReqTyp CurTyp Version Ports
--------------------------------------------------------------------------- 0 Management online S5000 S5000 9-0-1-0 64
1 Member not present
2 Member not present
3 Member not present
4 Member not present
5 Member not present
6 Member not present
“do” form of show command
On the S5000, the valid slot numbers are the supported stack-unit numbers (0 to 11). The valid port
numbers for each interface type are listed below.
•1GbE: Ports 0-47
•10GbE: Ports 0-63
•40GbE: Ports 48, 52, 56, and 60
•Fibre Channel: Ports 0-47
•Management: Port 0
The do Command
Enter an EXEC mode command from any CONFIGURATION mode (CONFIGURATION, INTERFACE,
SPANNING TREE, etc.) without returning to EXEC mode by preceding the EXEC mode command with
the command
Note: The following commands cannot be modified by the do command: enable, disable, exit, and configure.
Figure 2-4. Using the do Command
do. The following example illustrates the do command.
The no Command
When you enter a command, the command line is added to the running configuration file. Disable a
command and remove it from the running-config by entering the original command preceded by the
command
ip-address command, as shown in the following example.
Note: Use the help or ? command as discussed in Obtaining Help command to help you co nstruct the “no”
form of a command.
no. For example, to delete an ip address configured on an interface, use the no ip address
shutdown
FTOS(conf-if-te-5/1)#no ip address
FTOS(conf-if-te-5/1)#show config
!
interface TenGigabitEthernet 5/1
no ip address
shutdown
FTOS(conf-if-te-5/1)#
IP address assigned
“no” form of IP address command
IP address removed
FTOS#?
start Start Shell
capture Capture Packet
cd Change current directory
clear Reset functions
clock Manage the system clock
configure Configuring from terminal
copy Copy from one file to another
--More--
“?” at prompt for list of commands
FTOS(conf)#cl?
class-map
clock
FTOS(conf)#cl
partial keyword plus “[space]?” for matching keywords
Figure 2-5. Undoing a command with the no Command
Layer 2 protocols are disabled by default. Enable them using the no disable command. For example, in
PROTOCOL SPANNING TREE mode, enter
no disable to enable Spanning Tree.
Obtaining Help
Obtain a list of keywords and a brief functional description of tho se keywords at any CLI mo de using the ?
or
help command:
•Enter
Figure 2-6. ? Command Example
38|Configuration Fundamentals
Figure 2-7. Keyword? Command Example
? at the prompt or after a keyword to list the keywords available in the current mode.
•
? after a prompt lists all of the available keywords. The output of this command is the same for the
help command.
•? after a partial keyword lists all of the keywords that begin with the specified letters.
•A keyword followed by [space]? lists all of the keywords that can follow the specified keyword.
FTOS(conf)#clock ?
summer-time Configure summer (daylight savings) time
timezone Configure time zone
FTOS(conf)#clock
keyword plus “[space]?” for compatible keywords
Figure 2-8. Keyword ? Command Example
Entering and Editing Commands
When entering commands:
•The CLI is not case sensitive.
•You can enter partial CLI keywords.
•You must enter the minimum number of letters to uniquely identify a command. For example,
cannot be entered as a partial keyword because both the clock and class-map commands begin with
the letters “cl.”
clo, however, can be entered as a partial keyword because only one command
begins with those three letters.
•The TAB key auto-completes keywords in commands. You must enter the minimum number of letters
to uniquely identify a command.
•The UP and DOWN arrow keys display previously entered commands (refer to Command History).
•The BACKSPACE and DELETE keys erase the previous letter.
•Key combinations are available to move quickly across the command line, see Table 2-2.
cl
Table 2-2. Short-Cut Keys and their Actions
Key CombinationAction
CNTL-AMoves the cursor to the beginning of the command line.
CNTL-BMoves the cursor back one character.
CNTL-DDeletes character at cursor.
CNTL-EMoves the cursor to the end of the line.
CNTL-FMoves the cursor forward one character.
CNTL-ICompletes a keyword.
CNTL-KDeletes all characters from the cursor to the end of the command line.
CNTL-LRe-enters the previous command.
CNTL-NReturn to more recent commands in the history buffer after recalling commands with CTRL-P or the
UP arrow key.
CNTL-PRecalls commands, beginning with the last command
CNTL-RRe-enters the previous command.
CNTL-UDeletes the line.
CNTL-WDeletes the previous word.
CNTL-XDeletes the line.
CNTL-ZEnds continuous scrolling of command outputs.
Esc BMoves the cursor back one word.
Configuration Fundamentals | 39
Table 2-2. Short-Cut Keys and their Actions (continued)
Deletes all characters from the cursor to the end of the word.
Command History
FTOS maintains a history of previously-entered commands for each mode. For example:
•When you are in EXEC mode, the UP and DOWN arrow keys display th e previously-entered EXEC
mode commands.
•When you are in CONFIGURATION mode, the UP or DOWN arrow keys recall the
previously-entered CONFIGURATION mode commands.
Filtering show Command Outputs
Filter the output of a show command to display specific information by adding | [except | find | grep | no-more
] specified_text after the command. The va riable specified_text is the text for which you are filtering and
| save
it IS case sensitive unless the
grep command accepts an ignore-casesub-option that forces the search to case-insensitive. For
The
example, the commands:
ignore-casesub-option is implemented.
•
show run | grep Ethernet returns a search result with instances containing a capitalized “Ethernet,” such
as interface TenGigabitEthernet 0/0.
show run | grep ethernet would not return that search result because it only searches for instances
•
containing a non-capitalized “ethernet.”
Executing the command
show run | grep Ethernet ignore-case would return instances containing both
“Ethernet” and “ethernet.”
•
grep displays only the lines containing specified text. The following example shows this command
used in combination with the command do show stack-unit all stack-ports all pfc details | grep 0.
Figure 2-9. Filtering Command Outputs with the grep Command
40|Configuration Fundamentals
Note: FTOS accepts a space or no space before and after the pipe. To filter on a phrase with spaces,
FTOS(conf)#do show stack-unit all stack-ports all pfc details | except 0
Admin mode is On
Admin is enabled
Local is enabled
Link Delay 45556 pause quantum
stack unit 1 stack-port all
Admin mode is On
Admin is enabled
FTOS(conf)#do show stack-unit all stack-ports all pfc details | find 0
stack unit 0 stack-port all
Admin mode is On
Admin is enabled
Local is enabled
Link Delay 45556 pause quantum
0 Pause Tx pkts, 0 Pause Rx pkts
stack unit 1 stack-port all
underscores, or ranges, enclose the phrase with double quota tion marks.
•except displays text that does not match the specified text. The following example shows this
command used in combination with the command do show stack-unit all stack-ports all pfc details |
except 0.
Figure 2-10. Filtering Command Outputs with the except Command
•find displays the output of the show command beginning from the first occurrence of specified text.
The following example shows this command us e d in combination with the command do show
stack-unit all stack-ports all pfc details | find 0.
Figure 2-11 . Filtering Command Outputs with the find Command
no-more displays the output all at once rather than one screen at a time. This is similar to the command
terminal length except that the no-more option affects the output of the specified command only.
save copies the output to a file for future reference.
•
Note: You can filter a single command output multiple times. The save option should be the last option
entered. For example:
FTOS notifies all users in the event that there are multiple users logged into CONFIGURATION mode. A
warning message indicates the username, type of connection (console or vty), and in the case of a vty
connection, the IP address of the terminal on which the connection was established. For example:
•On the system that telnets into the switch, Message 1 appears:
Message 1 Multiple Users in Configuration mode Telnet Message
% Warning: The following users are currently configuring the system:
User "<username>" on line console0
www.dell.com | support.dell.com
•On the system that is connected over the console, Message 2 appears:
Message 2 Multiple Users in Configuration mode Telnet Message
% Warning: User "<username>" on line vty0 "10.11.130.2" is in configuration mode
If either of these messages appears, Dell Networking recommends that you coordinate with the users listed
in the message so that you do not unintentionally overwrite each other’s configuration changes.
42|Configuration Fundamentals
Getting Started
This chapter contains the following major sections:
•Accessing Ports
•Accessing the RJ-45/RS-232 Console Port
•Accessing the RJ-45 console port with a DB-9 adapter
•Accessing the USB-B Console Port
•Booting Process
•Entering the Initial Configuration Information
•Configuring the Enable Password
•Configuring a Host Name
•Navigating CLI Modes
•Default Configuration
•Configuring Layer 2 (Data Link) Mode
•Accessing the System Remotely
•Configuring the Management Port IP Address
•Configuring a Management Route
•Configuring a Username and Password
•Creating a Port-based VLAN
•Assigning Interfaces to a VLAN
•Assigning an IP Address to a VLAN
•Connecting the S5000 to the Network
•Configuring File Management
•Copying Files to and from the System
•Saving the Running-configuration
•Configuring the Overload bit for Startup Scenario
•Viewing Files
•Viewing Configuration Files
•File System Management
•Viewing command history
•Upgrading and Downgrading FTOS
3
Getting Started | 43
Accessing Ports
The S5000 has two management ports available for system access—a console port and a Universal Serial
Bus (USB)-B port. The USB-B port acts exactly the same as the console port. The terminal settings are the
same for both access ports.
Accessing the RJ-45/RS-232 Console Port
Note: Before starting this procedure, be sure you have a terminal emula tion p rogra m alr eady installed on
your PC.
www.dell.com | support.dell.com
The RS-232/RJ-45 console port is labeled on the lower left-hand side of the S5000 system as you face the
Utility side of the chassis.
Figure 3-1. RS-232/RJ-45 Console Port
To access the console port, follow the procedures below:.
StepTask
1Install an RJ-45 copper cable into the console port. Use a rollover (crossover) cable to connect the S5000
console port to a terminal server.
2Connect the other end of the cable to the DTE terminal server.
3Terminal settings on the console port cannot be changed in the software and are set as follows:
9600 baud rate
No parity
8 data bits
1 stop bit
No flow control
44|Getting Started
Accessing the RJ-45 console port with a DB-9 adapter
You can connect to the console using a RJ-45 to RJ-45 rollover cable and a RJ-45 to DB-9 female DTE
adapter to a terminal server (for example, PC). Table 3-1 lists the pin assignments.
