Dell Configuration Guide for the S6000–ON
System
9.8(0.0)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2015 - 05
Rev. A00
Contents
1 About this Guide................................................................................................. 34
Audience..............................................................................................................................................34
Conventions........................................................................................................................................ 34
Related Documents............................................................................................................................ 34
2 Configuration Fundamentals........................................................................... 36
Accessing the Command Line............................................................................................................36
CLI Modes............................................................................................................................................36
Navigating CLI Modes................................................................................................................... 38
The do Command............................................................................................................................... 41
Undoing Commands...........................................................................................................................42
Obtaining Help.................................................................................................................................... 43
Entering and Editing Commands....................................................................................................... 43
Command History...............................................................................................................................44
Filtering show Command Outputs.....................................................................................................44
Multiple Users in Configuration Mode............................................................................................... 46
3 Getting Started....................................................................................................47
Console Access................................................................................................................................... 47
Serial Console................................................................................................................................47
Default Configuration......................................................................................................................... 49
Configuring a Host Name...................................................................................................................49
Accessing the System Remotely........................................................................................................ 49
Accessing the System Remotely...................................................................................................49
Configure the Management Port IP Address............................................................................... 49
Configure a Management Route..................................................................................................50
Configuring a Username and Password.......................................................................................50
Configuring the Enable Password.......................................................................................................51
Configuration File Management......................................................................................................... 51
Copy Files to and from the System...............................................................................................51
Mounting an NFS File System....................................................................................................... 52
Save the Running-Configuration..................................................................................................54
Configure the Overload Bit for a Startup Scenario...................................................................... 55
Viewing Files.................................................................................................................................. 55
Managing the File System...................................................................................................................56
View Command History......................................................................................................................57
Upgrading Dell Networking OS.......................................................................................................... 57
Using HTTP for File Transfers..............................................................................................................57
3
Using Hashes to Validate Software Images........................................................................................58
4 Management....................................................................................................... 60
Configuring Privilege Levels............................................................................................................... 60
Creating a Custom Privilege Level............................................................................................... 60
Removing a Command from EXEC Mode................................................................................... 60
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 61
Allowing Access to CONFIGURATION Mode Commands...........................................................61
Allowing Access to the Following Modes.....................................................................................61
Applying a Privilege Level to a Username.................................................................................... 63
Applying a Privilege Level to a Terminal Line...............................................................................63
Configuring Logging...........................................................................................................................63
Audit and Security Logs................................................................................................................ 64
Configuring Logging Format ...................................................................................................... 66
Setting Up a Secure Connection to a Syslog Server....................................................................67
Log Messages in the Internal Buffer...................................................................................................68
Configuration Task List for System Log Management................................................................ 68
Disabling System Logging.................................................................................................................. 68
Sending System Messages to a Syslog Server................................................................................... 69
Configuring a UNIX System as a Syslog Server............................................................................69
Track Login Activity.............................................................................................................................69
Restrictions for Tracking Login Activity........................................................................................69
Configuring Login Activity Tracking............................................................................................. 70
Display Login Statistics..................................................................................................................70
Limit Concurrent Login Sessions........................................................................................................ 71
Restrictions for Limiting the Number of Concurrent Sessions.................................................... 71
Configuring Concurrent Session Limit..........................................................................................71
Enabling the System to Clear Existing Sessions........................................................................... 72
Changing System Logging Settings....................................................................................................73
Display the Logging Buffer and the Logging Configuration..............................................................74
Configuring a UNIX Logging Facility Level.........................................................................................74
Synchronizing Log Messages..............................................................................................................76
Enabling Timestamp on Syslog Messages..........................................................................................76
File Transfer Services........................................................................................................................... 77
Configuration Task List for File Transfer Services........................................................................ 77
Enabling the FTP Server.................................................................................................................77
Configuring FTP Server Parameters..............................................................................................78
Configuring FTP Client Parameters.............................................................................................. 78
Terminal Lines..................................................................................................................................... 79
Denying and Permitting Access to a Terminal Line..................................................................... 79
Configuring Login Authentication for Terminal Lines.................................................................80
Setting Time Out of EXEC Privilege Mode..........................................................................................81
