Dell Configuration Guide for the S6000
System
9.5(0.1)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2014 - 07
Rev. A00
Contents
1 About this Guide................................................................................................. 32
Audience..............................................................................................................................................32
Conventions........................................................................................................................................ 32
Related Documents............................................................................................................................ 32
2 Configuration Fundamentals........................................................................... 33
Accessing the Command Line............................................................................................................33
CLI Modes............................................................................................................................................33
Navigating CLI Modes................................................................................................................... 34
The do Command............................................................................................................................... 37
Undoing Commands...........................................................................................................................38
Obtaining Help.................................................................................................................................... 39
Entering and Editing Commands....................................................................................................... 39
Command History.............................................................................................................................. 40
Filtering show Command Outputs.....................................................................................................40
Multiple Users in Configuration Mode............................................................................................... 42
3 Getting Started....................................................................................................43
Console Access...................................................................................................................................43
Serial Console................................................................................................................................43
Default Configuration......................................................................................................................... 44
Configuring a Host Name...................................................................................................................44
Accessing the System Remotely.........................................................................................................45
Accessing the and S6000Remotely............................................................................................. 45
Configure the Management Port IP Address............................................................................... 45
Configure a Management Route..................................................................................................46
Configuring a Username and Password.......................................................................................46
Configuring the Enable Password......................................................................................................46
Configuration File Management.........................................................................................................47
Copy Files to and from the System.............................................................................................. 47
Save the Running-Configuration..................................................................................................48
Configure the Overload Bit for a Startup Scenario......................................................................49
Viewing Files..................................................................................................................................49
Managing the File System...................................................................................................................50
View Command History...................................................................................................................... 51
Upgrading Dell Networking OS...........................................................................................................51
Using HTTP for File Transfers..............................................................................................................51
Using Hashes to Validate Software Images........................................................................................52
4 Management....................................................................................................... 54
Configuring Privilege Levels............................................................................................................... 54
Creating a Custom Privilege Level................................................................................................54
Removing a Command from EXEC Mode................................................................................... 54
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 54
Allowing Access to CONFIGURATION Mode Commands.......................................................... 55
Allowing Access to the Following Modes.....................................................................................55
Applying a Privilege Level to a Username.....................................................................................57
Applying a Privilege Level to a Terminal Line............................................................................... 57
Configuring Logging........................................................................................................................... 57
Audit and Security Logs.................................................................................................................58
Configuring Logging Format ...................................................................................................... 59
Setting Up a Secure Connection to a Syslog Server....................................................................60
Log Messages in the Internal Buffer................................................................................................... 61
Configuration Task List for System Log Management.................................................................61
Disabling System Logging...................................................................................................................61
Sending System Messages to a Syslog Server....................................................................................62
Configuring a UNIX System as a Syslog Server............................................................................62
Changing System Logging Settings....................................................................................................62
Display the Logging Buffer and the Logging Configuration............................................................. 63
Configuring a UNIX Logging Facility Level.........................................................................................64
Synchronizing Log Messages............................................................................................................. 65
Enabling Timestamp on Syslog Messages......................................................................................... 65
File Transfer Services.......................................................................................................................... 66
Configuration Task List for File Transfer Services........................................................................66
Enabling the FTP Server................................................................................................................ 66
Configuring FTP Server Parameters..............................................................................................67
Configuring FTP Client Parameters.............................................................................................. 67
Terminal Lines.....................................................................................................................................68
Denying and Permitting Access to a Terminal Line.....................................................................68
Configuring Login Authentication for Terminal Lines................................................................. 69
Setting Time Out of EXEC Privilege Mode......................................................................................... 70
Using Telnet to get to Another Network Device............................................................................... 70
Lock CONFIGURATION Mode............................................................................................................ 71
Viewing the Configuration Lock Status.........................................................................................71
Restoring the Factory Default Settings...............................................................................................72
S6000MXL Switch..........................................................................................................................72
Important Points to Remember....................................................................................................72
Restoring Factory Default Environment Variables....................................................................... 73
5 802.1X................................................................................................................... 75
The Port-Authentication Process.......................................................................................................76
EAP over RADIUS...........................................................................................................................78
Configuring 802.1X............................................................................................................................. 78
Related Configuration Tasks.........................................................................................................78
Important Points to Remember..........................................................................................................79
Enabling 802.1X...................................................................................................................................79
Configuring Request Identity Re-Transmissions................................................................................81
Configuring a Quiet Period after a Failed Authentication............................................................81
Forcibly Authorizing or Unauthorizing a Port....................................................................................82
Re-Authenticating a Port.................................................................................................................... 83
Configuring Timeouts.........................................................................................................................84
Configuring Dynamic VLAN Assignment with Port Authentication..................................................85
Guest and Authentication-Fail VLANs................................................................................................86
Configuring a Guest VLAN............................................................................................................ 87
Configuring an Authentication-Fail VLAN....................................................................................87
6 Access Control Lists (ACLs).............................................................................. 89
IP Access Control Lists (ACLs)............................................................................................................90
CAM Usage....................................................................................................................................90
Implementing ACLs on Dell Networking OS................................................................................92
Important Points to Remember..........................................................................................................93
Configuration Task List for Route Maps.......................................................................................93
Configuring Match Routes............................................................................................................96
Configuring Set Conditions...........................................................................................................97
Configure a Route Map for Route Redistribution........................................................................98
Configure a Route Map for Route Tagging..................................................................................99
Continue Clause............................................................................................................................99
IP Fragment Handling.......................................................................................................................100
IP Fragments ACL Examples.......................................................................................................100
Layer 4 ACL Rules Examples....................................................................................................... 101
Configure a Standard IP ACL............................................................................................................ 102
Configuring a Standard IP ACL Filter..........................................................................................103
Configure an Extended IP ACL.........................................................................................................104
Configuring Filters with a Sequence Number............................................................................104
Configuring Filters Without a Sequence Number......................................................................105
Configure Layer 2 and Layer 3 ACLs................................................................................................ 106
Assign an IP ACL to an Interface.......................................................................................................107
Applying an IP ACL............................................................................................................................ 107
Counting ACL Hits.......................................................................................................................108
Configure Ingress ACLs.................................................................................................................... 108
Configure Egress ACLs..................................................................................................................... 109
Applying Egress Layer 3 ACLs (Control-Plane)...........................................................................110
IP Prefix Lists......................................................................................................................................110
Implementation Information....................................................................................................... 111
Configuration Task List for Prefix Lists........................................................................................ 111
ACL Resequencing.............................................................................................................................115
Resequencing an ACL or Prefix List............................................................................................ 115
Route Maps........................................................................................................................................ 117
Implementation Information....................................................................................................... 117
Flow-Based Monitoring Support for ACLs........................................................................................117
Behavior of Flow-Based Monitoring...........................................................................................118
Enabling Flow-Based Monitoring................................................................................................119
7 Bidirectional Forwarding Detection (BFD)................................................... 121
How BFD Works.................................................................................................................................121
BFD Packet Format......................................................................................................................122
BFD Sessions................................................................................................................................124
BFD Three-Way Handshake........................................................................................................124
Session State Changes................................................................................................................ 125
Important Points to Remember........................................................................................................126
Configure BFD...................................................................................................................................126
Configure BFD for Physical Ports................................................................................................127