Table 3-1. Pin Assignments Between the Console and a DTE Terminal Server
S5000
Console Port RJ-45 to RJ-45 Rollover Cable
SignalRJ-45 pinoutRJ-45 PinoutDB-9 PinSignal
RTS188CTS
NC276DSR
TxD362RxD
GND455GND
GND545GND
RxD633TxD
NC724DTR
CTS817RTS
RJ-45 to DB-9
Adapter
Terminal Server
Device
Accessing the USB-B Console Port
The terminal settings are the same for the USB-B port and the console port:
•9600 baud rate
•No parity
•8 data bits
•1 stop bit
•No flow control
When you connect the USB-B port, it becomes the primary connection and, when the system is connected,
it sends all messages to the USB-B drive.
1. Power on the PC (Dell Force 10 recommends using the XP operating system).
2. Connect the USB-A end of cable into an available USB port on the PC.
3. Connect the USB-B end of cable into the USB-B console port on the S5000.
4. Power on the S5000.
5. Install the necessary USB device drivers (you will need an internet connection). For assistance, contact
Dell Networking Technical Support.
6. Open your terminal software emulation program to access the S5000.
7. Set the terminal connection settings. Use the settings shown here:
Getting Started | 45
www.dell.com | support.dell.com
.
The Command Line Interface (CLI) prompt appears (FTOS>_) when you are connected to the S5000.
Note: Only one of the console port s can be active at a time; the USB console takes pr iority over the RJ-45
console by default. When a USB Host (PC) is plugged into the USB console port, the hardware
automatically switches over to use the USB console. When the USB cable is removed or the PC
deactivates the USB connection, the hardware automatically switches to the RJ-45 console interface.
46|Getting Started
Booting Process
U-Boot 2012.04(Dell Networking)
Built by build at tools-sjc-01 on Tue Jan 15 0:50:03 2013
S5000 Boot Selector Label 1.3.0.0m
CPU0: P2020, Version: 2.1, (0x80e20021)
Core: E500, Version: 5.1, (0x80211051)
.
<lines skipped >
.
Board: S5000 FTOS CPU
CPLD: S5000 CPLD Rev 41
Board Revision 1
.
.
<lines skipped>
.
.
Boot Selector set to Bootflash Partition A image...
Verifying Copyright Information..success for Image - 0
Boot Selector: Booting Bootflash Partition A image...
Copying stage-2 loader from 0x800000 to 0x7f800000(size = 0x200000)
F10 Boot Image selection DONE.
## Starting application at 0x7F800090 ...
U-Boot 2012.04(Dell Networking)
Built by build at tools-sjc-01 on Thu Mar 14 16:45:06 2013
S5000 Boot Loader Label 1.3.1.1p
.
.
<lines skipped>
.
.
Mgmt MAC Addr: 5C:F9:DD:EF:0A:42
SF: Detected W25Q128 with page size 4 KiB, total 16 MiB
Hit any key to stop autoboot: 0
Loading POST from Bootflash Partition A
## Starting application at 0x78000000 ...
.
.
.
<lines skipped>
.
.
auto-booting...
After you set up the S5000 as described in the installation procedure in the S5000 Getting Started Guide,
the switch boots up. Figure 3-2 shows an example of the completed boot process.
Figure 3-2. Completed Boot Process(1 of 3 screens)
Getting Started | 47
Figure 3-3. Completed Boot Process(2 of 3 screens)
Booting PRIMARY configuration...
boot device : tftp
file name : FTOS-SH-9-0-1-0.bin
Management Etherenet IP address : 10.11.210.35/16
Server IP address : 10.11.8.13
Default Gateway IP address : 10.11.210.63
Management Etherenet MAC address : 5C:F9:DD:EF:0A:42
Management ethernet Port Configuration: Auto Negotiate
Using e1000#0 device
TFTP from server 10.11.8.13; our IP address is 10.11.210.35
Filename 'FTOS-SH-9-0-1-0.bin'.
Load address: 0x6400000
Loading: #
Detected FTOS image. Downloading only kernel...(8268092 bytes)
################################################################
#################################################################
#################################################################
#################################################################
#################################################################
#################################################################
#################################################################
#################################################################
############################################
done
Bytes transferred = 8269244 (7e2dbc hex)
Booting FTOS image
.
.
<lines skipped>
.
.
RELEASE IMAGE HEADER DATA :
-------------------------Release Image Created 2013/4/15 - 18:11:28
Figure 3-4. Completed Boot Process (3 of 3 screens)
00:00:38: %STKUNIT0-M:CP %RAM-6-ELECTION_ROLE: Stack unit 0 is transitioning to Management unit.
00:00:39: %STKUNIT0-M:CP %CHMGR-5-STACKUNITDETECTED: Stack unit 0 present
00:00:44: %S5000:0 %POLLMGR-2-USER_FLASH_STATE: USB flash disk missing in 'usbflash:'
00:03:01: %STKUNIT0-M:CP %CHMGR-5-MODULE_INSERTED: FC module has been inserted in stack-unit 0
optional slot 0
00:03:01: %STKUNIT0-M:CP %CHMGR-5-MODULE_INSERTED: SFP+ module has been inserted in stack-unit 0
optional slot 1
00:03:01: %STKUNIT0-M:CP %CHMGR-5-MODULE_INSERTED: SFP+ module has been inserted in stack-unit 0
optional slot 2
00:03:01: %STKUNIT0-M:CP %CHMGR-5-MODULE_INSERTED: SFP+ module has been inserted in stack-unit 0
optional slot 3
00:03:01: %STKUNIT0-M:CP %CHMGR-5-CHECKIN: Checkin from Stack unit 0 (type S5000, 64 ports)
00:03:02: %STKUNIT0-M:CP %CHMGR-2-FANTRAY_UP: Fan Tray 1 in unit 0 is up
00:03:02: %STKUNIT0-M:CP %CHMGR-2-FANTRAY_UP: Fan Tray 2 in unit 0 is up
00:03:03: %STKUNIT0-M:CP %CHMGR-0-PS_UP: Power supply 0 in unit 0 is up
00:03:04: %STKUNIT0-M:CP %CHMGR-0-PS_UP: Power supply 1 in unit 0 is up
00:03:04: %STKUNIT0-M:CP %CHMGR-5-STACKUNITUP: Stack unit 0 is up
00:03:05: %STKUNIT0-M:CP %CHMGR-5-SYSTEM_READY: System ready
00:03:05: %STKUNIT0-M:CP %RAM-5-STACK_STATE: Stack unit 0 is in Active State.
00:03:05: %STKUNIT0-M:CP %IFMGR-5-OSTATE_UP: Changed interface state to up: Ma 0/0
00:03:17: %STKUNIT0-M:CP %CHMGR-1-PSU_FAN_STATUS: Fan 0 in PSU 0 of Unit 0 is up
00:03:17: %STKUNIT0-M:CP %CHMGR-1-PSU_FAN_STATUS: Fan 0 in PSU 1 of Unit 0 is up
FTOS>00:03:24: %STKUNIT0-M:CP %SEC-5-LOGIN_SUCCESS: Login successful for user on line console
FTOS>
FTOS>
FTOS>enable
FTOS#
<prompt available and admin enable logged in >
========== end of boot up process ===========
Entering the Initial Configuration Information
To set up the switch, you need to assign an IP address and other configuration information necessary for
the switch to communicate with the local routers and the Internet. The minimal configuration provided
here does not cover most of the features; it simply allows you to perform other configuration tasks using a
Telnet connection from your management network.
You will need this information from your network administrator:
•Switch IP address
•Subnet mask (IP netmask)
•Default gateway (router)
•Enable secret password
•Enable password
•Telnet password
Getting Started | 49
Configuring the Enable Password
Access the EXEC Privilege mode using the enable command. The EXEC Privilege mode is unrestricted by
default. Configure a password as a basic security measure. There are two types of
•
enable password stores the password in the running/startup configuration using a DES encryption
method.
•
enable secret is stored in the running/startup configuration in using a stronger, MD5 encryption method.
is the privilege level, is 15 by default, and is not required.
encryption-type specifies how you are inputting the password, is 0 by
default, and is not required.
•0 is for inputting the password in clear text.
•7 is for inputting a password that is already encrypted using a
DES hash. Obtain the encrypted password from the configuration
file of another S5000 switch.
•5 is for inputting a password that is already encrypted using an
MD5 hash. Obtain the encrypted password from the configuration
file of another S5000 switch.
CONFIGURATION
50|Getting Started
Configuring a Host Name
FTOS(conf)#hostname R1
R1(conf)#
Default Hostname
New Hostname
The host name appears in the prompt. The default host name is FTOS. The text string of a host name can
consist of letters, digits, and hyphens.
To configure a host name:
TaskCommand SyntaxCommand Mode
Create a new host name.
The example below illustrates the
Figure 3-5. Configuring a Hostname
hostname command.
hostname name
CONFIGURATION
Navigating CLI Modes
The FTOS prompt changes to indicate the CLI mode. You must move linearly through the command
modes, with the exception of the
exit command which moves you up one command mode level.
end command which takes you directly to EXEC Privilege mode and the
Default Configuration
A version of FTOS is pre-loaded onto the chassis, however the system is not configured when you power
up for the first time (except for the default hostname, which is FTOS). You must configure the system
using the CLI.
Configuring Layer 2 (Data Link) Mode
Use the switchport command in INTERFACE mode to enable Layer 2 data transmissions through an
individual interface. You cannot configure switching or Layer 2 protocols such as Spanning Tree Protocol
(STP) on an interface unless the interface has been set to Layer 2 mode.
To configure Layer 2 mode, follow these steps:
StepTaskCommand SyntaxCommand Mode
1Enable the interface.no shutdownINTERFACE
Getting Started | 51
StepTaskCommand SyntaxCommand Mode
2
Place the interface in Layer 2 (switching) mode.switchportINTERFACE
To view the interfaces in Layer 2 mode, use the show interfaces switchport command in EXEC mode.
Accessing the System Remotely
You can configure the system to access it remotely by T elnet. The system has a dedicated management port
and a management routing table that is separate from the IP routing table.
www.dell.com | support.dell.com
Configuring the system for Telnet is a three-step process:
1. Configure an IP address for the management port. Refer to Configuring the Management Port IP
Address.