4
Using Telnet to get to Another Network Device............................................................................... 82
Lock CONFIGURATION Mode............................................................................................................83
Viewing the Configuration Lock Status........................................................................................83
Restoring the Factory Default Settings.............................................................................................. 84
Important Points to Remember....................................................................................................84
Restoring Factory Default Environment Variables.......................................................................84
5 802.1X................................................................................................................... 87
The Port-Authentication Process.......................................................................................................88
EAP over RADIUS...........................................................................................................................90
Configuring 802.1X.............................................................................................................................90
Related Configuration Tasks.........................................................................................................90
Important Points to Remember..........................................................................................................91
Enabling 802.1X...................................................................................................................................92
Configuring Request Identity Re-Transmissions............................................................................... 93
Configuring a Quiet Period after a Failed Authentication........................................................... 94
Forcibly Authorizing or Unauthorizing a Port.................................................................................... 95
Re-Authenticating a Port....................................................................................................................96
Configuring Timeouts......................................................................................................................... 97
Configuring Dynamic VLAN Assignment with Port Authentication..................................................98
Guest and Authentication-Fail VLANs................................................................................................99
Configuring a Guest VLAN..........................................................................................................100
Configuring an Authentication-Fail VLAN..................................................................................100
6 Access Control Lists (ACLs)............................................................................ 102
IP Access Control Lists (ACLs).......................................................................................................... 102
CAM Usage.................................................................................................................................. 103
Implementing ACLs on Dell Networking OS............................................................................. 104
Important Points to Remember........................................................................................................105
Configuration Task List for Route Maps.....................................................................................105
Configuring Match Routes..........................................................................................................108
Configuring Set Conditions........................................................................................................ 109
Configure a Route Map for Route Redistribution....................................................................... 111
Configure a Route Map for Route Tagging.................................................................................111
Continue Clause.......................................................................................................................... 112
IP Fragment Handling........................................................................................................................112
IP Fragments ACL Examples........................................................................................................113
Layer 4 ACL Rules Examples........................................................................................................113
Configure a Standard IP ACL.............................................................................................................114
Configuring a Standard IP ACL Filter...........................................................................................115
Configure an Extended IP ACL..........................................................................................................116
Configuring Filters with a Sequence Number............................................................................ 116
5
Configuring Filters Without a Sequence Number...................................................................... 118
Configure Layer 2 and Layer 3 ACLs.................................................................................................119
Assign an IP ACL to an Interface.......................................................................................................119
Applying an IP ACL............................................................................................................................120
Counting ACL Hits....................................................................................................................... 121
Configure Ingress ACLs..................................................................................................................... 121
Configure Egress ACLs......................................................................................................................122
Applying Egress Layer 3 ACLs (Control-Plane).......................................................................... 122
IP Prefix Lists......................................................................................................................................123
Implementation Information.......................................................................................................123
Configuration Task List for Prefix Lists....................................................................................... 123
ACL Resequencing............................................................................................................................ 127
Resequencing an ACL or Prefix List............................................................................................128
Route Maps........................................................................................................................................129
Implementation Information...................................................................................................... 130
Flow-Based Monitoring Support for ACLs.......................................................................................130
Behavior of Flow-Based Monitoring...........................................................................................130
Enabling Flow-Based Monitoring............................................................................................... 132
7 Bidirectional Forwarding Detection (BFD)...................................................134
How BFD Works................................................................................................................................ 134
BFD Packet Format......................................................................................................................135
BFD Sessions................................................................................................................................137
BFD Three-Way Handshake........................................................................................................ 137
Session State Changes................................................................................................................ 138
Important Points to Remember........................................................................................................139
Configure BFD...................................................................................................................................139
Configure BFD for Physical Ports............................................................................................... 140
Configure BFD for Static Routes.................................................................................................143
Configure BFD for OSPF............................................................................................................. 145
Configure BFD for OSPFv3......................................................................................................... 148
Configure BFD for IS-IS...............................................................................................................149
Configure BFD for BGP................................................................................................................151
Configure BFD for VRRP............................................................................................................. 158
Configuring Protocol Liveness....................................................................................................161
Troubleshooting BFD.................................................................................................................. 162
8 Border Gateway Protocol IPv4 (BGPv4)...................................................... 164
Autonomous Systems (AS)................................................................................................................164