Configure BFD for Static Routes.................................................................................................130
Configure BFD for OSPF............................................................................................................. 132
Configure BFD for OSPFv3..........................................................................................................135
Configure BFD for IS-IS...............................................................................................................136
Configure BFD for BGP............................................................................................................... 139
Configure BFD for VRRP............................................................................................................. 146
Configuring Protocol Liveness................................................................................................... 149
Troubleshooting BFD..................................................................................................................149
8 Border Gateway Protocol IPv4 (BGPv4)....................................................... 151
Autonomous Systems (AS)................................................................................................................ 151
Sessions and Peers............................................................................................................................ 153
Establish a Session.......................................................................................................................154
Route Reflectors................................................................................................................................154
BGP Attributes................................................................................................................................... 155
Best Path Selection Criteria.........................................................................................................156
Weight..........................................................................................................................................158
Local Preference......................................................................................................................... 158
Multi-Exit Discriminators (MEDs)................................................................................................ 159
Origin...........................................................................................................................................160
AS Path......................................................................................................................................... 161
Next Hop...................................................................................................................................... 161
Multiprotocol BGP.............................................................................................................................162
Implement BGP with Dell Networking OS....................................................................................... 162
Additional Path (Add-Path) Support........................................................................................... 162
Advertise IGP Cost as MED for Redistributed Routes................................................................ 162
Ignore Router-ID for Some Best-Path Calculations..................................................................163
Four-Byte AS Numbers............................................................................................................... 163
AS4 Number Representation...................................................................................................... 164
AS Number Migration..................................................................................................................165
BGP4 Management Information Base (MIB)...............................................................................167
Important Points to Remember..................................................................................................167
Configuration Information................................................................................................................168
BGP Configuration............................................................................................................................168
Enabling BGP...............................................................................................................................169
Configuring AS4 Number Representations................................................................................ 173
Configuring Peer Groups............................................................................................................ 175
Configuring BGP Fast Fall-Over..................................................................................................177
Configuring Passive Peering....................................................................................................... 179
Maintaining Existing AS Numbers During an AS Migration........................................................180
Allowing an AS Number to Appear in its Own AS Path.............................................................. 181
Enabling Graceful Restart............................................................................................................182
Enabling Neighbor Graceful Restart...........................................................................................183
Filtering on an AS-Path Attribute................................................................................................183
Regular Expressions as Filters..................................................................................................... 185
Redistributing Routes..................................................................................................................186
Enabling Additional Paths............................................................................................................187
Configuring IP Community Lists.................................................................................................187
Configuring an IP Extended Community List.............................................................................189
Filtering Routes with Community Lists...................................................................................... 190
Manipulating the COMMUNITY Attribute...................................................................................190
Changing MED Attributes............................................................................................................192
Changing the LOCAL_PREFERENCE Attribute...........................................................................192
Changing the NEXT_HOP Attribute............................................................................................193
Changing the WEIGHT Attribute.................................................................................................194
Enabling Multipath...................................................................................................................... 194
Filtering BGP Routes................................................................................................................... 194
Filtering BGP Routes Using Route Maps.................................................................................... 196
Filtering BGP Routes Using AS-PATH Information.................................................................... 197
Configuring BGP Route Reflectors............................................................................................. 197
Aggregating Routes.....................................................................................................................198
Configuring BGP Confederations...............................................................................................199
Enabling Route Flap Dampening................................................................................................ 199
Changing BGP Timers................................................................................................................ 202
Enabling BGP Neighbor Soft-Reconfiguration..........................................................................202
Route Map Continue.................................................................................................................. 204
Enabling MBGP Configurations....................................................................................................... 204
BGP Regular Expression Optimization.............................................................................................205
Debugging BGP................................................................................................................................ 205
Storing Last and Bad PDUs.........................................................................................................206
Capturing PDUs...........................................................................................................................207
PDU Counters.............................................................................................................................208
Sample Configurations.....................................................................................................................209
9 Content Addressable Memory (CAM)........................................................... 215
CAM Allocation..................................................................................................................................215
Test CAM Usage................................................................................................................................ 217
View CAM Profiles............................................................................................................................. 217
View CAM-ACL Settings....................................................................................................................218
View CAM Usage...............................................................................................................................220
CAM Optimization............................................................................................................................ 220
Troubleshoot CAM Profiling............................................................................................................. 221
CAM Profile Mismatches............................................................................................................. 221
QoS CAM Region Limitation....................................................................................................... 221
Syslog Error When the Table is Full............................................................................................ 221
Syslog Warning Upon 90 Percent Utilization of CAM............................................................... 222
Syslog Warning for Discrepancies Between Configured Extended Prefixes............................ 222
10 Control Plane Policing (CoPP).....................................................................223
Configure Control Plane Policing.................................................................................................... 224
Configuring CoPP for Protocols.................................................................................................225
Configuring CoPP for CPU Queues........................................................................................... 227
Show Commands....................................................................................................................... 228
11 Data Center Bridging (DCB)..........................................................................230
Ethernet Enhancements in Data Center Bridging........................................................................... 230
Priority-Based Flow Control....................................................................................................... 231
Enhanced Transmission Selection..............................................................................................233
Data Center Bridging Exchange Protocol (DCBx)..................................................................... 235
Data Center Bridging in a Traffic Flow....................................................................................... 235
Enabling Data Center Bridging.........................................................................................................236
QoS dot1p Traffic Classification and Queue Assignment...............................................................236
SNMP Support for PFC and Buffer Statistics Tracking.....................................................................237
Configuring Priority-Based Flow Control........................................................................................238
Configuring Lossless Queues.....................................................................................................240
Configuring the PFC Buffer in a Switch Stack............................................................................241
Configure Enhanced Transmission Selection..................................................................................242
ETS Prerequisites and Restrictions............................................................................................. 242
Creating a QoS DCB Output Policy........................................................................................... 243
Creating an ETS Priority Group.................................................................................................. 245
Applying an ETS Output Policy for a Priority Group to an Interface........................................ 246
ETS Operation with DCBx...........................................................................................................247
Configuring Bandwidth Allocation for DCBx CIN..................................................................... 248
Applying DCB Policies in a Switch Stack......................................................................................... 248
Applying DCB Policies with an ETS Configuration..........................................................................249
Configure a DCBx Operation........................................................................................................... 249
DCBx Operation..........................................................................................................................250
DCBx Port Roles..........................................................................................................................250
DCB Configuration Exchange.................................................................................................... 252
Configuration Source Election................................................................................................... 252
Propagation of DCB Information............................................................................................... 253
Auto-Detection and Manual Configuration of the DCBx Version............................................ 253
Behavior of Tagged Packets....................................................................................................... 254
Configuration Example for DSCP and PFC Priorities.................................................................254
DCBx Example.............................................................................................................................255
DCBx Prerequisites and Restrictions..........................................................................................256
Configuring DCBx.......................................................................................................................256
Verifying the DCB Configuration..................................................................................................... 260
Generation of PFC for a Priority for Untagged Packets...................................................................271
Operations on Untagged Packets.................................................................................................... 272
Performing PFC Using DSCP Bits Instead of 802.1p Bits.................................................................272
PFC and ETS Configuration Examples............................................................................................. 273
Using PFC and ETS to Manage Data Center Traffic.........................................................................273
PFC and ETS Configuration Command Examples.....................................................................275
Using PFC and ETS to Manage Converged Ethernet Traffic in a Switch Stack........................ 276
Hierarchical Scheduling in ETS Output Policies........................................................................ 276
Configuring DCB Maps and its Attributes.........................................................................................277
DCB Map: Configuration Procedure.......................................................................................... 277
Important Points to Remember..................................................................................................278
Applying a DCB Map on a Port................................................................................................... 278
Configuring PFC without a DCB Map........................................................................................ 279
Configuring Lossless Queues.....................................................................................................280
Data Center Bridging: Default Configuration.................................................................................. 281