2. Configure a management route with a default gateway. Refer to Configuring a Management Route.
3. Configure a username and password. Refer to Configuring a Username and Password.
Configuring the Management Port IP Address
Assign IP addresses to the management ports in order to access the system remotely.
Note: Assign different IP addresses to each stack-unit’s mana gement port.
To configure the management port IP address:
StepTaskCommand SyntaxCommand Mode
1Enter INTERFACE mode for the
Management port.
interface ManagementEthernet slot/port
•slot range: 0 to 11.
•
port range: 0.
CONFIGURATION
2
3
52|Getting Started
Assign an IP address to the
interface.
Enable the interface.
ip address ip-address/mask
•ip-address: an address in dotted-decimal format
(A.B.C.D).
•
mask: a subnet mask in /prefix-length format (/
xx).
no shutdown
INTERFACE
INTERFACE
Configuring a Management Route
Define a path from the system to the network from which you are accessing the system remotely.
Management routes are separate from IP routes and are only used to manage the system through the
management port.
To configure a management route:
StepTaskCommand SyntaxCommand Mode
Configure a management route to
1
the network from which you are
accessing the system.
management route ip-address/maskgateway
•ip-address: the network address in
dotted-decimal format (A.B.C.D).
•
mask: a subnet mask in /prefix-length format (/
xx).
•
gateway: the next hop for network traffic
originating from the management port.
CONFIGURATION
Configuring a Username and Password
Configure a system username and password to access the system remotely.
To configure a username and password:
StepTaskCommand SyntaxCommand Mode
Configure a username and
1
password to access the system
remotely.
username username password [encryption-type]
password
encryption-type specifies how you are inputting the
password, is 0 by default, and is not required.
•0 is for inputting the password in clear text.
•7 is for inputting a password that is already
encrypted using a Type 7 hash. Obtaining the
encrypted password from the configuration of
another S5000 switch.
CONFIGURATION
Creating a Port-based VLAN
The Default VLAN (VLAN 1) is part of the system startup configuration and does not require
configuration. To configure a port-based VLAN, you must create the VLAN and then add physical
interfaces or port channel (LAG) interfaces to the VLAN.
Getting Started | 53
To create a port-based VLAN, follow this step:
StepTaskCommand SyntaxCommand Mode
www.dell.com | support.dell.com
Configure a port-based VLAN (if
1
the vlan-id is different from the
Default VLAN ID) and enter
INTERFACE VLAN mode.
After you create a VLAN, you
must assign interfaces in Layer 2
mode to the VLAN to activate
the VLAN.
interface vlanvlan-idCONFIGURATION
To view the configured VLANs, use the show vlan command in EXEC Privilege mode.
Assigning Interfaces to a VLAN
You can only assign interfaces in Layer 2 mode to a VLAN using the tagged and untagged commands. To
place an interface in Layer 2 mode, use the switchport command.
You can designate Layer 2 interfaces as tagged or untagged. When you pl ace an interface in Layer 2 mode
using the switchport command, the interface is automatically designated untagged and placed in the
Default VLAN.
To view which interfaces are tagged or untagged and to view which VLAN the interfaces belong, use the
show vlan command. To view just the interfaces that are in Layer 2 mode, use the show interfaces
switchport command in EXEC Privilege mode or EXEC mode.
To tag frames leaving an interface in Layer 2 mode, you must assign that interface to a port-based VLAN
to tag it with that VLAN ID.
To tag interfaces, follow these steps:
StepTaskCommand SyntaxCommand Mode
Access the INTERFACE VLAN
1
mode of the VLAN to which you
want to assign the interface.
2Enable an interface to include the
IEEE 802.1Q tag header.
interface vlan vlan-idCONFIGURATION
tagged interfaceINTERFACE
Use the untagged command to move untagged interfaces from the Default VLAN to another VLAN:
54|Getting Started
To move untagged interfaces, follow these steps:
StepTaskCommand SyntaxCommand Mode
Access the INTERFACE VLAN
1
mode of the VLAN to which you
want to assign the interface.
2Configure an interface as
untagged. This command is
available only in VLAN
interfaces.
interface vlan vlan-idCONFIGURATION
untagged interfaceINTERFACE
Assigning an IP Address to a VLAN
VLANs are a Layer 2 feature. For two physical interfaces on different VLANs to communicate, you must
assign an IP address to the VLANs to route traffic between the two interfaces. The shutdown command in
INTERFACE mode does not affect Layer 2 traffic on the interface.
Note: You cannot assign an IP address to the Default VLAN, which, by default, is VLAN 1. To assign
another VLAN ID to the Default VLAN, use the default
To assign an IP address to a VLAN, follow this step:
StepTaskCommand SyntaxCommand Mode
vlan-idvlan-id command.
Configure an IP address and
1
mask on the interface.
ip address ip-address mask [secondary]INTERFACE
Connecting the S5000 to the Network
After you have completed the hardware installation and software configuration for the S5000 system, you
can connect to your company network by following your company’s cabling requirements.
Configuring File Management
You can store on and access files from various storage media. Rename, delete, and copy files on the system
from the EXEC Privilege mode.
Note: Using flash memory cards in the system that have not been approved by Dell Networking can
cause unexpected system behavior, including a reboot.
Getting Started | 55
Copying Files to and from the System
The command syntax for copying files is similar to UNIX. The copy command uses the format copy
source-file-url destination-file-url.
Note: For a detailed description of the copy command, refer to the FTOS Command Reference Guide.
•To copy a local file to a remote system, combine the file-origin syntax for a local file location with the
file-destination syntax for a remote file location, see Table 3-2.
•To copy a remote file to an S5000 switch, combine the
the
file-destination syntax for a local file location, see Table 3-2.
www.dell.com | support.dell.com
Table 3-2. Forming a copy Command
file-origin syntax for a remote file location with
•You may not copy a file from one remote system to another.
•You may not copy a file from one location to the same location.
•When copying to a server, a hostname can only be used if a DNS server is configured.
•After you insert a USB memory device into the USB port on an S5000 and enter the
format usbflash:// command to erase all existing files and reformat the file system on the device, allow
the process to run to completion before removing the device from the USB port. If you remove the
USB memory device before the formatting is complete, FTOS may not recognize the file system on the
device.
Figure 3-7 shows an example of using the copy command to import a file to the S5000 switch from an FT P
server.
Figure 3-7. Copying a file from a Remote System
Saving the Running-configuration
The running-configuration contains the current system configuration. Dell Networking recommends
copying your running-configuration to the startup-configuration. The system uses the startup-configuration
during boot-up to configure the system. The startup-configuration is stored in the internal flash on the IOM
by default, but you can save the startup-configuration to a USB flash device or on a remote server.
To save the running-configuration:
Note: The commands in this section follow the same format as those in C opying Files to and from the
System but use the filenames startup-configuration and running-configuration. These commands assume
that current directory is the internal flash, which is the system default.
Getting Started | 57
TaskCommand SyntaxCommand Mode
Save the running-configuration to:
www.dell.com | support.dell.com
the startup-configuration on the
internal flash
the usb flash on the IOMcopy running-configusbflash://filename
an FTP server
a TFTP servercopy running-config tftp://{hostip | hostname}/filepath/
an SCP server
Note: When copying to a server, you can only use a hostname if a DNS server is configured.
copy running-config startup-config
copy running-config ftp://
username:password@{hostip
filename
filename
copy running-config scp://
username:password@{hostip
filename
| hostname}/filepath/
| hostname}/filepath/
EXEC Privilege
Configuring the Overload bit for Startup Scenario
For information on setting the router overload bit for a specific period of time after a switch reload is
implemented, see the FTOS Command Line Reference Guide, Chapter 18 - Intermediate System to
Intermediate System (IS-IS).
Viewing Files
File information and content can only be viewed on local file systems. To view a list of files on the internal
or external Flash:
StepTaskCommand SyntaxCommand Mode
1View a list of files on:
the usbflash
The output of the command
dir also shows the read/write privileges, size (in bytes), and date of
modification for each file (Figure 3-8).
dir flash:
dir usbflash:
EXEC Privilegethe internal flash
58|Getting Started
Figure 3-8. Viewing a List of Files in the Internal Flash
FTOS#dir
Directory of flash:
1 drwx 4096 Jan 01 1980 00:00:00 +00:00 .
2 drwx 2048 May 10 2011 14:45:15 +00:00 ..
3 drwx 4096 Feb 17 2011 00:28:00 +00:00 TRACE_LOG_DIR
4 drwx 4096 Feb 17 2011 00:28:02 +00:00 CORE_DUMP_DIR
5 d--- 4096 Feb 17 2011 00:28:02 +00:00 ADMIN_DIR
6 -rwx 1272 Apr 29 2011 16:15:14 +00:00 startup-config
7 -rwx 10093 Feb 17 2011 20:48:02 +00:00 abhi-jan26.cfg
8 -rwx 217155 Feb 22 2011 23:14:34 +00:00 show-tech-cfg.txt
9 -rwx 5162 Mar 02 2011 04:02:58 +00:00 runn-feb6
10 -rwx 10507 Mar 03 2011 01:17:16 +00:00 abhi-feb7.cfg
11 -rwx 4 May 06 2011 22:05:06 +00:00 dhcpBindConflict
12 -rwx 6900 Feb 17 2011 04:43:12 +00:00 startup-config.bak
13 -rwx 1244038 Feb 13 2011 04:27:16 +00:00 f10cp_sysd_110213042625.acore.gz
flash: 2143281152 bytes total (2123755520 bytes free)
--More--
To view the contents of a file, follow this step:
StepTaskCommand SyntaxCommand Mode
1View the:
contents of a file in the internal flash
contents of a file in the usb flash
running-configuration
startup-configuration
show file flash://filename
show file usbflash://filename
show running-config
show startup-config
Viewing Configuration Files
Configuration files have three commented lines at the beginning of the file, as shown in Figure 3-8, to help
you track the last time any user made a change to the file, which user made the changes, and when the file
was last saved to the startup-configuration.
In the running-configuration file, if there is a difference between the timestamp on the “Last configuration
change,” and “Startup-config last updated,” then you have made changes that have not been saved and will
not be preserved upon a system reboot.
EXEC Privilege
Getting Started | 59
www.dell.com | support.dell.com
FTOS#show running-config
Current Configuration ...