Sessions and Peers............................................................................................................................166
Establish a Session.......................................................................................................................167
Route Reflectors................................................................................................................................168
6
BGP Attributes................................................................................................................................... 169
Best Path Selection Criteria........................................................................................................ 169
Weight...........................................................................................................................................171
Local Preference..........................................................................................................................172
Multi-Exit Discriminators (MEDs)................................................................................................ 172
Origin............................................................................................................................................173
AS Path......................................................................................................................................... 174
Next Hop......................................................................................................................................174
Multiprotocol BGP.............................................................................................................................175
Implement BGP with Dell Networking OS....................................................................................... 175
Additional Path (Add-Path) Support............................................................................................175
Advertise IGP Cost as MED for Redistributed Routes................................................................ 176
Ignore Router-ID for Some Best-Path Calculations.................................................................. 177
Four-Byte AS Numbers................................................................................................................177
AS4 Number Representation.......................................................................................................177
AS Number Migration.................................................................................................................. 179
BGP4 Management Information Base (MIB)...............................................................................181
Important Points to Remember.................................................................................................. 181
Configuration Information................................................................................................................182
BGP Configuration............................................................................................................................ 182
Enabling BGP...............................................................................................................................183
Configuring AS4 Number Representations................................................................................ 187
Configuring Peer Groups............................................................................................................189
Configuring BGP Fast Fall-Over..................................................................................................191
Configuring Passive Peering....................................................................................................... 193
Maintaining Existing AS Numbers During an AS Migration........................................................194
Allowing an AS Number to Appear in its Own AS Path..............................................................195
Enabling Graceful Restart........................................................................................................... 196
Enabling Neighbor Graceful Restart........................................................................................... 197
Filtering on an AS-Path Attribute................................................................................................198
Regular Expressions as Filters..................................................................................................... 199
Redistributing Routes..................................................................................................................201
Enabling Additional Paths........................................................................................................... 201
Configuring IP Community Lists................................................................................................ 202
Configuring an IP Extended Community List............................................................................ 203
Filtering Routes with Community Lists......................................................................................204
Manipulating the COMMUNITY Attribute.................................................................................. 205
Changing MED Attributes........................................................................................................... 207
Changing the LOCAL_PREFERENCE Attribute.......................................................................... 207
Changing the NEXT_HOP Attribute...........................................................................................208
Changing the WEIGHT Attribute................................................................................................208
Enabling Multipath......................................................................................................................209
7
Filtering BGP Routes...................................................................................................................209
Filtering BGP Routes Using Route Maps.....................................................................................211
Filtering BGP Routes Using AS-PATH Information.....................................................................211
Configuring BGP Route Reflectors.............................................................................................212
Aggregating Routes.....................................................................................................................213
Configuring BGP Confederations...............................................................................................213
Enabling Route Flap Dampening................................................................................................ 214
Changing BGP Timers................................................................................................................. 217
Enabling BGP Neighbor Soft-Reconfiguration...........................................................................217
Route Map Continue...................................................................................................................218
Enabling MBGP Configurations........................................................................................................ 219
BGP Regular Expression Optimization.............................................................................................220
Debugging BGP................................................................................................................................ 220
Storing Last and Bad PDUs..........................................................................................................221
Capturing PDUs...........................................................................................................................222
PDU Counters............................................................................................................................. 223
Sample Configurations..................................................................................................................... 224
9 Content Addressable Memory (CAM)...........................................................230
CAM Allocation................................................................................................................................. 230
Test CAM Usage................................................................................................................................232
View CAM Profiles.............................................................................................................................232
View CAM-ACL Settings................................................................................................................... 233
View CAM Usage...............................................................................................................................235
CAM Optimization............................................................................................................................ 236
Troubleshoot CAM Profiling.............................................................................................................236
CAM Profile Mismatches.............................................................................................................236
QoS CAM Region Limitation.......................................................................................................236
Syslog Error When the Table is Full............................................................................................ 237
Syslog Warning Upon 90 Percent Utilization of CAM............................................................... 237
Syslog Warning for Discrepancies Between Configured Extended Prefixes............................ 237
Unified Forwarding Table (UFT) Modes............................................................................................237
Configuring UFT Modes..............................................................................................................238