Configuring PFC and ETS in a DCB Map..........................................................................................281
PFC Configuration Notes............................................................................................................281
PFC Prerequisites and Restrictions.............................................................................................282
ETS Configuration Notes............................................................................................................ 283
ETS Prerequisites and Restrictions............................................................................................. 283
Priority-Based Flow Control Using Dynamic Buffer Method..........................................................284
Pause and Resume of Traffic......................................................................................................284
Buffer Sizes for Lossless or PFC Packets....................................................................................285
Interworking of DCB Map With DCB Buffer Threshold Settings.....................................................285
Configuring the Dynamic Buffer Method........................................................................................286
Applying a DCB Map in a Switch Stack ...........................................................................................288
12 Dynamic Host Configuration Protocol (DHCP)........................................289
DHCP Packet Format and Options.................................................................................................. 289
Assign an IP Address using DHCP.................................................................................................... 291
Implementation Information............................................................................................................292
Configure the System to be a DHCP Server....................................................................................293
Configuring the Server for Automatic Address Allocation........................................................ 293
Specifying a Default Gateway.....................................................................................................295
Configure a Method of Hostname Resolution.......................................................................... 295
Using DNS for Address Resolution.............................................................................................295
Using NetBIOS WINS for Address Resolution............................................................................ 295
Creating Manual Binding Entries................................................................................................296
Debugging the DHCP Server......................................................................................................296
Using DHCP Clear Commands.................................................................................................. 296
Configure the System to be a DHCP Client.....................................................................................297
Configuring the DHCP Client System........................................................................................ 297
DHCP Client on a Management Interface................................................................................. 299
DHCP Client Operation with Other Features............................................................................ 299
Configure the System for User Port Stacking (Option 230)........................................................... 300
Configure Secure DHCP...................................................................................................................301
Option 82.....................................................................................................................................301
DHCP Snooping..........................................................................................................................302
Drop DHCP Packets on Snooped VLANs Only..........................................................................304
Dynamic ARP Inspection............................................................................................................ 304
Configuring Dynamic ARP Inspection....................................................................................... 305
Source Address Validation................................................................................................................306
Enabling IP Source Address Validation...................................................................................... 306
DHCP MAC Source Address Validation......................................................................................307
Enabling IP+MAC Source Address Validation............................................................................ 307
13 Equal Cost Multi-Path (ECMP)..................................................................... 309
ECMP for Flow-Based Affinity..........................................................................................................309
Configuring the Hash Algorithm................................................................................................309
Enabling Deterministic ECMP Next Hop....................................................................................309
Configuring the Hash Algorithm Seed....................................................................................... 310
Link Bundle Monitoring.....................................................................................................................310
Managing ECMP Group Paths..................................................................................................... 311
Creating an ECMP Group Bundle............................................................................................... 312
Modifying the ECMP Group Threshold.......................................................................................312
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table................. 313
Support for ECMP in host table.................................................................................................. 313
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes .................................................. 314
14 FCoE Transit.....................................................................................................315
Fibre Channel over Ethernet.............................................................................................................315
Ensure Robustness in a Converged Ethernet Network................................................................... 315
FIP Snooping on Ethernet Bridges....................................................................................................317
FIP Snooping in a Switch Stack.........................................................................................................319
Using FIP Snooping........................................................................................................................... 319
FIP Snooping Prerequisites......................................................................................................... 319
Important Points to Remember................................................................................................. 320
Enabling the FCoE Transit Feature.............................................................................................320
Enable FIP Snooping on VLANs.................................................................................................. 321
Configure the FC-MAP Value......................................................................................................321
Configure a Port for a Bridge-to-Bridge Link............................................................................ 321
Configure a Port for a Bridge-to-FCF Link.................................................................................321
Impact on Other Software Features........................................................................................... 321
FIP Snooping Restrictions...........................................................................................................322
Configuring FIP Snooping...........................................................................................................322
Displaying FIP Snooping Information...............................................................................................323
FCoE Transit Configuration Example...............................................................................................329
15 Flex Hash and Optimized Boot-Up..............................................................331
Flex Hash Capability Overview..........................................................................................................331
Configuring the Flex Hash Mechanism............................................................................................ 331
Configuring Fast Boot and LACP Fast Switchover...........................................................................332
Optimizing the Boot Time................................................................................................................332
Booting Process When Optimized Boot Time Mechanism is Enabled.....................................333
Guidelines for Configuring Optimized Booting Mechanism.....................................................333
Interoperation of Applications with Fast Boot and System States..................................................334
LACP and IPv4 Routing...............................................................................................................334
LACP and IPv6 Routing............................................................................................................... 335
BGP Graceful Restart.................................................................................................................. 335
Cold Boot Caused by Power Cycling the System..................................................................... 335
Unexpected Reload of the System.............................................................................................335
Software Upgrade....................................................................................................................... 336
LACP Fast Switchover................................................................................................................. 336
Changes to BGP Multipath......................................................................................................... 336
Delayed Installation of ECMP Routes Into BGP.........................................................................336
RDMA Over Converged Ethernet (RoCE) Overview........................................................................ 337
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.............................................................338
16 Force10 Resilient Ring Protocol (FRRP).....................................................339
Protocol Overview............................................................................................................................339
Ring Status.................................................................................................................................. 340
Multiple FRRP Rings.....................................................................................................................341
Important FRRP Points................................................................................................................ 341
Important FRRP Concepts.......................................................................................................... 341
Implementing FRRP.......................................................................................................................... 343
FRRP Configuration.......................................................................................................................... 343
Creating the FRRP Group........................................................................................................... 343
Configuring the Control VLAN...................................................................................................344
Configuring and Adding the Member VLANs.............................................................................345
Setting the FRRP Timers............................................................................................................. 346
Clearing the FRRP Counters....................................................................................................... 347
Viewing the FRRP Configuration................................................................................................ 347
Viewing the FRRP Information....................................................................................................347
Troubleshooting FRRP......................................................................................................................348
Configuration Checks.................................................................................................................348
Sample Configuration and Topology.............................................................................................. 348
17 GARP VLAN Registration Protocol (GVRP)................................................ 350
Important Points to Remember....................................................................................................... 350
Configure GVRP................................................................................................................................ 351
Related Configuration Tasks....................................................................................................... 351
Enabling GVRP Globally....................................................................................................................352
Enabling GVRP on a Layer 2 Interface............................................................................................. 352
Configure GVRP Registration........................................................................................................... 352
Configure a GARP Timer...................................................................................................................353
18 Internet Group Management Protocol (IGMP).........................................355
IGMP Implementation Information..................................................................................................355
IGMP Protocol Overview.................................................................................................................. 355
IGMP Version 2............................................................................................................................355
IGMP Version 3............................................................................................................................357
Configure IGMP................................................................................................................................ 360
Related Configuration Tasks...................................................................................................... 360
Viewing IGMP Enabled Interfaces.....................................................................................................361
Selecting an IGMP Version................................................................................................................361
Viewing IGMP Groups.......................................................................................................................362
Adjusting Timers............................................................................................................................... 362
Adjusting Query and Response Timers......................................................................................362
Adjusting the IGMP Querier Timeout Value...............................................................................363
Configuring a Static IGMP Group.....................................................................................................363
Enabling IGMP Immediate-Leave.................................................................................................... 364
IGMP Snooping.................................................................................................................................364
IGMP Snooping Implementation Information...........................................................................364
Configuring IGMP Snooping...................................................................................................... 364
Removing a Group-Port Association......................................................................................... 365
Disabling Multicast Flooding...................................................................................................... 365
Specifying a Port as Connected to a Multicast Router..............................................................366
Configuring the Switch as Querier.............................................................................................366
Fast Convergence after MSTP Topology Changes..........................................................................367
Egress Interface Selection (EIS) for HTTP and IGMP Applications..................................................367
Protocol Separation....................................................................................................................368
Enabling and Disabling Management Egress Interface Selection.............................................369
Handling of Management Route Configuration........................................................................370