! Version 9-0(1-0)
! Last configuration change at Mon Jun 10 21:20:04 2030 by admin
!
boot system stack-unit 0 primary system: B:
boot system stack-unit 0 secondary tftp://10.200.200.241/kp-diablo
boot system stack-unit 0 default tftp://10.11.200.241/kp-diablo
!
redundancy auto-synchronize full
!
service timestamps log datetime
!
hostname FTOS
!
enable password 7 b125455cf679b208e79b910e85789edf
!
username admin password 7 1d28e9f33f99cf5c
!
stack-unit 0 provision S5000
!
interface fibrechannel 0/0
shutdown
!
interface fibrechannel 0/1
shutdown
!
...
-- More --
Figure 3-9. Tracking Changes with Configuration Comments
File System Management
The S5000 switch can use the internal Flash, USB Flash, or remote devices to store files. The system stores
files on the internal Flash by default, but you can configure it to store files elsewhere.
To view file system information:
TaskCommand SyntaxCommand Mode
View information about each file system.
60|Getting Started
The output of the
memory, file structure, media type, and read/write privileges for each storage device in use.
show file-systems command (Figure 3-10) shows the total capacity, amount of free
FTOS#cd usbflash:
FTOS#copy running-config test
!
3998 bytes successfully copied
FTOS#dir
Directory of usbflash:
1 drwx 4096 Jan 01 1980 00:00:00 +00:00 .
2 drwx 2048 May 02 2012 07:05:06 +00:00 ..
3 -rwx 1272 Apr 29 2011 16:15:14 +00:00 startup-config
4 -rwx 3998 May 11 2011 23:36:12 +00:00 test
No File System Specified
File Saved to USB Flash
You can change the default file system so that file management commands apply to a particular device or
memory.
To change the default storage location:
TaskCommand SyntaxCommand Mode
Change the default directory.
You can change the default storage location to the USB Flash (Figure 3-11). File management commands
then apply to the USB Flash rather than the internal Flash.
Figure 3-11. Alternative Storage Location
Viewing command history
The command-history trace feature captures all commands entered by all users of the system with a time
stamp and writes these messages to a dedicated trace log buffer. The system generates a trace message for
each executed command. No password information is saved to the file.
cd directory
EXEC Privilege
To view the command-history trace, use the
show command-history command (Figure 3-12).
Getting Started | 61
Figure 3-12. show command-history Command Example
FTOS#show command-history
[5/18 21:58:32]: CMD-(TEL0):[enable]by admin from vty0 (10.11.68.5)
[5/18 21:58:48]: CMD-(TEL0):[configure]by admin from vty0 (10.11.68.5)
- Repeated 1 time.
[5/18 21:58:57]: CMD-(TEL0):[interface port-channel 1]by admin from vty0 (10.11.68.5)
[5/18 21:59:9]: CMD-(TEL0):[show config]by admin from vty0 (10.11.68.5)
[5/18 22:4:32]: CMD-(TEL0):[exit]by admin from vty0 (10.11.68.5)
[5/18 22:4:41]: CMD-(TEL0):[show interfaces port-channel brief]by admin from vty0
(10.11.68.5)
Upgrading and Downgrading FTOS
www.dell.com | support.dell.com
Note: To upgrade or downgrade FT OS, refer to th e Release Notes for th e version yo u want to load on the
system.
62|Getting Started
Switch Management
This chapter explains the different protocols or services used to manage the S5000 switch, including:
•Configuring Privilege Levels
•Creating a Custom Privilege Level
•Removing a command from EXEC mode
•Moving a command from EXEC privilege mode to EXEC mode
•Allowing Access to CONFIGURATION mode commands
•Allowing Access to INTERFACE, LINE, ROUTE-MAP, and ROUTER modes
•Applying a Privilege Level to a Username
•Applying a Privilege Level to a Terminal Line
•Configuring Logging
•Disabling Logging
•Log Messages in the Internal Buffer
•Configuring Task List for System Log Management
•Configuring a Unix System as a Syslog Server
•Changing System Logging Settings
•Displaying the Logging Buffer and the Logging Configuration
•Configuring a UNIX logging facility level
•Synchronizing log messages
•Enabling timestamp on syslog messages
•File Transfer Services
•Configuring Task List for File Transfer Services
•Terminal Lines
•Configuring Login Authentication for Terminal Lines
•Timing out of EXEC Privilege Mode
•Telneting to Another Network Device
•Locking CONFIGURATION mode
•Viewing the Configuration Lock Status
•Recovering from a Forgotten Password
•Recovering from a Forgotten Enable Password
•Recovering from a Failed Start
4
Switch Management | 63
Configuring Privilege Levels
Privilege levels restrict access to commands based on user or terminal line. There are 16 privilege levels, of
which two are pre-defined. The default privilege level is 1.
www.dell.com | support.dell.com
•Level 1
enable, disable, and exit.
•Level 15—Access to the system begins at EXEC Privilege mode, and all commands are available.
—Access to the system begins at EXEC mode, and EXEC mode commands are limited to
Creating a Custom Privilege Level
Custom privilege levels start with the default EXEC mode command set. You can then customize privilege
levels 2-14 by:
•removing commands from the EXEC mode commands
•moving commands from EXEC Privilege mode to EXEC mode
•allowing access to CONFIGURATION mode commands
•allowing access to INTERFACE, LINE, ROUTE-MAP, and ROUTER mode commands
A user can access all commands at his privilege level and below.
Removing a command from EXEC mode
Remove a command from the list of available commands in EXEC mode for a specific privilege level
using the command
than the level given to a user or terminal line, followed by the first keyword of each command to be
restricted.
privilege exec from CONFIGURATION mode. In the command, specify a level greater
Moving a command from EXEC privilege mode to EXEC mode
Move a command from EXEC Privilege to EXEC mode for a privilege level using the command privilege
from CONFIGURATION mode. In the command, specify the privilege level of the user or terminal
exec
line, and specify all keywords in the command to which you want to allow access.
Allowing Access to CONFIGURATION mode commands
Allow access to CONFIGURATION mode using the command privilege exec level levelconfigure from
CONFIGURATION mode. A user that enters CONFIGURATION mode remains at his privilege level, and
has access to only two commands,
mode command to which you want to allow access using the command
command, specify the privilege level of the user or terminal line, and specify all keywords in the command
to which you want to allow access.
64|Switch Management
end and exit. You must individually specify each CONFIGURATION
privilege configure level level. In the
Allowing Access to INTERFACE, LINE, ROUTE-MAP, and
ROUTER modes
1. Similar to allowing access to CONFIGURATION mode, to allow access to INTERFACE, LINE,
ROUTE-MAP, and ROUTER modes, you must first allow access to the command that enters you into
the mode. For example, allow a user to enter INTERFACE mode using the command
level level interface tengigabitethernet command.
2. Then, individually identify the INTERFACE, LINE, ROUTE-MAP or ROUTER commands to which
you want to allow access using the command
privilege {interface | line | route-map | router} level level. In
the command, specify the privilege level of the user or terminal line, and specify all keywords in the
command to which you want to allow access.
The following table lists the configuration tasks you can use to customize a privilege level:
TaskCommand SyntaxCommand Mode
privilege configure
Remove a command from the list of available commands
in EXEC mode.
Move a command from EXEC Privilege to EXEC mode.
Allow access to CONFIGURATION mode.
Allow access to INTERFACE, LINE, ROUTE-MAP,
and/or ROUTER mode. Specify all keywords in the
command.
Allow access to a CONFIGURAT ION, INTERFACE,
LINE, ROUTE-MAP, and/or ROUTER mode command.
The configuration in Figure 4-1 creates privilege level 3. This level:
•removes the
•moves the command
resequence command from EXEC mode by requiring a minimum of privilege level 4
capture bgp-pdu max-buffer-size from EXEC Privilege to EXEC mode by requiring
a minimum privilege level 3, which is the configured level for VTY 0
•allows access to CONFIGURATION mode with the
•allows access to INTERFACE and LINE modes are allowed with no command
privilege exec level level
{
command ||...|| command}
privilegeexeclevel level
{
command ||...|| command}
privilege exec level level
privilege configure level level
{
interface | line | route-map |
router} {command-keyword ||...||
command-keyword}
privilege {configure | interface | line
|
route-map | router} level level
{
command ||...|| command}
banner command
CONFIGURATION
CONFIGURATION
CONFIGURATION
CONFIGURATION
CONFIGURATION
Switch Management | 65
Figure 4-1. Create a Custom Privilege Level Apply a Privilege Level to a Username
FTOS(conf)#do show run privilege
!
FTOS(conf)#privilege exec level 3 capture
FTOS(conf)#privilege exec level 3 configure
FTOS(conf)#privilege exec level 4 resequence
FTOS(conf)#privilege exec level 3 clear arp-cache
FTOS(conf)#privilege exec level 3 clear arp-cache max-buffer-size
FTOS(conf)#privilege configure level 3 line
FTOS(conf)#privilege configure level 3 interface
FTOS(conf)#do telnet 10.11.80.201
[telnet output omitted]
FTOS#show priv
Current privilege level is 3.
FTOS#?
capture Capture packet
configure Configuring from terminal
disable Turn off privileged commands
enable Turn on privileged commands
exit Exit from the EXEC
ip Global IP subcommands
monitor Monitoring feature
mtrace Trace reverse multicast path from destination to source
ping Send echo messages
quit Exit from the EXEC
show Show running system information
[output omitted]
FTOS#config
[output omitted]
FTOS(conf)#do show priv
Current privilege level is 3.
FTOS(conf)#?
end Exit from configuration mode
exit Exit from configuration mode
interface Select an interface to configure
FTOS(conf)#interface ?
fortyGigE FortyGigabit Ethernet interface
FibreChannel FibreChannel interface
gigabitethernet Gigabit Ethernet interface
loopback Loopback interface
managementethernet Management Ethernet interface
null Null interface
port-channel Port-channel interface
range Configure interface range
tengigabitethernet TenGigabit Ethernet interface
vlan VLAN interface
FTOS(conf)#interface tengigabitethernet 1/1
FTOS(conf-if-te-1/1)#?
end Exit from configuration mode
exit Exit from interface configuration mode
FTOS(conf-if-te-1/1)#exit
FTOS(conf)#line ?
console Primary terminal line
vty Virtual terminal
FTOS(conf)#line vty 0
FTOS(conf-line-vty)#?
exit Exit from line configuration mode
FTOS(conf-line-vty)#
www.dell.com | support.dell.com
66|Switch Management
Applying a Privilege Level to a Username
To set a privilege level for a user:
TaskCommand SyntaxCommand Mode
Configure a privilege level for a user.
username username privilege level
CONFIGURATION
Applying a Privilege Level to a Terminal Line
To set a privilege level for a terminal line:
TaskCommand SyntaxCommand Mode
Configure a privilege level for a terminal line.