10 Control Plane Policing (CoPP).....................................................................239
Configure Control Plane Policing....................................................................................................240
Configuring CoPP for Protocols.................................................................................................241
Configuring CoPP for CPU Queues...........................................................................................243
Show Commands....................................................................................................................... 244
11 Data Center Bridging (DCB)..........................................................................246
Ethernet Enhancements in Data Center Bridging........................................................................... 246
8
Priority-Based Flow Control....................................................................................................... 247
Enhanced Transmission Selection............................................................................................. 249
Data Center Bridging Exchange Protocol (DCBx)..................................................................... 250
Data Center Bridging in a Traffic Flow.......................................................................................250
Enabling Data Center Bridging......................................................................................................... 251
DCB Maps and its Attributes........................................................................................................251
Data Center Bridging: Default Configuration.................................................................................. 252
Configuring Priority-Based Flow Control........................................................................................ 253
Configuring Lossless Queues.....................................................................................................254
Configuring PFC in a DCB Map........................................................................................................ 255
PFC Configuration Notes............................................................................................................255
PFC Prerequisites and Restrictions.............................................................................................257
Applying a DCB Map on a Port......................................................................................................... 257
Configuring PFC without a DCB Map.............................................................................................. 257
Configuring Lossless QueuesExample:......................................................................................258
Priority-Based Flow Control Using Dynamic Buffer Method......................................................... 260
Pause and Resume of Traffic......................................................................................................260
Buffer Sizes for Lossless or PFC Packets................................................................................... 260
Behavior of Tagged Packets............................................................................................................. 261
Configuration Example for DSCP and PFC Priorities...................................................................... 262
SNMP Support for PFC and Buffer Statistics Tracking.....................................................................262
Performing PFC Using DSCP Bits Instead of 802.1p Bits................................................................ 263
PFC and ETS Configuration Examples.............................................................................................264
Using PFC to Manage Converged Ethernet Traffic......................................................................... 264
Operations on Untagged Packets....................................................................................................264
Generation of PFC for a Priority for Untagged Packets.................................................................. 265
Configure Enhanced Transmission Selection..................................................................................265
ETS Prerequisites and Restrictions............................................................................................. 265
Creating an ETS Priority Group.................................................................................................. 266
ETS Operation with DCBx...........................................................................................................267
Configuring Bandwidth Allocation for DCBx CIN..................................................................... 268
Configuring ETS in a DCB Map.................................................................................................. 269
Hierarchical Scheduling in ETS Output Policies.............................................................................. 270
Using ETS to Manage Converged Ethernet Traffic.......................................................................... 271
Applying DCB Policies in a Switch Stack.......................................................................................... 271
Configure a DCBx Operation............................................................................................................271
DCBx Operation.......................................................................................................................... 272
DCBx Port Roles..........................................................................................................................272
DCB Configuration Exchange.................................................................................................... 274
Configuration Source Election................................................................................................... 274
Propagation of DCB Information................................................................................................275
Auto-Detection and Manual Configuration of the DCBx Version............................................ 275
9
DCBx Example.............................................................................................................................276
DCBx Prerequisites and Restrictions.......................................................................................... 276
Configuring DCBx....................................................................................................................... 277
Verifying the DCB Configuration......................................................................................................281
QoS dot1p Traffic Classification and Queue Assignment...............................................................292
Configuring the Dynamic Buffer Method........................................................................................ 293
Sample DCB Configuration..............................................................................................................294
PFC and ETS Configuration Command Examples.....................................................................295
12 Dynamic Host Configuration Protocol (DHCP)........................................296
DHCP Packet Format and Options.................................................................................................. 296
Assign an IP Address using DHCP....................................................................................................298
Implementation Information............................................................................................................299
Configure the System to be a DHCP Server....................................................................................300
Configuring the Server for Automatic Address Allocation........................................................300
Specifying a Default Gateway.....................................................................................................302
Configure a Method of Hostname Resolution.......................................................................... 302
Using DNS for Address Resolution.............................................................................................302
Using NetBIOS WINS for Address Resolution............................................................................302
Creating Manual Binding Entries................................................................................................303
Debugging the DHCP Server......................................................................................................303
Using DHCP Clear Commands.................................................................................................. 303
Configure the System to be a DHCP Client.................................................................................... 304
Configuring the DHCP Client System........................................................................................304
DHCP Client on a Management Interface.................................................................................306
DHCP Client Operation with Other Features.............................................................................307
Configure the System for User Port Stacking (Option 230)........................................................... 308
Configure Secure DHCP.................................................................................................................. 308
Option 82....................................................................................................................................308
DHCP Snooping..........................................................................................................................309
Drop DHCP Packets on Snooped VLANs Only.......................................................................... 313
Dynamic ARP Inspection.............................................................................................................313
Configuring Dynamic ARP Inspection........................................................................................314