Handling of Switch-Initiated Traffic........................................................................................... 370
Handling of Switch-Destined Traffic.......................................................................................... 371
Handling of Transit Traffic (Traffic Separation).......................................................................... 372
Mapping of Management Applications and Traffic Type...........................................................372
Behavior of Various Applications for Switch-Initiated Traffic ...................................................373
Behavior of Various Applications for Switch-Destined Traffic ................................................. 374
Interworking of EIS With Various Applications...........................................................................375
Designating a Multicast Router Interface.........................................................................................376
19 Interfaces......................................................................................................... 377
Basic Interface Configuration........................................................................................................... 377
Advanced Interface Configuration................................................................................................... 377
Interface Types..................................................................................................................................378
View Basic Interface Information..................................................................................................... 378
Enabling a Physical Interface........................................................................................................... 380
Physical Interfaces............................................................................................................................380
Configuration Task List for Physical Interfaces..........................................................................381
40G to 1G Breakout Cable Adaptor............................................................................................381
Overview of Layer Modes........................................................................................................... 381
Configuring Layer 2 (Data Link) Mode....................................................................................... 382
Configuring Layer 2 (Interface) Mode........................................................................................382
Configuring Layer 3 (Network) Mode.........................................................................................383
Configuring Layer 3 (Interface) Mode........................................................................................ 383
Egress Interface Selection (EIS)........................................................................................................384
Important Points to Remember................................................................................................. 384
Configuring EIS........................................................................................................................... 385
Management Interfaces....................................................................................................................385
Configuring Management Interfaces......................................................................................... 385
Configuring Management Interfaces on the S-Series...............................................................386
VLAN Interfaces................................................................................................................................ 386
Loopback Interfaces......................................................................................................................... 387
Null Interfaces...................................................................................................................................388
Port Channel Interfaces....................................................................................................................388
Port Channel Definition and Standards..................................................................................... 388
Port Channel Benefits.................................................................................................................389
Port Channel Implementation....................................................................................................389
10/100/1000 Mbps Interfaces in Port Channels........................................................................389
Configuration Tasks for Port Channel Interfaces......................................................................390
Creating a Port Channel.............................................................................................................390
Adding a Physical Interface to a Port Channel...........................................................................391
Reassigning an Interface to a New Port Channel......................................................................393
Configuring the Minimum Oper Up Links in a Port Channel....................................................393
.....................................................................................................................................................394
Assigning an IP Address to a Port Channel................................................................................394
Deleting or Disabling a Port Channel.........................................................................................395
Load Balancing Through Port Channels....................................................................................395
Load-Balancing on the S- Series................................................................................................395
Changing the Hash Algorithm....................................................................................................396
Bulk Configuration............................................................................................................................397
Interface Range........................................................................................................................... 397
Bulk Configuration Examples..................................................................................................... 398
Defining Interface Range Macros.................................................................................................... 399
Define the Interface Range.........................................................................................................399
Choosing an Interface-Range Macro........................................................................................400
Monitoring and Maintaining Interfaces........................................................................................... 400
Maintenance Using TDR............................................................................................................. 401
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 402
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................402
Important Points to Remember................................................................................................. 403
Support for LM4 Optics..............................................................................................................404
Example Scenarios......................................................................................................................404
Link Dampening............................................................................................................................... 408
Important Points to Remember.................................................................................................408
Enabling Link Dampening.......................................................................................................... 408
Link Bundle Monitoring.....................................................................................................................410
Using Ethernet Pause Frames for Flow Control.............................................................................. 410
Threshold Settings....................................................................................................................... 411
Enabling Pause Frames................................................................................................................411
Configure the MTU Size on an Interface..........................................................................................412
Port-Pipes..........................................................................................................................................413
Auto-Negotiation on Ethernet Interfaces........................................................................................ 413
Setting the Speed and Duplex Mode of Ethernet Interfaces.....................................................414
Set Auto-Negotiation Options....................................................................................................415
View Advanced Interface Information..............................................................................................416
Configuring the Interface Sampling Size....................................................................................417
Dynamic Counters............................................................................................................................ 418
Clearing Interface Counters....................................................................................................... 418
Enhanced Validation of Interface Ranges........................................................................................419
Compressing Configuration Files.....................................................................................................419
20 IPv4 Routing................................................................................................... 423
IP Addresses...................................................................................................................................... 423
Implementation Information......................................................................................................423
Configuration Tasks for IP Addresses.............................................................................................. 423
Assigning IP Addresses to an Interface............................................................................................424
Configuring Static Routes.................................................................................................................425
Configure Static Routes for the Management Interface.................................................................426
Using the Configured Source IP Address in ICMP Messages..........................................................427
Configuring the ICMP Source Interface.....................................................................................427
Configuring the Duration to Establish a TCP Connection..............................................................427
Enabling Directed Broadcast............................................................................................................428
Resolution of Host Names............................................................................................................... 428
Enabling Dynamic Resolution of Host Names................................................................................ 429
Specifying the Local System Domain and a List of Domains..........................................................429
Configuring DNS with Traceroute................................................................................................... 430
ARP.....................................................................................................................................................431
Configuration Tasks for ARP.............................................................................................................431
Configuring Static ARP Entries..........................................................................................................431
Enabling Proxy ARP...........................................................................................................................432
Clearing ARP Cache..........................................................................................................................432
ARP Learning via Gratuitous ARP..................................................................................................... 433
Enabling ARP Learning via Gratuitous ARP...................................................................................... 433
ARP Learning via ARP Request......................................................................................................... 433
Configuring ARP Retries................................................................................................................... 434
ICMP.................................................................................................................................................. 435
Configuration Tasks for ICMP.......................................................................................................... 435
Enabling ICMP Unreachable Messages............................................................................................435
UDP Helper....................................................................................................................................... 436
Configure UDP Helper................................................................................................................436
Important Points to Remember................................................................................................. 436
Enabling UDP Helper........................................................................................................................436
Configuring a Broadcast Address.....................................................................................................437
Configurations Using UDP Helper....................................................................................................437
UDP Helper with Broadcast-All Addresses...................................................................................... 437
UDP Helper with Subnet Broadcast Addresses............................................................................... 438
UDP Helper with Configured Broadcast Addresses........................................................................ 439
UDP Helper with No Configured Broadcast Addresses.................................................................. 439
Troubleshooting UDP Helper.......................................................................................................... 440
21 IPv6 Routing....................................................................................................441
Protocol Overview............................................................................................................................ 441
Extended Address Space.............................................................................................................441
Stateless Autoconfiguration........................................................................................................441
IPv6 Headers............................................................................................................................... 442
Longest Prefix Match (LPM) Table and IPv6 /65 – /128 support.............................................. 442
IPv6 Header Fields...................................................................................................................... 444
Extension Header Fields............................................................................................................. 445
Addressing...................................................................................................................................446
Implementing IPv6 with Dell Networking OS................................................................................. 448
ICMPv6..............................................................................................................................................450
Path MTU Discovery......................................................................................................................... 450
IPv6 Neighbor Discovery.................................................................................................................. 451
IPv6 Neighbor Discovery of MTU Packets................................................................................. 452
Configuring the IPv6 Recursive DNS Server.............................................................................. 452
Debugging IPv6 RDNSS Information Sent to the Host .............................................................453
Displaying IPv6 RDNSS Information...........................................................................................453
Secure Shell (SSH) Over an IPv6 Transport......................................................................................454
Configuration Tasks for IPv6............................................................................................................454
Adjusting Your CAM-Profile........................................................................................................455
Assigning an IPv6 Address to an Interface.................................................................................455
Assigning a Static IPv6 Route..................................................................................................... 456