Note: When you assign a privilege level between 2 and 15, access to the system begins at EXEC mode,
but the prompt is hostname#, rather than hostname>.
privilege level level
LINE
Configuring Logging
FTOS tracks changes in the system using event and error messages. By default, FTOS logs these messages
on:
•the internal buffer
•console and terminal lines, and
•any configured syslog servers
Disabling Logging
To disable logging:
TaskCommand SyntaxCommand Mode
Disable all logging except on the console.
Disable logging to the logging buffer.
Disable logging to terminal lines.
Disable console logging.
no logging on
no logging buffer
no logging monitor
no logging console
CONFIGURATION
CONFIGURATION
CONFIGURATION
CONFIGURATION
Switch Management | 67
Log Messages in the Internal Buffer
All error messages, except those beginning with %BOOTUP (Message), are logged in the internal buffer.
Configuring Task List for System Log Management
The following list includes the configuration tasks for system log management:
•Disabling System Logging
•Sending System Messages to a Syslog Server
www.dell.com | support.dell.com
Disabling System Logging
By default, logging is enabled and log messages are sent to the logging buffer, all terminal lines, console,
and syslog servers.
Enable and disable system logging using the following commands:
TaskCommand SyntaxCommand Mode
Disable all logging except on the console.
Disable logging to the logging buffer.
Disable logging to terminal lines.
Disable console logging.
no logging on
no logging buffer
no logging monitor
no logging console
CONFIGURATION
CONFIGURATION
CONFIGURATION
CONFIGURATION
Sending System Messages to a Syslog Server
Send system messages to a syslog server by specifying the server with the following command:
TaskCommand SyntaxCommand Mode
Specify the server to which you want to send system
messages. You can configure up to eight syslog servers.
Configuring a Unix System as a Syslog Server
Configure a UNIX system as a syslog server by adding the following lines to /etc/syslog.conf on the Unix
system and assigning write permissions to the file.
•on a 4.1 BSD UNIX system, add the line:
•on a 5.7 SunOS UNIX system, add the line: local7.debugging /var/adm/ftos.log
In the lines above, local7 is the logging facility level and debugging is the severity level.
68|Switch Management
logging {ip-address | hostname}CONFIGURATION
local7.debugging /var/log/ftos.log
Changing System Logging Settings
You can change the default settings of the system logging by changing the severity level and the storage
location. The default is to log all messages up to debug level, that is, all system messages. By changing the
severity level in the logging commands, you control the number of system messages logged.
To change one of the settings for logging system messages, use any or all of the following commands in
the CONFIGURATION mode:
TaskCommand SyntaxCommand Mode
Specify the minimum severity level for logging to the logging buffer.
Specify the minimum severity level for logging to the console.
Specify the minimum severity level for logging to terminal lines.
Specifying the minimum severity level for logging to a syslog server.
Specify the minimum severity level for logging to the syslog history
table.
TaskCommand SyntaxCommand Mode
Specify the size of the logging buffer.
Note: When you decrease the buffer size, FTOS deletes
all messages stored in the buffer. Increasing the buffer
size does not affect messages in the buffer.
Specify the number of messages that FTOS saves to its
logging history table.
logging buffered sizeCONFIGURATION
logging history size size
To view the logging buffer and configuration, enter the
show running-config logging command in EXEC privilege mode
Switch Management | 69
www.dell.com | support.dell.com
FTOS#show logging
Syslog logging: enabled
Console logging: level debugging
Monitor logging: level debugging
Buffer logging: level debugging, 50 Messages Logged, Size (40960 bytes)
Trap logging: level informational
Logging to 172.16.1.162
Logging to 10.10.10.4
Logging to 10.1.2.4
Logging to 172.31.1.4
Logging to 133.33.33.4
Apr 30 11:14:33: %STKUNIT1-M:CP %SYS-5-CONFIG_I: Configured from vty0 ( 10.11.51.14 )by admin
Apr 30 10:13:08: %STKUNIT1-M:CP %SYS-5-CONFIG_I: Configured from vty0 ( 10.11.51.14 )by admin
Apr 30 10:06:41: %STKUNIT1-M:CP %SEC-3-AUTHENTICATION_ENABLE_SUCCESS: Enable password authentication
success on vty0 ( 10.11.51.14 )
Apr 30 10:06:36: %STKUNIT1-M:CP %SEC-5-LOGIN_SUCCESS: Login successful for user admin on vty0
10.11.51.14)
Apr 26 12:02:48: %S5000:1 %IFAGT-5-STACK_PORT_LINK_DOWN: Changed stack port state to down: 1/56
Apr 26 11:52:45: %S5000:1 %IFAGT-5-STACK_PORT_LINK_UP: Changed stack port state to up: 1/56
Apr 26 11:51:13: %S5000:1 %IFAGT-5-STACK_PORT_LINK_DOWN: Changed stack port state to down: 1/56
Apr 26 11:51:01: %S5000:1 %IFAGT-5-STACK_PORT_LINK_DOWN: Changed stack port state to down: 1/48
Apr 26 11:48:57: %S5000:1 %IFAGT-5-STACK_PORT_LINK_UP: Changed stack port state to up: 1/56
Apr 26 11:48:47: %S5000:1 %IFAGT-5-STACK_PORT_LINK_UP: Changed stack port state to up: 1/48
Apr 26 11:43:52: %S5000:1 %IFAGT-5-STACK_PORT_LINK_DOWN: Changed stack port state to down: 1/48
Apr 26 11:43:43: %S5000:1 %IFAGT-5-STACK_PORT_LINK_DOWN: Changed stack port state to down: 1/56
Apr 26 11:33:08: %S5000:1 %IFAGT-5-STACK_PORT_LINK_UP: Changed stack port state to up: 1/48
Apr 26 11:33:08: %S5000:1 %IFAGT-5-STACK_PORT_LINK_UP: Changed stack port state to up: 1/56
Apr 25 11:07:15: %S5000:1 %IFAGT-5-REMOVED_OPTICS_PLUS: Optics SFP+ removed in slot 1 port 2
Apr 25 11:07:14: %S5000:1 %IFAGT-5-REMOVED_OPTICS_PLUS: Optics SFP+ removed in slot 1 port 3
!------------------- output truncated ------------------!
Displaying the Logging Buffer and the Logging Configuration
Display the current contents of the logging buffer and the logging settings for the system, use the show
logging
Figure 4-2. show logging Command Example
command in the EXEC privilege mode as shown in the example below.
70|Switch Management
To view any changes made, use the show running-config logging command (Figure 4-3) in the EXEC
privilege mode.
You can save system log messages with a UNIX system logging facility.
To configure a UNIX logging facility level, use the following command in the CONFIGURATION mode:
Command SyntaxCommand ModePurpose
logging facility [facility-type]CONFIGURATION Specify one of the following parameters.
•auth (for authorization messages)
•cron (for system scheduler messages)
•daemon (for system daemons)
•kern (for kernel messages)
•local0 (for local use)
•local1 (for local use)
•local2 (for local use)
•local3 (for local use)
•local4 (for local use)
•local5 (for local use)
•local6 (for local use)
•local7 (for local use). This is the default.
•lpr (for line printer system messages)
•mail (for mail system messages)
•news (for USENET news messages)
•sys9 (system use)
•sys10 (system use)
•sys11 (system use)
•sys12 (system use)
•sys13 (system use)
•sys14 (system use)
•syslog (for syslog messages)
•user (for user programs)
•uucp (UNIX to UNIX copy protocol)
The default is local7.
To view non-default settings, use the
Figure 4-3. show running-config logging Command Example
show running-config logging command (Figure 4-3) in EXEC mode.
Switch Management | 71
www.dell.com | support.dell.com
Synchronizing log messages
You can configure FTOS to filter and consolidate the system messages for a specific line by synchronizing
the message output. Only the messages with a severity at or below the set level appear. This feature works
on the terminal and console connections available on the system.
To synchronize log messages, use these commands in the following sequence starting in the
CONFIGURATION mode:
StepCommand SyntaxCommand ModePurpose
1
line {console 0 | vty number [end-number]
|
aux 0}
CONFIGURATION Enter the LINE mode. Configure the
following parameters for the virtual
terminal lines:
•
number range: zero (0) to 9.
•
end-number range: 1 to 8.
You can configure multiple virtual
terminals at one time by entering a
and an
With FTOS, you can configure the system to transfer files over the network using File Transfer Protocol
(FTP). One FTP application is copying the system image files over an interface on to the system; however,
FTP is not supported on VLAN interfaces.
For more information on FTP, refer to RFC 959, File Transfer Pr oto col.
Note: To transmit large files, Dell Networking recommends configuring the switch as an FTP server.
Configuring Task List for File Transfer Services
The following list includes the configuration tasks for file transfer services:
•Enabling FTP server (mandatory)
•Configuring FTP server parameters (optional)
•Configuring FTP client parameters (optional)
Enabling FTP server
To enable the system as an FTP server, use the following command in the CONFIGURATIO N mode:
Command SyntaxComm and Mo dePurpose
ftp-server enable
To view the FTP configuration, enter the
CONFIGURATION Enable FTP on the system.
show running-config ftp command in EXEC privilege mode
(Figure 4-4).
Figure 4-4. show running-config ftp Command Example
Switch Management | 73
Configuring FTP server parameters
After the FTP server is enabled on the system, you can configure different parameters.
To configure FTP server parameters, use any or all of the following commands in the CONFIGURATION
mode:
Command SyntaxCommand ModePurpose
ftp-server topdir dirCONFIGURATION Specify the directory for users using FTP to reach the
system.
The default is the internal flash directory.
Note: You cannot use the change directory (cd) command until ftp-server topdir has been
configured.