Source Address Validation................................................................................................................ 315
Enabling IP Source Address Validation.......................................................................................316
DHCP MAC Source Address Validation...................................................................................... 316
Enabling IP+MAC Source Address Validation.............................................................................317
Viewing the Number of SAV Dropped Packets.......................................................................... 317
Clearing the Number of SAV Dropped Packets......................................................................... 318
13 Equal Cost Multi-Path (ECMP)......................................................................319
ECMP for Flow-Based Affinity...........................................................................................................319
10
Configuring the Hash Algorithm.................................................................................................319
Enabling Deterministic ECMP Next Hop.................................................................................... 319
Configuring the Hash Algorithm Seed.......................................................................................320
Link Bundle Monitoring.................................................................................................................... 320
Managing ECMP Group Paths.....................................................................................................321
Creating an ECMP Group Bundle...............................................................................................322
Modifying the ECMP Group Threshold...................................................................................... 322
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table.................323
Support for ECMP in host table..................................................................................................323
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ..................................................324
14 FCoE Transit.................................................................................................... 325
Fibre Channel over Ethernet.............................................................................................................325
Ensure Robustness in a Converged Ethernet Network................................................................... 325
FIP Snooping on Ethernet Bridges................................................................................................... 327
FIP Snooping in a Switch Stack........................................................................................................ 329
Using FIP Snooping...........................................................................................................................329
FIP Snooping Prerequisites.........................................................................................................329
Important Points to Remember................................................................................................. 330
Enabling the FCoE Transit Feature..............................................................................................331
Enable FIP Snooping on VLANs.................................................................................................. 331
Configure the FC-MAP Value......................................................................................................331
Configure a Port for a Bridge-to-Bridge Link............................................................................ 332
Configure a Port for a Bridge-to-FCF Link................................................................................ 332
Impact on Other Software Features...........................................................................................332
FIP Snooping Restrictions...........................................................................................................333
Configuring FIP Snooping...........................................................................................................333
Displaying FIP Snooping Information.............................................................................................. 334
FCoE Transit Configuration Example...............................................................................................340
15 Flex Hash and Optimized Boot-Up............................................................. 342
Flex Hash Capability Overview......................................................................................................... 342
Configuring the Flex Hash Mechanism............................................................................................342
Configuring Fast Boot and LACP Fast Switchover.......................................................................... 343
Optimizing the Boot Time................................................................................................................343
Booting Process When Optimized Boot Time Mechanism is Enabled.....................................344
Guidelines for Configuring Optimized Booting Mechanism.................................................... 344
Interoperation of Applications with Fast Boot and System States..................................................345
LACP and IPv4 Routing...............................................................................................................345
LACP and IPv6 Routing...............................................................................................................346
BGP Graceful Restart.................................................................................................................. 346
Cold Boot Caused by Power Cycling the System..................................................................... 346
11
Unexpected Reload of the System.............................................................................................347
Software Upgrade....................................................................................................................... 347
LACP Fast Switchover................................................................................................................. 347
Changes to BGP Multipath......................................................................................................... 347
Delayed Installation of ECMP Routes Into BGP.........................................................................347
RDMA Over Converged Ethernet (RoCE) Overview........................................................................348
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.............................................................349
16 Force10 Resilient Ring Protocol (FRRP).....................................................350
Protocol Overview............................................................................................................................350
Ring Status................................................................................................................................... 351
Multiple FRRP Rings.................................................................................................................... 352
Important FRRP Points................................................................................................................352
Important FRRP Concepts.......................................................................................................... 353
Implementing FRRP.......................................................................................................................... 354
FRRP Configuration.......................................................................................................................... 354
Creating the FRRP Group............................................................................................................355
Configuring the Control VLAN................................................................................................... 355
Configuring and Adding the Member VLANs.............................................................................356
Setting the FRRP Timers............................................................................................................. 358
Clearing the FRRP Counters.......................................................................................................358
Viewing the FRRP Configuration................................................................................................358
Viewing the FRRP Information................................................................................................... 358
Troubleshooting FRRP......................................................................................................................359
Configuration Checks.................................................................................................................359
Sample Configuration and Topology...............................................................................................359
17 GARP VLAN Registration Protocol (GVRP).................................................361
Important Points to Remember........................................................................................................361
Configure GVRP................................................................................................................................362
Related Configuration Tasks.......................................................................................................363
Enabling GVRP Globally....................................................................................................................363
Enabling GVRP on a Layer 2 Interface............................................................................................. 363