Configuring Telnet with IPv6......................................................................................................457
SNMP over IPv6...........................................................................................................................457
Showing IPv6 Information.......................................................................................................... 457
Showing an IPv6 Interface..........................................................................................................458
Showing IPv6 Routes..................................................................................................................459
Showing the Running-Configuration for an Interface..............................................................460
Clearing IPv6 Routes.................................................................................................................. 460
22 iSCSI Optimization.........................................................................................462
iSCSI Optimization Overview........................................................................................................... 462
Monitoring iSCSI Traffic Flows................................................................................................... 464
Application of Quality of Service to iSCSI Traffic Flows............................................................464
Information Monitored in iSCSI Traffic Flows............................................................................464
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................ 465
Configuring Detection and Ports for Dell Compellent Arrays..................................................466
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................466
Enable and Disable iSCSI Optimization..................................................................................... 466
Default iSCSI Optimization Values................................................................................................... 467
iSCSI Optimization Prerequisites..................................................................................................... 468
Configuring iSCSI Optimization.......................................................................................................468
Displaying iSCSI Optimization Information..................................................................................... 470
23 Intermediate System to Intermediate System.......................................... 472
IS-IS Protocol Overview................................................................................................................... 472
IS-IS Addressing................................................................................................................................ 472
Multi-Topology IS-IS.........................................................................................................................473
Transition Mode.......................................................................................................................... 474
Interface Support........................................................................................................................ 474
Adjacencies................................................................................................................................. 474
Graceful Restart................................................................................................................................ 474
Timers.......................................................................................................................................... 475
Implementation Information............................................................................................................ 475
Configuration Information............................................................................................................... 476
Configuration Tasks for IS-IS......................................................................................................476
Configuring the Distance of a Route......................................................................................... 485
Changing the IS-Type.................................................................................................................485
Redistributing IPv4 Routes......................................................................................................... 488
Redistributing IPv6 Routes......................................................................................................... 489
Configuring Authentication Passwords..................................................................................... 490
Setting the Overload Bit............................................................................................................. 490
Debugging IS-IS.......................................................................................................................... 491
IS-IS Metric Styles............................................................................................................................. 492
Configure Metric Values...................................................................................................................492
Maximum Values in the Routing Table...................................................................................... 493
Change the IS-IS Metric Style in One Level Only......................................................................493
Leaks from One Level to Another.............................................................................................. 495
Sample Configurations.....................................................................................................................495
24 Link Aggregation Control Protocol (LACP).............................................. 498
Introduction to Dynamic LAGs and LACP....................................................................................... 498
Important Points to Remember................................................................................................. 498
LACP Modes................................................................................................................................499
Configuring LACP Commands...................................................................................................499
LACP Configuration Tasks................................................................................................................500
Creating a LAG............................................................................................................................500
Configuring the LAG Interfaces as Dynamic..............................................................................501
Setting the LACP Long Timeout................................................................................................. 501
Monitoring and Debugging LACP.............................................................................................. 502
Shared LAG State Tracking...............................................................................................................502
Configuring Shared LAG State Tracking.................................................................................... 503
Important Points about Shared LAG State Tracking..................................................................504
LACP Basic Configuration Example................................................................................................. 505
Configure a LAG on ALPHA........................................................................................................505
25 Layer 2...............................................................................................................513
Manage the MAC Address Table.......................................................................................................513
Clearing the MAC Address Table................................................................................................ 513
Setting the Aging Time for Dynamic Entries.............................................................................. 513
Configuring a Static MAC Address..............................................................................................514
Displaying the MAC Address Table.............................................................................................514
MAC Learning Limit...........................................................................................................................514
Setting the MAC Learning Limit.................................................................................................. 515
mac learning-limit Dynamic....................................................................................................... 515
mac learning-limit mac-address-sticky..................................................................................... 516
mac learning-limit station-move................................................................................................516
mac learning-limit no-station-move......................................................................................... 516
Learning Limit Violation Actions................................................................................................. 517
Setting Station Move Violation Actions.......................................................................................517
Recovering from Learning Limit and Station Move Violations.................................................. 518
NIC Teaming..................................................................................................................................... 518
Configure Redundant Pairs...............................................................................................................519
Important Points about Configuring Redundant Pairs...............................................................521
Far-End Failure Detection.................................................................................................................522
FEFD State Changes....................................................................................................................523
Configuring FEFD........................................................................................................................524
Enabling FEFD on an Interface................................................................................................... 525
Debugging FEFD......................................................................................................................... 526
26 Link Layer Discovery Protocol (LLDP)........................................................528
802.1AB (LLDP) Overview.................................................................................................................528
Protocol Data Units.....................................................................................................................528
Optional TLVs....................................................................................................................................529
Management TLVs...................................................................................................................... 529
TIA-1057 (LLDP-MED) Overview...................................................................................................... 531
TIA Organizationally Specific TLVs.............................................................................................532
Configure LLDP.................................................................................................................................536
Related Configuration Tasks.......................................................................................................536
Important Points to Remember..................................................................................................537
LLDP Compatibility......................................................................................................................537
CONFIGURATION versus INTERFACE Configurations.................................................................... 537
Enabling LLDP...................................................................................................................................538
Disabling and Undoing LLDP......................................................................................................538
Enabling LLDP on Management Ports............................................................................................. 538
Disabling and Undoing LLDP on Management Ports................................................................538
Advertising TLVs................................................................................................................................539
Viewing the LLDP Configuration......................................................................................................540
Viewing Information Advertised by Adjacent LLDP Agents.............................................................541
Configuring LLDPDU Intervals......................................................................................................... 542
Configuring Transmit and Receive Mode........................................................................................ 542
Configuring a Time to Live............................................................................................................... 543
Debugging LLDP...............................................................................................................................544
Relevant Management Objects........................................................................................................545
27 Microsoft Network Load Balancing............................................................ 551
NLB Unicast Mode Scenario............................................................................................................. 551
NLB Multicast Mode Scenario.......................................................................................................... 552
Limitations With Enabling NLB on Switches.................................................................................... 552
Benefits and Working of Microsoft Clustering.................................................................................552
Enable and Disable VLAN Flooding .................................................................................................553
Configuring a Switch for NLB ..........................................................................................................553
..................................................................................................................................................... 553
28 Multicast Source Discovery Protocol (MSDP)...........................................554
Protocol Overview............................................................................................................................554
Anycast RP.........................................................................................................................................556
Implementation Information............................................................................................................556
Configure Multicast Source Discovery Protocol............................................................................. 556
Related Configuration Tasks.......................................................................................................556
Enable MSDP.....................................................................................................................................560
Manage the Source-Active Cache....................................................................................................561
Viewing the Source-Active Cache..............................................................................................561
Limiting the Source-Active Cache............................................................................................. 562
Clearing the Source-Active Cache.............................................................................................562
Enabling the Rejected Source-Active Cache.............................................................................562
Accept Source-Active Messages that Fail the RFP Check...............................................................562
Specifying Source-Active Messages................................................................................................ 566
Limiting the Source-Active Messages from a Peer..........................................................................567
Preventing MSDP from Caching a Local Source............................................................................. 567
Preventing MSDP from Caching a Remote Source.........................................................................568
Preventing MSDP from Advertising a Local Source........................................................................ 569
Logging Changes in Peership States................................................................................................570
Terminating a Peership.....................................................................................................................570
Clearing Peer Statistics..................................................................................................................... 570
Debugging MSDP.............................................................................................................................. 571
MSDP with Anycast RP...................................................................................................................... 571