To view the FTP configuration, use the
CONFIGURATION Specify a user name for all FTP users and configure either
a plain text or encrypted password. Configure the
following optional and required parameters:
•username: Enter a text string
•
encryption-type: Enter 0 for plain text or 7 for
encrypted text.
•
password: Enter a text string.
show running-config ftp command in EXEC privilege mode.
Configuring FTP client parameters
To configure FTP client parameters, use the following commands in the CONFIGURATION mode:
Command SyntaxCommand ModePurpose
ip ftp source-interface interfaceCONFIGURATION Enter the following keywords and slot/port or number
information:
•For a Gigabit Ethernet interface, enter the keyword
GigabitEthernet followed by the slot/port information.
•For a loopback interface, enter the keyword
followed by a number between 0 and 16383.
•For a port channel interface, enter the keyword
port-channel followed by a number from 1 to 255.
•For a 10-Gigabit Ethernet interface, enter the keyword
TenGigabitEthernet followed by the slot/port
information.
•For a VLAN interface, enter the keyword
by a number from 1 to 4094.
•
For a 40-Gigabit Ethernet interface, enter the keyword
fortyGigE followed by the slot/port information.
loopback
vlan followed
ip ftp password password
ip ftp username nameCONFIGURATIO N Enter username to use on FTP client.
74|Switch Management
CONFIGURATIONConfigure a password.
To view FTP configuration, use the show running-config ftp command in the EXEC privilege mode as
FTOS(conf-std-nacl)#show config
!
ip access-list standard myvtyacl
seq 5 permit host 10.11.0.1
FTOS(conf-std-nacl)#line vty 0
FTOS(conf-line-vty)#show config
line vty 0
access-class myvtyacl
shown in the example for Enabling FTP server.
Terminal Lines
You can access the system remotely and restrict access to the system by creating user profiles. The terminal
lines on the system provide different means of accessing the system. The virtual terminal lines (VTY)
connect you through Telnet to the system. The auxiliary line (aux) connects secondary devices such as
modems.
Denying and Permitting Access to a Terminal Line
Dell Networking recommends applying only standard ACLs to deny and permit access to VTY lines.
•Layer 3 ACL deny all traffic that is not explicitly permitted, but in the case of VTY lines, an ACL with
no rules does not deny any traffic.
•You cannot use
VTY line.
To apply an IP ACL to a line:
show ip accounting access-list to display the contents of an ACL that is applied only to a
TaskCommand SyntaxCommand Mode
Apply an ACL to a VTY line.
To view the configuration, enter the
Figure 4-5. Applying an Access List to a VTY Line
FTOS Behavior: Prior to FTOS ve rsion 7.4.2.0, in order to d eny access on a VTY line, you must app ly
an ACL and AAA authentication to the line. Then users are denied access only after they enter a
username and password. Beginning in FTOS version 7.4.2.0, only an ACL is required, and users are
denied access before they are prompted for a username and password.
ip access-class access-listLINE
show config command in LINE mode (Figure 4-5).
Switch Management | 75
www.dell.com | support.dell.com
Configuring Login Authentication for Terminal Lines
You can use any combination of up to 6 authentication methods to authenticate a user on a terminal line. A
combination of authentication methods is called a method list. If the user fails the first authentication
method, FTOS prompts the next method until all methods are exhausted, at which point the connection is
terminated. The available authentication methods are:
•
enable—Prompt for the enable password.
line—Prompt for the e password you assigned to the terminal line. You must configure a password for
•
the terminal line to which you assign a method list that contains the
Configure a password using the command password from LINE mode.
local—Prompt for the the system username and password.
•
•
none—Do not authenticate the user.
•
radius—Prompt for a username and password and use a RADIUS server to authenticate.
tacacs+—Prompt for a username and password and use a TACACS+ server to authenticate.
•
To configure authentication for a terminal line, follow these steps:
StepTaskCommand SyntaxCommand Mode
line authentication method.
1Create an authentication met hod list.
You may use a mnemonic name or
use the keyword
authentication method for terminal
lines is
list is empty.
2Apply the me thod list from Step 1 to
a terminal line.
3If you used the line authentication
method in the method list you
applied to the terminal line,
configure a password for the terminal
line.
FTOS(conf)#line con 0
FTOS(conf-line-console)#exec-timeout 0
FTOS(conf-line-console)#show config
line console 0
exec-timeout 0 0
FTOS(conf-line-console)#
Timing out of EXEC Privilege Mode
EXEC timeout is a basic security feature that returns FTOS to the EXEC mode after a period of inactivity
on terminal lines.
To change the timeout period or disable EXEC timeout.
TaskCommand SyntaxCommand Mode
Set the number of minutes and seconds.
Default: 10 minutes on console, 30 minutes on VTY.
exec-timeout minutes [seconds]
LINE
Disable EXEC timeout by setting the timeout period to 0.
Return to the default timeout values.
To view the configuration, enter the
show config command from LINE mode (Figure 4-7).
no exec-timeout
LINE
Figure 4-7. Configuring EXEC Timeout
Switch Management | 77
Telneting to Another Network Device
FTOS# telnet 10.11.80.203
Trying 10.11.80.203...
Connected to 10.11.80.203.
Exit character is '^]'.
Login:
Login: admin
Password:
FTOS>exit
FTOS#telnet 2200:2200:2200:2200:2200::2201
Trying 2200:2200:2200:2200:2200::2201...
Connected to 2200:2200:2200:2200:2200::2201.
Exit character is '^]'.
FreeBSD/i386 (freebsd2.dell.com) (ttyp1)
login: admin
FTOS#
To telnet to another device:
TaskCommand SyntaxCommand Mode
www.dell.com | support.dell.com
T elnet to the stack-unit.You do not need to configure the management port
on the stack-unit to be able to telnet to it.
Telnet to a device with an IPv4 or IPv6 address. If you do not enter an IP
address, FTOS enters a Telnet dialog that prompts you for one.
•Enter an IPv4 address in dotted decimal format (A.B.C.D).
•Enter an IPv6 address in the format
0000:0000:0000:0000:0000:0000:0000:0000. Elision of zeros is
supported.
Figure 4-8. Telnet to Another Network Device
telnet-peer-stack-unit
telnet[ip-address]
EXEC Privilege
EXEC Privilege
Locking CONFIGURATION mode
FTOS allows multiple users to make configurations at the same time. You can lock CONFIGURATION
mode so that only one user can be in CONFIGURATION mode at any time (Message 2).
A two types of locks can be set: auto and manual.
•Set an auto-lock using the command
When you set an auto-lock, every time a user is in CONFIGURATION mode all other users are denied
access. This means that you can exit to EXEC Privilege mode, and re-enter CONFIGURATION mode
without having to set the lock again.
78|Switch Management
•Set a manual lock using the command
you configure a manual lock, which is the default, you must enter this command time you want to enter
CONFIGURATION mode and deny access to others.
configuration mode exclusive auto from CONFIGURATION mode.
configure terminal lock from CONFIGURATION mode. When
Figure 4-9. Locking CONFIGURATION mode
FTOS(conf)#configuration mode exclusive auto
FTOS(conf)#exit
Feb 5 11:55:41: %STKUNIT0-M:CP %SYS-5-CONFIG_I: Configured from console
If another user attempts to enter CONFIGURATION mode while a lock is in place, Message 1 appears on
their terminal.
Message 1 CONFIGURATION mode Locked Error
% Error: User "" on line console0 is in exclusive configuration mode
If any user is already in CONFIGURATION mode when while a lock is in place, Message 2 appears on
their terminal.
Message 2 Cannot Lock CONFIGURATION mode Error
% Error: Can't lock configuration mode exclusively since the following users are
currently configuring the system:
User "admin" on line vty1 ( 10.1.1.1 )
Note: The CONFIGURATION mode lock corresponds to a VTY session, not a user. Therefore, if you
configure a lock and then exit CONFIGURATION mode, and another user enters CONFIGURATION
mode, when you attempt to re-enter CONFIGURATION mode, you are denied access even though you
are the one that configured the lock.
Note: If your session times out and you return to EXEC mode, the CONFIGURATION mode lock is
unconfigured.
Viewing the Configuration Lock Status
If you attempt to enter CONFIGURAT ION mode when another user has locked it, you may view which
user has control of CONFIGURATION mode using the command
Privilege mode.
You can then send any user a message using the
you can clear any line using the command
send command from EXEC Privilege mode. Alternatively
clear from EXEC Privilege mode. If you clear a console session,
the user is returned to EXEC mode.
show configuration lock from EXEC
Switch Management | 79
Recovering from a Forgotten Password
If you configure authentication for the console and you exit out of EXEC mode or your console session
times out, you are prompted for a password to re-enter.
If you forget your password, follow these steps:
StepTaskCommand SyntaxCommand Mode
1Log onto the system via console.
2Power-cycle the chassis by switching off all of the power modules and then switching them back on.
www.dell.com | support.dell.com
3Press any key to abort the boot
process and enter Boot User mode.
The BOOT USER prompt is
displayed.
4Set the system parameters to ignore
the startup configuration file when
the switch reloads.
5Reload the system.
6Copy startup-confi g.bak to th e
running config.
7Remove all authentication statements
you might have for the console.
8Save the running-config.
9Set the system parameters to ignore
the startup configuration file when
the switch reloads.
10Save the running-config.copy running-config startup-config
Press any key.During switch bootup
ignore startup config
reload
copy flash://startup-config.bak
running-config
no authentication login
no password
copy running-config startup-config
ignore startup config
or
write memory
BOOT USER
BOOT USER
EXEC Privilege
LINE
EXEC Privilege
BOOT USER
EXEC Privilege
Recovering from a Forgotten Enable Password
If you forget the enable password, follow these steps:
StepTaskCommand SyntaxCommand Mode
1Log onto the system via console.
2Power-cycle the chassis by switching off all of the power modules and then switching them back on.
3Press any key to abort the boot
process and enter Boot User mode.
The BOOT USER prompt is
displayed.
80|Switch Management
Press any key.During switch bootup
StepTaskCommand SyntaxCommand Mode
4Set the system parameters to ignore
the startup configuration file when
the switch reloads.
5Reload the system.reloadBOOT USER
6Configure a new enable password.