Configure GVRP Registration...........................................................................................................364
Configure a GARP Timer.................................................................................................................. 364
18 Internet Group Management Protocol (IGMP).........................................366
IGMP Implementation Information..................................................................................................366
IGMP Protocol Overview..................................................................................................................366
IGMP Version 2............................................................................................................................366
IGMP Version 3............................................................................................................................368
Configure IGMP.................................................................................................................................371
12
Related Configuration Tasks....................................................................................................... 371
Viewing IGMP Enabled Interfaces.................................................................................................... 372
Selecting an IGMP Version................................................................................................................372
Viewing IGMP Groups.......................................................................................................................373
Adjusting Timers................................................................................................................................373
Adjusting Query and Response Timers...................................................................................... 373
Enabling IGMP Immediate-Leave.....................................................................................................374
IGMP Snooping................................................................................................................................. 374
IGMP Snooping Implementation Information........................................................................... 375
Configuring IGMP Snooping.......................................................................................................375
Removing a Group-Port Association..........................................................................................375
Disabling Multicast Flooding.......................................................................................................376
Specifying a Port as Connected to a Multicast Router..............................................................376
Configuring the Switch as Querier.............................................................................................376
Fast Convergence after MSTP Topology Changes..........................................................................377
Egress Interface Selection (EIS) for HTTP and IGMP Applications.................................................. 377
Protocol Separation.................................................................................................................... 378
Enabling and Disabling Management Egress Interface Selection.............................................379
Handling of Management Route Configuration........................................................................380
Handling of Switch-Initiated Traffic........................................................................................... 381
Handling of Switch-Destined Traffic..........................................................................................382
Handling of Transit Traffic (Traffic Separation)..........................................................................382
Mapping of Management Applications and Traffic Type.......................................................... 383
Behavior of Various Applications for Switch-Initiated Traffic .................................................. 384
Behavior of Various Applications for Switch-Destined Traffic .................................................385
Interworking of EIS With Various Applications.......................................................................... 386
Designating a Multicast Router Interface........................................................................................ 386
19 Interfaces......................................................................................................... 387
Basic Interface Configuration...........................................................................................................387
Advanced Interface Configuration...................................................................................................387
Interface Types................................................................................................................................. 388
View Basic Interface Information.....................................................................................................388
Enabling a Physical Interface........................................................................................................... 390
Physical Interfaces.............................................................................................................................391
Configuration Task List for Physical Interfaces.......................................................................... 391
40G to 1G Breakout Cable Adaptor............................................................................................391
Overview of Layer Modes........................................................................................................... 392
Configuring Layer 2 (Data Link) Mode....................................................................................... 392
Configuring Layer 2 (Interface) Mode........................................................................................ 393
Configuring Layer 3 (Network) Mode.........................................................................................393
Configuring Layer 3 (Interface) Mode........................................................................................394
13
Egress Interface Selection (EIS)........................................................................................................394
Important Points to Remember................................................................................................. 395
Configuring EIS........................................................................................................................... 395
Management Interfaces....................................................................................................................395
Configuring Management Interfaces......................................................................................... 395
Configuring Management Interfaces on the S-Series...............................................................396
VLAN Interfaces.................................................................................................................................397
Loopback Interfaces.........................................................................................................................398
Null Interfaces...................................................................................................................................398
Port Channel Interfaces....................................................................................................................398
Port Channel Definition and Standards..................................................................................... 399
Port Channel Benefits.................................................................................................................399
Port Channel Implementation....................................................................................................399
10/100/1000 Mbps Interfaces in Port Channels....................................................................... 400
Configuration Tasks for Port Channel Interfaces......................................................................400
Creating a Port Channel............................................................................................................. 401
Adding a Physical Interface to a Port Channel.......................................................................... 401
Reassigning an Interface to a New Port Channel......................................................................403
Configuring the Minimum Oper Up Links in a Port Channel....................................................404
.....................................................................................................................................................404
Assigning an IP Address to a Port Channel................................................................................405
Deleting or Disabling a Port Channel........................................................................................ 405
Load Balancing Through Port Channels....................................................................................405
Load-Balancing Method.............................................................................................................406
Changing the Hash Algorithm....................................................................................................406
Bulk Configuration........................................................................................................................... 408
Interface Range...........................................................................................................................408
Bulk Configuration Examples.....................................................................................................408
Defining Interface Range Macros.....................................................................................................410
Define the Interface Range.........................................................................................................410