Configuring Anycast RP.................................................................................................................... 573
Reducing Source-Active Message Flooding.............................................................................. 573
Specifying the RP Address Used in SA Messages.......................................................................573
MSDP Sample Configurations.......................................................................................................... 576
29 Multiple Spanning Tree Protocol (MSTP).................................................. 579
Protocol Overview............................................................................................................................ 579
Spanning Tree Variations..................................................................................................................580
Implementation Information......................................................................................................580
Configure Multiple Spanning Tree Protocol....................................................................................580
Related Configuration Tasks...................................................................................................... 580
Enable Multiple Spanning Tree Globally.......................................................................................... 581
Adding and Removing Interfaces..................................................................................................... 581
Creating Multiple Spanning Tree Instances..................................................................................... 581
Influencing MSTP Root Selection.....................................................................................................583
Interoperate with Non-Dell Networking OS Bridges...................................................................... 583
Changing the Region Name or Revision......................................................................................... 584
Modifying Global Parameters...........................................................................................................584
Modifying the Interface Parameters.................................................................................................585
Configuring an EdgePort..................................................................................................................586
Flush MAC Addresses after a Topology Change............................................................................. 587
MSTP Sample Configurations...........................................................................................................587
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration............................................................ 588
Debugging and Verifying MSTP Configurations.............................................................................. 591
30 Multicast Features..........................................................................................594
Enabling IP Multicast........................................................................................................................ 594
Multicast with ECMP.........................................................................................................................594
Implementation Information............................................................................................................595
First Packet Forwarding for Lossless Multicast................................................................................596
Multicast Policies.............................................................................................................................. 596
IPv4 Multicast Policies................................................................................................................ 596
31 Open Shortest Path First (OSPFv2 and OSPFv3).......................................605
Protocol Overview............................................................................................................................605
Autonomous System (AS) Areas.................................................................................................605
Area Types...................................................................................................................................606
Networks and Neighbors............................................................................................................607
Router Types............................................................................................................................... 607
Designated and Backup Designated Routers............................................................................ 609
Link-State Advertisements (LSAs)...............................................................................................609
Router Priority and Cost.............................................................................................................. 611
OSPF with Dell Networking OS.........................................................................................................611
Graceful Restart...........................................................................................................................612
Fast Convergence (OSPFv2, IPv4 Only)......................................................................................613
Multi-Process OSPFv2 (IPv4 only).............................................................................................. 613
RFC-2328 Compliant OSPF Flooding........................................................................................ 614
OSPF ACK Packing.......................................................................................................................615
Setting OSPF Adjacency with Cisco Routers..............................................................................615
Configuration Information................................................................................................................616
Configuration Task List for OSPFv2 (OSPF for IPv4)..................................................................616
Configuration Task List for OSPFv3 (OSPF for IPv6)........................................................................632
Enabling IPv6 Unicast Routing................................................................................................... 633
Assigning IPv6 Addresses on an Interface................................................................................. 633
Assigning Area ID on an Interface.............................................................................................. 633
Assigning OSPFv3 Process ID and Router ID Globally.............................................................. 634
Configuring Stub Areas...............................................................................................................634
Configuring Passive-Interface....................................................................................................634
Redistributing Routes..................................................................................................................635
Configuring a Default Route.......................................................................................................635
Enabling OSPFv3 Graceful Restart............................................................................................. 636
OSPFv3 Authentication Using IPsec...........................................................................................638
Troubleshooting OSPFv3............................................................................................................645
32 Policy-based Routing (PBR)......................................................................... 647
Overview........................................................................................................................................... 647
Implementing Policy-based Routing with Dell Networking OS.....................................................649
Configuration Task List for Policy-based Routing.......................................................................... 649
PBR Exceptions (Permit)............................................................................................................. 652
Sample Configuration.......................................................................................................................654
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View
Redirect-List GOLD.....................................................................................................................655
33 PIM Sparse-Mode (PIM-SM)......................................................................... 657
Implementation Information............................................................................................................ 657
Protocol Overview............................................................................................................................ 657
Requesting Multicast Traffic....................................................................................................... 657
Refuse Multicast Traffic.............................................................................................................. 658
Send Multicast Traffic................................................................................................................. 658
Configuring PIM-SM.........................................................................................................................659
Related Configuration Tasks...................................................................................................... 659
Enable PIM-SM..................................................................................................................................659
Configuring S,G Expiry Timers.........................................................................................................660
Configuring a Static Rendezvous Point............................................................................................661
Overriding Bootstrap Router Updates....................................................................................... 662
Configuring a Designated Router.................................................................................................... 662
Creating Multicast Boundaries and Domains.................................................................................. 663
Enabling PIM-SM Graceful Restart...................................................................................................663
34 PIM Source-Specific Mode (PIM-SSM).......................................................664
Implementation Information............................................................................................................664
Important Points to Remember................................................................................................. 664
Configure PIM-SMM.........................................................................................................................665
Related Configuration Tasks...................................................................................................... 665
Enabling PIM-SSM............................................................................................................................ 665
Use PIM-SSM with IGMP Version 2 Hosts....................................................................................... 665
Configuring PIM-SSM with IGMPv2........................................................................................... 666
35 Port Monitoring..............................................................................................668
Important Points to Remember.......................................................................................................668
Port Monitoring................................................................................................................................ 669
Configuring Port Monitoring............................................................................................................670
Enabling Flow-Based Monitoring.....................................................................................................672
Remote Port Mirroring......................................................................................................................673
Remote Port Mirroring Example.................................................................................................673
Configuring Remote Port Mirroring........................................................................................... 674
Displaying Remote-Port Mirroring Configurations................................................................... 676
Configuring the Sample Remote Port Mirroring........................................................................676
Configuring the Encapsulated Remote Port Mirroring...................................................................680
Configuration steps for ERPM ...................................................................................................680
ERPM Behavior on a typical Dell Networking OS ...........................................................................682
Decapsulation of ERPM packets at the Destination IP/ Analyzer............................................. 682
36 Per-VLAN Spanning Tree Plus (PVST+)......................................................684
Protocol Overview............................................................................................................................684
Implementation Information............................................................................................................685
Configure Per-VLAN Spanning Tree Plus........................................................................................ 685
Related Configuration Tasks...................................................................................................... 685
Enabling PVST+.................................................................................................................................685
Disabling PVST+............................................................................................................................... 686
Influencing PVST+ Root Selection...................................................................................................686
Modifying Global PVST+ Parameters...............................................................................................688
Modifying Interface PVST+ Parameters...........................................................................................689
Configuring an EdgePort................................................................................................................. 690
PVST+ in Multi-Vendor Networks.................................................................................................... 691
Enabling PVST+ Extend System ID...................................................................................................691
PVST+ Sample Configurations.........................................................................................................692
37 Quality of Service (QoS)................................................................................694
Implementation Information............................................................................................................696
Port-Based QoS Configurations...................................................................................................... 696
Setting dot1p Priorities for Incoming Traffic..............................................................................697
Honoring dot1p Priorities on Ingress Traffic..............................................................................697
Configuring Port-Based Rate Policing.......................................................................................698
Configuring Port-Based Rate Shaping.......................................................................................698
Policy-Based QoS Configurations................................................................................................... 699
Classify Traffic.............................................................................................................................700
Dot1p to Queue Mapping Requirement.....................................................................................703
Create a QoS Policy....................................................................................................................704
DSCP Color Maps....................................................................................................................... 706
Create Policy Maps..................................................................................................................... 708
Enabling QoS Rate Adjustment.........................................................................................................712
Enabling Strict-Priority Queueing.....................................................................................................713
Queue Classification Requirements for PFC Functionality..............................................................713
Support for marking dot1p value in L3 Input Qos Policy.................................................................714
Weighted Random Early Detection.................................................................................................. 714
Creating WRED Profiles...............................................................................................................715
Applying a WRED Profile to Traffic............................................................................................. 716