7Save the running-config to the
startup-config.
ignore startup config
enable {secret | password}CONFIGURATION
copy running-config startup-config
or
write memory
BOOT USER
EXEC Privilege
Recovering from a Failed Start
An S5000 that does not start correctly might be attempting to boot from a corrupted FTOS image or from a
mis-specified location. In that case, you can restart the system and interrupt the boot process to point the
system to another FTOS image and boot parameters. For more information on the Boot User commands,
refer to the Boot User chapter in the FTOS Command Line Reference for the S5000.
StepTaskCommand SyntaxCommand Mode
1Power-cycle the chassis (pull the power cord and reinsert it).
2Press any key to abort the boot process and
enter Boot User mode. The BOOT USER
prompt is displayed.
Press any key.During switch
bootup
3Configure the FTOS image and parameters
to use when the switch reloads.
Default: The S5000 boots using the
primary parameters if they are valid. If the
primary parameters are not valid, the
switch boots with the secondary
parameters. If the secondary parameters
are not valid, it boots with the default
parameters.
4Assign an IP address to the Management
Ethernet interface.
5Assign an IP address as the default
gateway for the switch.
6Reload the switch.reloadBOOT USER
boot change {primary | secondary | default} BOOT USER
interface management ethernet ip address
ip-address
default gateway
ip-addressBOOT USER
BOOT USER
Switch Management | 81
www.dell.com | support.dell.com
82|Switch Management
802.1ag
802.1ag is available on the S5000 switch.
Ethernet Operations, Administration, and Maintenance (OAM) is a set of tools used to install, monitor,
troubleshoot, and manage Ethernet infrastructure deployments. Etherne t OAM consists of three main
areas:
1. Service Layer OAM: IEEE 802.1ag Connectivity Fault Management (CFM)
2. Link Layer OAM: IEEE 802.3ah OAM
3. Ethernet Local management Interface (MEF-16 E-LMI)
This chapter contains the following major sections:
•Ethernet CFM
•Maintenance Domains
•Maintenance Points
•Maintenance End Points
•Implementation Information
•Configuring CFM
•Enabling Ethernet CFM
•Creating a Maintenance Domain
•Creating a Maintenance Association
•Creating Maintenance Points
•Continuity Check Messages
•Loopback Message and Response
•Linktrace Message and Response
•Enabling CFM SNMP Traps
•Displaying Ethernet CFM Statistics
5
802.1ag | 83
www.dell.com | support.dell.com
Ethernet CFM
Ethernet CFM is an end-to-end per-service-instance Ethernet OAM scheme which enables: proactive
connectivity monitoring, fault verification, and fault isolation.
The service-instance with regard to OAM for Metro/Carrier Ethernet is a VLAN. This service is sold to an
end-customer by a network service provider. Typically, the service provider contracts with multiple
network operators to provide end-to-end service between customers. For end-to-end service between
customer switches, connectivity must be present across the service provider through multiple network
operators.
Layer 2 Ethernet networks usually cannot be managed with IP tools such as ICMP Ping and IP Traceroute.
Traditional IP tools often fail because:
•there are complex interactions between various Layer 2 and Layer 3 protocols such as STP, LAG,
VRRP, and ECMP configurations.
•Ping and traceroute are not designed to verify data connectivity in the network and within each node in
the network (such as in the switching fabric and hardware forwarding tables).
•when networks are built from different operational domains, access controls impose restrictions that
cannot be overcome at the IP level, resulting in poor fault visibility. There is a need for hierarchical
domains that can be monitored and maintained independently by each provider or operator.
•routing protocols choose a subset of the total network topology for forwarding, making it hard to detect
faults in links and nodes that are not included in the active routing topology. This is made more
complex when using some form of Traffic Engineering (TE) based routing.
•network and element discovery and cataloging is not clearly defined using IP troubleshooting tools.
There is a need for Layer 2 equivalents to manage and troubleshoot native Layer 2 Ethernet networks. W ith
these tools, you can identify, isolate, and repair faults quickly and easily , which reduces operational cost of
running the network. OAM also increases availability and reduces mean time to recovery, which allows for
tighter service-level agreements, resulting in increased revenue for the service provider.
In addition to providing end-to-end OAM in native Layer 2 Ethernet Service Provider/Metro networks,
you can also use CFM to manage and troubleshoot any Layer 2 ne twork including enterprise, datacenter,
and cluster networks.
Maintenance Domains
A CFM maintenance domain is a management space on a network that is owned and operated by a single
management entity . The network administrator assigns a unique maintenance level (0 to 7) to each domain
to define the hierarchical relationship between domains. Domains can touch or nest but cannot overlap or
intersect as that would require management by multiple entities.
CFM divides a network into hierarchical maintenance domains, as shown in the illustration below.
84|802.1ag
Figure 5-1. OAM Domains
Ethernet Access
MPLS CoreMPLS Access
Customer Network
Customer Network
Customer Domain (7)
Provider Domain (6)
O
per
atorDom
ain (5)
Operator Domain (5)
Operator Domain (5)
MPLS Domain(4)
Service Provider Network
MIP
MEP
Customer Network
Service Provider Network
Customer Network
Ethernet Access
Operator Domain (5)
MPLS CoreMPLS Access
Customer Domain (7)
Provider Domain (6)
Operator Dom
MPLS D
omain (4)
ain (5
)
Operator Domain (5)
Maintenance Points
Domains are comprised of logical entities called Maintenance Points. A maintenance point is an interface
demarcation that confines CFM frames to a domain. There are two types of maintenance points:
•Maintenance End Points (MEPs): a logical entity that marks the end-point of a domain
•Maintenance Intermediate Points (MIPs): a logical entity configured at a port of a switch that is an
intermediate point of a Maintenance Entity (ME). An ME is a point-to-point relationship between two
MEPs within a single domain. MIPs are internal to a domain, not at the boundary, and respond to CFM
only when triggered by linktrace and loopback messages. MIPs can be configured to snoop Continuity
Check Messages (CCMs) to build a MIP CCM database.
Figure 5-2. Maintenance Points
These roles define the relationships between all devices so that each device can monitor the layers under its
responsibility. Maintenance points drop all lower-level frames and forward all higher-level frames.
802.1ag | 85
Maintenance End Points
A Maintenance End Point (MEP) is a logical entity that marks the end-point of a domain. There are two
types of MEPs defined in 802.1ag for an 802.1 bridge:
•Up-MEP: monitors the forwarding path internal to an bridge on the customer or provider edge; on
Dell Networking systems the internal forwarding path is effectively the switch fabric and forwarding
engine.
•Down-MEP: monitors the forwarding path external to another bridge.
Configure Up- MEPs on ingress ports, ports that send traffic towards the bridge relay. Configure
Down-MEPs on egress ports, ports that send traffic away from the bridge relay.
www.dell.com | support.dell.com
Figure 5-3. Up-MEP versus Down-MEP
Customer Network
Service Provider Ethernet Access
towards relay
Up-MEP
Down-MEP
away from relay
Implementation Information
•Since the S5000 has a single MAC address for all physical/LAG interfaces, only one MEP is allowed
per MA (per VLAN or per MD level).
Configuring CFM
Configuring CFM is a five-step process:
1. Configure the ecfmacl CAM region using the
Allocation.
2. Enabling Ethernet CFM.
3. Creating a Maintenance Domain.
4. Creating a Maintenance Association.
cam-acl command. Refer to User-Configurable CAM
5. Creating Maintenance Points.
6. Use CFM tools:
86|802.1ag
aContinuity Check Messages
bLoopback Message and Response
cLinktrace Message and Response
Related Configuration Tasks
•Enabling CFM SNMP Traps
•Displaying Ethernet CFM Statistics
Enabling Ethernet CFM
TaskCommand SyntaxCommand Mode
Spawn the CFM process. No CFM configuration is
allowed until the CFM process is spawned.
Disable Ethernet CFM without stopping the CFM
process.
ethernet cfm
disable
CONFIGURATION
ETHERNET CFM
Creating a Maintenance Domain
CFM divides a network into hierarchical maintenance domains, as shown in the illustration in Maintenance
Domains.
StepTaskCommand SyntaxCommand Mode
1Create maintenance domain.
2Display maintenance domain inform ati on.
FTOS# show ethernet cfm domain
Domain Name: customer
Level: 7
Total Service: 1
Services
MA-Name VLAN CC-Int X-CHK Status
My_MA 200 10s enabled
Domain Name: praveen
Level: 6
Total Service: 1
Services
MA-Name VLAN CC-Int X-CHK Status
Your_MA 100 10s enabled
domain name md-level number
Range: 0-7
show ethernet cfm domain [name |
brief]
ETHERNET CFM
EXEC Privilege
802.1ag | 87
Creating a Maintenance Association
A Maintenance Association (MA) is a subdivision of an MD that contains all managed entities
corresponding to a single end-to-end service, typically a VLAN. An MA is associated with a VLAN ID.
TaskCommand SyntaxCommand Mode
www.dell.com | support.dell.com
Create maintenance association.
Creating Maintenance Points
Domains are comprised of logical entities called Maintenance Points. A maintenance point is a interface
demarcation that confines CFM frames to a domain. There are two types of maintenance points:
•Maintenance End Points (MEPs): a logical entity that marks the end-point of a domain
•Maintenance Intermediate Points (MIPs): a logical entity configured at a port of a switch that
constitutes intermediate points of an Maintenance Entity (ME). An ME is a point-to-point relationship
between two MEPs within a single domain.
These roles define the relationships between all devices so that each device can monitor the layers under its
responsibility.
Creating a Maintenance End Point
A Maintenance End Point (MEP) is a logical entity that marks the end-point of a domain. There are two
types of MEPs defined in 802.1ag for an 802.1 bridge:
•Up-MEP: monitors the forwarding path internal to an bridge on the customer or provider edge; on
Dell Networking systems the internal forwarding path is effectively the switch fabric and forwarding
engine.
•Down-MEP: monitors the forwarding path external another bridge.
service name vlan vlan-id ECFM DOMAIN
Configure Up- MEPs on ingress ports, ports that send traffic towards the bridge relay. Configure
Down-MEPs on egress ports, ports that send traffic away from the bridge relay.
100 cfm0 7 MEP Te 4/10 Enabled
test0 10 DOWN 00:01:e8:59:23:45
200 cfm1 6 MEP Te 4/10 Enabled
test1 20 DOWN 00:01:e8:59:23:45
300 cfm2 5 MEP Te 4/10 Enabled
test2 30 DOWN 00:01:e8:59:23:45
Creating a Maintenance Intermediate Point
Maintenance Intermediate Point (MIP) is a logical entity configured at a port of a switch that constitutes
intermediate points of an Maintenance Entity (ME). An ME is a point-to-point relationship between two
MEPs within a single domain. An MIP is not associated with any MA or service instance, and it belongs to
the entire MD.
TaskCommand SyntaxCommand Mode
Create an MIP.
Display configured MEPs and
MIPs.
FTOS#show ethernet cfm maintenance-points local mip
------------------------------------------------------------------------------MPID Domain Name Level Type Port CCM-Status
MA Name VLAN Dir MAC
Continuity Check Messages (CCM) are periodic hellos used to:
•discover MEPs and MIPs within a maintenance domain
•detect loss of connectivity between MEPs
•detect misconfiguration, such as VLAN ID mismatch between MEPs
•to detect unauthorized MEPs in a maintenance domain
Continuity Check Messages (CCM) are multicast Ethernet frames sent at regular intervals from each MEP.
They have a destination address based on the MD level (01:80:C2:00:00:3X where X is the MD level of
the transmitting MEP from 0 to 7). All MEPs must listen to these multicast MAC addresses and process
these messages. MIPs may optionally processes the CCM messages originated by MEPs and construct a
MIP CCM database.
90|802.1ag
MEPs and MIPs filter CCMs from higher and lower domain levels as described in Table 5-1.
Less than my levelBridge-relay side or Wire sideDropDropDrop
My levelBridge-relay sideConsumeDropAdd to MIP-DB
Wire sideDropConsume
Greater than my levelBridge-relay side or Wire sideForwardForwardForward
and forward
All the remote MEPs in the maintenance domain are defined on each MEP. Each MEP then expects a
periodic CCM from the configured list of MEPs. A connectivity failure is then defined as:
1. Loss of 3 consecutive CCMs from any of the remote MEP, which indicates a network failure
2. Reception of a CCM with an incorrect CCM transmission interval, which indicates a configuration
error.
3. Reception of CCM with an incorrect MEP ID or MAID, which indicates a configuration or
cross-connect error. This could happen when different VLANs are cross-connected due to a
configuration error.
4. Reception of a CCM with an MD level lower than that of the receiving MEP, which indicates a
configuration or cross-connect error.
5. Reception of a CCM containing a port status/interface status TLV, which indicates a failed bridge or
aggregated port.
The Continuity Check protocol sends fault notifications (Syslogs, and SNMP traps if enabled) whenever
any of the above errors are encountered.
802.1ag | 91
Enabling CCM
StepTaskCommand SyntaxCommand Mode
www.dell.com | support.dell.com
1Enable CCM.
2Configure the transmit interval (mandatory).
The interval specified applies to all MEPs in
the domain.
no ccm disable
Default: Disabled
ccm transmit-interval seconds
Default: 10 seconds
ECFM DOMAIN
ECFM DOMAIN
Enabling Cross-checking
TaskCommand SyntaxCommand Mode
Enable cross-checking.
Start the cross-check operation for an MEP.
Configure the amount of time the system waits for a
remote MEP to come up before the cross-check operation
is started.
mep cross-check enable
Default: Disabled
mep cross-check mep-id
mep cross-check start-delay number
ETHERNET CFM
ETHERNET CFM
ETHERNET CFM
Loopback Message and Response
Loopback Message and Response (LBM, LBR), also called Layer 2 Ping, is an administrative echo
transmitted by MEPs to verify reachability to another MEP or MIP within the maintenance domain. LBM
and LBR are unicast frames.
TaskCommand SyntaxCommand Mode
Send a Loopback message.
Linktrace Message and Response
Linktrace Message and Response (LTM, LTR), also called Layer 2 Traceroute, is an administratively sent
multicast frames transmitted by MEPs to track, hop-by-hop, the path to another MEP or MIP within the
maintenance domain. All MEPs and MIPs in the same domain respond to an LTM with a unicast LTR.
Intermediate MIPs forward the LTM toward the target MEP.
92|802.1ag
ping ethernet domain name ma-name ma-name remote {mep-id
|
mac-addr mac-address} source {mep-id | port interface}
EXEC Privilege
Figure 5-4. Linktrace Message and Response
MPLS Core
MEP
MIPMIP
MIP
L
i
n
k
t
r
a
c
e
m
M
e
s
s
a
g
e
Link trace messages carry a unicast target address (the MAC address of an MIP or MEP) inside a multicast
frame. The destination group address is based on the MD level of the transmitting MEP
(01:80:C2:00:00:3[8 to F]). The MPs on the path to the target MAC address reply to the LTM with an LTR,
and relays the LTM towards the target MAC until the target MAC is reached or TTL equals 0.
TaskCommand SyntaxCommand Mode
Send a Linktrace message. Since the
traceroute ethernet domain
EXEC Privilege
L TM is a Multicast message sent to the
entire ME, there is no need to specify a
destination.
Enabling Link Trace Cache
After a Link Trace command is executed, the trace information can be cached so that you can view it later
without retracing.
TaskCommand SyntaxCommand Mode
Enable Link Trace caching.
Set the amount of time a trace result is cached.
This chapter contains the following major sections:
•Protocol Overview
•Port-authentication Process
•EAP over RADIUS
•Configuring 802.1X
•Enabling 802.1X
•Configuring Request Identity Re-transmissions
•Configuring a Quiet Period after a Failed Authentication
•Forcibly Authorizing or Unauthorizing a Port
•Re-authenticating a Port
•Configuring Timeouts
•Dynamic VLAN Assignment with Port Authentication
•Guest and Authentication-fail VLANs
6
Protocol Overview
802.1X is a method of port security. A device connected to a port that is enabled with 802.1X is disallowed
from sending or receiving packets on the network until its identity can be verified (through a username and
password, for example). This feature is named for its IEEE specification.
802.1X | 97
802.1X employs Extensible Authentication Protocol (EAP)* to transfer a device’s credentials to an
Preamble
Start Frame
Delimiter
Destination MAC
(1:80:c2:00:00:03)
Source MAC
(Auth Port MAC)
Ethernet Type
(0x888e)
Protocol Version
(1)
Packet Type
EAPOL Frame
Length
Code
(0-4)
ID
(Seq Number)
EAP-Method Frame
Length
EAP-Method
Code
(0-255)
Length
EAP-Method Data
(Supplicant Requested Credentials)
authentication server (typically RADIUS) via a mandatory intermediary network access device, in this
case, a Dell Networking switch. The network access device mediates all communication between the
end-user device and the authentication server so that the network remains secure. The network access
device uses EAP over Ethernet (EAPOL) to communicate with the end-user device and EAP over
RADIUS to communicate with the server.
www.dell.com | support.dell.com
The illustration above and the illustration below show how EAP frames are encapsulated in Ethernet and
RADIUS frames.
Figure 6-1. EAPOL Frame Format
98|802.1X
Note: FTOS supports 802.1X with EAP-MD5, EAP-OTP, EAP-TLS, EAP-TTLS, PEAPv0, PEAPv1, and
MS-CHAPv2 with PEAP.
The authentication process involves three devices:
•The device attempting to access the network is the supplicant. The supplicant is not allowed to
communicate on the network until the port is authorized by the authenticator. It can only communicate
with the authenticator in response to 802.1X requests.
•The device with which the supplicant communicates is the authenticator. The authenicator is the gate
keeper of the network. It translates and forwards requests and responses between the authentication
server and the supplicant. The authenticator also changes the status of the port based on the results of
the authentication process. The Dell Networking switch is the authenticator .
•The authentication-server selects the authentication method, verifies the information provided by the
supplicant, and grants it network access privileges.
Ports can be in one of two states:
•Ports are in an unauthorized state by default. In this state, non-802.1X traffic cannot be forwarded in
or out of the port.
•The authenticator changes the port state to authorized if the server can authenticate the supplicant. In
this state, network traffic can be forwarded normally.
Note: The Dell Networking switches place 802.1X-enabled ports in the unauthorized state by default.
Port-authentication Process
The authentication process begins when the authenticator senses that a link status has changed from down
to up:
1. When the authenticator senses a link state change, it requests that the supplicant identify itself using an
EAP Identity Request Frame.
2. The supplicant responds with its identity in an EAP Response Identity frame.
3. The authenticator decapsulates the EAP Response from the EAPOL frame, encapsulates it in a
RADIUS Access-Request frame, and forwards the frame to the authentication server.
4. The authentication server replies with an Access-Challenge. The Access-Challenge is request that the
supplicant prove that it is who it claims to be, using a specified method (an EAP-Method). The
challenge is translated and forwarded to the supplicant by the authenticator.
5. The supplicant can negotiate the authentication method, but if it is acceptable, the supplicant provides
the requested challenge information in an EAP Response, which is translated and forwarded to the
authentication server as another Access-Request.
6. If the identity information provided by the supplicant is valid, the authentication server sends an
Access-Accept frame in which network privileges are specified. The authenticator changes the port
state to authorized, and forwards an EAP Success frame. If the identity information is invalid, the
server sends and Access-Reject frame. The port state remains unauthorized, and the authenticator
forwards EAP Failure frame
EAP-Method Data
(Supplicant Requested Credentials)
fnC0034mp
Supplicant
Authenticator
Authenticati
Server
www.dell.com | support.dell.com
EAP over LAN (EAPOL)
Request Identity
Response Identity
EAP Request
EAP Reponse
EAP over RADIUS
Access Request
Access Challenge
Access Request
Access {Accept | Reject}
EAP over RADIUS
802.1X uses RADIUS to shuttle EAP packets between the authenticator and the authentication server, as
defined in RFC 3579. EAP messages are encapsulated in RADIUS packets as a type of attribute in Type,
Length, Value (TLV) format. The Type value for EAP messages is 79.
Figure 6-3. RADIUS Frame Format
RADIUS Attributes for 802.1 Support
Dell Networking systems includes the following RADIUS attributes in all 802.1X-triggered
Access-Request messages:
•Attribute 31—Calling-station-id: relays the supplicant MAC address to the authentication server.
100|802.1X
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.