Displaying Default and Configured WRED Profiles....................................................................716
Displaying WRED Drop Statistics................................................................................................ 716
Pre-Calculating Available QoS CAM Space......................................................................................716
Specifying Policy-Based Rate Shaping in Packets Per Second........................................................717
Configuring Policy-Based Rate Shaping.......................................................................................... 718
Configuring Weights and ECN for WRED ........................................................................................719
Global Service Pools With WRED and ECN Settings................................................................. 720
Configuring WRED and ECN Attributes............................................................................................721
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................ 722
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class.......... 723
Classifying Incoming Packets Using ECN and Color-Marking..................................................723
Sample configuration to mark non-ecn packets as “yellow” with single traffic class..............726
Applying Layer 2 Match Criteria on a Layer 3 Interface...................................................................727
Managing Hardware Buffer Statistics..........................................................................................727
Enabling Buffer Statistics Tracking .................................................................................................. 728
38 Routing Information Protocol (RIP)........................................................... 729
Protocol Overview............................................................................................................................ 729
RIPv1............................................................................................................................................ 729
RIPv2............................................................................................................................................729
Implementation Information............................................................................................................730
Configuration Information............................................................................................................... 730
Configuration Task List............................................................................................................... 730
RIP Configuration Example.........................................................................................................737
39 Remote Monitoring (RMON)........................................................................743
Implementation Information............................................................................................................ 743
Fault Recovery...................................................................................................................................743
Setting the rmon Alarm...............................................................................................................744
Configuring an RMON Event...................................................................................................... 745
Configuring RMON Collection Statistics....................................................................................745
Configuring the RMON Collection History................................................................................746
40 Rapid Spanning Tree Protocol (RSTP)........................................................747
Protocol Overview............................................................................................................................ 747
Configuring Rapid Spanning Tree.................................................................................................... 747
Related Configuration Tasks.......................................................................................................747
Important Points to Remember....................................................................................................... 748
RSTP and VLT.............................................................................................................................. 748
Configuring Interfaces for Layer 2 Mode.........................................................................................748
Enabling Rapid Spanning Tree Protocol Globally............................................................................749
Adding and Removing Interfaces......................................................................................................751
Modifying Global Parameters........................................................................................................... 752
Enabling SNMP Traps for Root Elections and Topology Changes............................................753
Modifying Interface Parameters....................................................................................................... 753
Enabling SNMP Traps for Root Elections and Topology Changes................................................. 754
Influencing RSTP Root Selection......................................................................................................754
Configuring an EdgePort.................................................................................................................. 754
Configuring Fast Hellos for Link State Detection............................................................................ 755
41 Software-Defined Networking (SDN)......................................................... 757
42 Service Provider Bridging.............................................................................758
VLAN Stacking...................................................................................................................................758
Important Points to Remember..................................................................................................759
Configure VLAN Stacking........................................................................................................... 760
Creating Access and Trunk Ports............................................................................................... 760
Enable VLAN-Stacking for a VLAN..............................................................................................761
Configuring the Protocol Type Value for the Outer VLAN Tag.................................................761
Configuring Dell Networking OS Options for Trunk Ports........................................................ 761
Debugging VLAN Stacking..........................................................................................................762
VLAN Stacking in Multi-Vendor Networks................................................................................. 763
VLAN Stacking Packet Drop Precedence.........................................................................................766
Enabling Drop Eligibility..............................................................................................................766
Honoring the Incoming DEI Value............................................................................................. 767
Marking Egress Packets with a DEI Value...................................................................................768
Dynamic Mode CoS for VLAN Stacking...........................................................................................768
Mapping C-Tag to S-Tag dot1p Values......................................................................................770
Layer 2 Protocol Tunneling.............................................................................................................. 770
Implementation Information.......................................................................................................772
Enabling Layer 2 Protocol Tunneling......................................................................................... 773
Specifying a Destination MAC Address for BPDUs.....................................................................773
Setting Rate-Limit BPDUs........................................................................................................... 773
Debugging Layer 2 Protocol Tunneling..................................................................................... 774
Provider Backbone Bridging............................................................................................................. 774
43 sFlow.................................................................................................................775
Overview............................................................................................................................................775
Implementation Information............................................................................................................ 775
Important Points to Remember..................................................................................................776
Enabling Extended sFlow..................................................................................................................776
Enabling and Disabling sFlow on an Interface................................................................................. 777
sFlow Show Commands................................................................................................................... 777
Displaying Show sFlow Global.................................................................................................... 777
Displaying Show sFlow on an Interface..................................................................................... 778
Displaying Show sFlow on a Stack-unit..................................................................................... 778
Configuring Specify Collectors.........................................................................................................779
Changing the Polling Intervals..........................................................................................................779
Back-Off Mechanism........................................................................................................................ 779
sFlow on LAG ports...........................................................................................................................780
Enabling Extended sFlow................................................................................................................. 780
Important Points to Remember..................................................................................................781
44 Simple Network Management Protocol (SNMP)......................................783
Protocol Overview............................................................................................................................ 783
Implementation Information............................................................................................................783
SNMPv3 Compliance With FIPS........................................................................................................783
Configuration Task List for SNMP.................................................................................................... 785
Related Configuration Tasks.......................................................................................................785
Important Points to Remember....................................................................................................... 785
Set up SNMP......................................................................................................................................785
Creating a Community............................................................................................................... 786
Setting Up User-Based Security (SNMPv3)................................................................................ 786
Reading Managed Object Values......................................................................................................787
Writing Managed Object Values.......................................................................................................788
Configuring Contact and Location Information using SNMP.........................................................789
Subscribing to Managed Object Value Updates using SNMP.........................................................790
Enabling a Subset of SNMP Traps.....................................................................................................791
Copy Configuration Files Using SNMP.............................................................................................793
Copying a Configuration File......................................................................................................795
Copying Configuration Files via SNMP.......................................................................................795
Copying the Startup-Config Files to the Running-Config........................................................796
Copying the Startup-Config Files to the Server via FTP............................................................796
Copying the Startup-Config Files to the Server via TFTP..........................................................797
Copy a Binary File to the Startup-Configuration....................................................................... 797
Additional MIB Objects to View Copy Statistics.........................................................................798
Obtaining a Value for MIB Objects.............................................................................................798
Manage VLANs using SNMP............................................................................................................. 799
Creating a VLAN..........................................................................................................................799
Assigning a VLAN Alias................................................................................................................799
Displaying the Ports in a VLAN...................................................................................................800
Add Tagged and Untagged Ports to a VLAN............................................................................. 800
Managing Overload on Startup........................................................................................................ 801
Enabling and Disabling a Port using SNMP......................................................................................801
Fetch Dynamic MAC Entries using SNMP........................................................................................802
Deriving Interface Indices................................................................................................................ 804
Monitor Port-Channels.................................................................................................................... 805
Troubleshooting SNMP Operation.................................................................................................. 806
45 Storm Control.................................................................................................807
Configure Storm Control................................................................................................................. 807
Configuring Storm Control from INTERFACE Mode.................................................................807
Configuring Storm Control from CONFIGURATION Mode......................................................807
46 Spanning Tree Protocol (STP)..................................................................... 808
Protocol Overview............................................................................................................................808
Configure Spanning Tree.................................................................................................................808
Related Configuration Tasks...................................................................................................... 808
Important Points to Remember.......................................................................................................809
Configuring Interfaces for Layer 2 Mode........................................................................................ 809
Enabling Spanning Tree Protocol Globally......................................................................................810
Adding an Interface to the Spanning Tree Group............................................................................812
Modifying Global Parameters........................................................................................................... 813
Modifying Interface STP Parameters................................................................................................814
Enabling PortFast.............................................................................................................................. 814
Prevent Network Disruptions with BPDU Guard........................................................................815
Selecting STP Root............................................................................................................................817
STP Root Guard.................................................................................................................................818
Root Guard Scenario...................................................................................................................818
Configuring Root Guard............................................................................................................. 819
Enabling SNMP Traps for Root Elections and Topology Changes.................................................820
Configuring Spanning Trees as Hitless............................................................................................820
STP Loop Guard................................................................................................................................ 821
Configuring Loop Guard.............................................................................................................822
Displaying STP Guard Configuration............................................................................................... 823
47 System Time and Date.................................................................................. 824
Network Time Protocol....................................................................................................................824
Protocol Overview...................................................................................................................... 825
Configure the Network Time Protocol......................................................................................826
Enabling NTP...............................................................................................................................826
Setting the Hardware Clock with the Time Derived from NTP.................................................826
Configuring NTP Broadcasts...................................................................................................... 827
Disabling NTP on an Interface....................................................................................................827
Configuring a Source IP Address for NTP Packets.................................................................... 827
Configuring NTP Authentication................................................................................................828
Dell Networking OS Time and Date................................................................................................. 831
Configuration Task List ...............................................................................................................831
Setting the Time and Date for the Switch Hardware Clock...................................................... 831
Setting the Time and Date for the Switch Software Clock........................................................831
Setting the Timezone..................................................................................................................832
Set Daylight Saving Time............................................................................................................ 832
Setting Daylight Saving Time Once............................................................................................832
Setting Recurring Daylight Saving Time.....................................................................................833
48 Tunneling ....................................................................................................... 835
Configuring a Tunnel........................................................................................................................835
Configuring Tunnel Keepalive Settings............................................................................................836
Configuring a Tunnel Interface........................................................................................................ 837
Configuring Tunnel allow-remote Decapsulation.......................................................................... 837
Configuring Tunnel source anylocal Decapsulation.......................................................................838
Guidelines for Configuring Multipoint Receive-Only Tunnels....................................................... 838
Multipoint Receive-Only Type and IP Unnumbered Interfaces for Tunnels..................................839
49 Upgrade Procedures.....................................................................................840
Get Help with Upgrades...................................................................................................................840
50 Virtual LANs (VLANs)......................................................................................841
Default VLAN..................................................................................................................................... 841
Port-Based VLANs............................................................................................................................ 842
VLANs and Port Tagging...................................................................................................................842
Configuration Task List.....................................................................................................................843
Creating a Port-Based VLAN...................................................................................................... 843
Assigning Interfaces to a VLAN.................................................................................................. 844
Moving Untagged Interfaces...................................................................................................... 845
Assigning an IP Address to a VLAN.............................................................................................847
Configuring Native VLANs................................................................................................................847
Enabling Null VLAN as the Default VLAN.........................................................................................848
51 VLT Proxy Gateway........................................................................................849
Proxy Gateway in VLT Domains.......................................................................................................849
LLDP organizational TLV for proxy gateway.............................................................................. 851
Sample Configuration Scenario for VLT Proxy Gateway...........................................................852
Configuring a Static VLT Proxy Gateway.........................................................................................854
Configuring an LLDP VLT Proxy Gateway....................................................................................... 854
52 Virtual Link Trunking (VLT)...........................................................................856
Overview........................................................................................................................................... 856
VLT on Core Switches.................................................................................................................857
Enhanced VLT............................................................................................................................. 857
VLT Terminology.............................................................................................................................. 858
Configure Virtual Link Trunking....................................................................................................... 859
Important Points to Remember................................................................................................. 859
Configuration Notes...................................................................................................................860
Primary and Secondary VLT Peers............................................................................................. 864
RSTP and VLT..............................................................................................................................864
VLT Bandwidth Monitoring.........................................................................................................864
VLT and IGMP Snooping.............................................................................................................865
VLT IPv6.......................................................................................................................................865
VLT Port Delayed Restoration.................................................................................................... 865
PIM-Sparse Mode Support on VLT.............................................................................................866
VLT Routing ................................................................................................................................867
Non-VLT ARP Sync..................................................................................................................... 870
RSTP Configuration.......................................................................................................................... 870
Preventing Forwarding Loops in a VLT Domain........................................................................870
Sample RSTP Configuration........................................................................................................871
Configuring VLT...........................................................................................................................871
eVLT Configuration Example........................................................................................................... 882
eVLT Configuration Step Examples............................................................................................883
PIM-Sparse Mode Configuration Example...................................................................................... 885
Verifying a VLT Configuration..........................................................................................................886
Additional VLT Sample Configurations............................................................................................889
Configuring Virtual Link Trunking (VLT Peer 1)Configuring Virtual Link Trunking (VLT Peer
2)Verifying a Port-Channel Connection to a VLT Domain (From an Attached Access
Switch).........................................................................................................................................890
Troubleshooting VLT........................................................................................................................892
Reconfiguring Stacked Switches as VLT..........................................................................................893
Specifying VLT Nodes in a PVLAN................................................................................................... 894
Association of VLTi as a Member of a PVLAN............................................................................895
MAC Synchronization for VLT Nodes in a PVLAN..................................................................... 895
PVLAN Operations When One VLT Peer is Down..................................................................... 895
PVLAN Operations When a VLT Peer is Restarted.....................................................................896
Interoperation of VLT Nodes in a PVLAN with ARP Requests...................................................896
Scenarios for VLAN Membership and MAC Synchronization With VLT Nodes in PVLAN....... 896
Configuring a VLT VLAN or LAG in a PVLAN................................................................................... 898
Creating a VLT LAG or a VLT VLAN............................................................................................898
Associating the VLT LAG or VLT VLAN in a PVLAN................................................................... 899
Proxy ARP Capability on VLT Peer Nodes....................................................................................... 900
Working of Proxy ARP for VLT Peer Nodes................................................................................901
VLT Nodes as Rendezvous Points for Multicast Resiliency.............................................................902
53 Virtual Extensible LAN (VXLAN)...................................................................903
Overview........................................................................................................................................... 903
Components of VXLAN network......................................................................................................903
Components of VXLAN network................................................................................................903
Functional Overview of VXLAN Gateway.........................................................................................905
VXLAN Frame Format....................................................................................................................... 905
Components of VXLAN Frame Format......................................................................................906
Configuring and Controlling VXLAN from the NVP Controller GUI...............................................906
Configuring VxLAN Gateway........................................................................................................... 909
Connecting to an NVP Controller..............................................................................................909
Advertising VXLAN Access Ports to Controller.......................................................................... 910
Displaying VXLAN Configurations.....................................................................................................911
54 Virtual Routing and Forwarding (VRF)....................................................... 913
VRF Overview.................................................................................................................................... 913
VRF Configuration Notes..................................................................................................................914
DHCP........................................................................................................................................... 917
VRF Configuration............................................................................................................................. 917
Load VRF CAM............................................................................................................................. 917
Creating a Non-Default VRF Instance........................................................................................ 917
Assigning an Interface to a VRF.................................................................................................. 918
View VRF Instance Information.................................................................................................. 918
Assigning an OSPF Process to a VRF Instance...........................................................................918
Configuring VRRP on a VRF Instance.........................................................................................918
Sample VRF Configuration................................................................................................................919
Route Leaking VRFs.......................................................................................................................... 927
55 Virtual Router Redundancy Protocol (VRRP)............................................928
VRRP Overview................................................................................................................................. 928
VRRP Benefits....................................................................................................................................929
VRRP Implementation...................................................................................................................... 929
VRRP Configuration..........................................................................................................................930
Configuration Task List...............................................................................................................930
Setting VRRP Initialization Delay................................................................................................940
Sample Configurations..................................................................................................................... 941
VRRP for an IPv4 Configuration..................................................................................................941
VRRP in a VRF Configuration......................................................................................................945
56 S-Series Debugging and Diagnostics.........................................................950
Offline Diagnostics........................................................................................................................... 950
Important Points to Remember................................................................................................. 950
Running Offline Diagnostics.......................................................................................................950
Configuring 104 10GbE Ports on the S6000 Platform....................................................................955
Configuring Fanout Mode.......................................................................................................... 955
Backward Compatibility With Enhanced Fanout Configuration...............................................956
Configuring Fanout on Disabled Ports.......................................................................................957
Trace Logs.........................................................................................................................................958
Auto Save on Crash or Rollover....................................................................................................... 958
Hardware Watchdog Timer..............................................................................................................959