Choosing an Interface-Range Macro.........................................................................................410
Monitoring and Maintaining Interfaces.............................................................................................411
Maintenance Using TDR..............................................................................................................412
Fanning out 40G Ports Dynamically.................................................................................................413
Splitting QSFP Ports to SFP+ Ports...................................................................................................413
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................ 413
Important Points to Remember..................................................................................................414
Example Scenarios...................................................................................................................... 414
Link Dampening................................................................................................................................ 416
Important Points to Remember..................................................................................................416
Enabling Link Dampening...........................................................................................................416
Link Bundle Monitoring.....................................................................................................................418
14
Using Ethernet Pause Frames for Flow Control.............................................................................. 418
Enabling Pause Frames............................................................................................................... 419
Configure the MTU Size on an Interface.........................................................................................420
Port-Pipes..........................................................................................................................................421
Auto-Negotiation on Ethernet Interfaces........................................................................................ 421
Setting the Speed and Duplex Mode of Ethernet Interfaces..................................................... 421
Set Auto-Negotiation Options................................................................................................... 423
View Advanced Interface Information............................................................................................. 424
Configuring the Interface Sampling Size................................................................................... 425
Dynamic Counters............................................................................................................................426
Clearing Interface Counters.......................................................................................................426
Enhanced Validation of Interface Ranges........................................................................................427
Compressing Configuration Files.....................................................................................................427
20 IPv4 Routing....................................................................................................431
IP Addresses.......................................................................................................................................431
Implementation Information...................................................................................................... 431
Configuration Tasks for IP Addresses.............................................................................................. 432
Assigning IP Addresses to an Interface............................................................................................ 432
Configuring Static Routes.................................................................................................................433
Configure Static Routes for the Management Interface.................................................................435
Using the Configured Source IP Address in ICMP Messages..........................................................435
Configuring the ICMP Source Interface.....................................................................................435
Configuring the Duration to Establish a TCP Connection..............................................................436
Enabling Directed Broadcast............................................................................................................436
Resolution of Host Names................................................................................................................437
Enabling Dynamic Resolution of Host Names.................................................................................437
Specifying the Local System Domain and a List of Domains..........................................................438
Configuring DNS with Traceroute................................................................................................... 438
ARP.................................................................................................................................................... 439
Configuration Tasks for ARP............................................................................................................ 439
Configuring Static ARP Entries.........................................................................................................440
Enabling Proxy ARP.......................................................................................................................... 440
Clearing ARP Cache..........................................................................................................................441
ARP Learning via Gratuitous ARP......................................................................................................441
Enabling ARP Learning via Gratuitous ARP......................................................................................442
ARP Learning via ARP Request......................................................................................................... 442
Configuring ARP Retries................................................................................................................... 443
ICMP..................................................................................................................................................444
Configuration Tasks for ICMP..........................................................................................................444
Enabling ICMP Unreachable Messages........................................................................................... 444
UDP Helper....................................................................................................................................... 444
15
Configure UDP Helper................................................................................................................444
Important Points to Remember................................................................................................. 445
Enabling UDP Helper........................................................................................................................445
Configuring a Broadcast Address.....................................................................................................445
Configurations Using UDP Helper................................................................................................... 446
UDP Helper with Broadcast-All Addresses......................................................................................446
UDP Helper with Subnet Broadcast Addresses............................................................................... 447
UDP Helper with Configured Broadcast Addresses........................................................................448
UDP Helper with No Configured Broadcast Addresses..................................................................448
Troubleshooting UDP Helper...........................................................................................................449
21 IPv6 Routing....................................................................................................450
Protocol Overview............................................................................................................................450
Extended Address Space............................................................................................................ 450
Stateless Autoconfiguration....................................................................................................... 450
IPv6 Headers................................................................................................................................451
Longest Prefix Match (LPM) Table and IPv6 /65 – /128 support.............................................. 452
IPv6 Header Fields.......................................................................................................................453
Extension Header Fields..............................................................................................................455
Addressing...................................................................................................................................456
Implementing IPv6 with Dell Networking OS..................................................................................457
ICMPv6..............................................................................................................................................459
Path MTU Discovery.........................................................................................................................460
IPv6 Neighbor Discovery..................................................................................................................460
IPv6 Neighbor Discovery of MTU Packets................................................................................. 461
Configuring the IPv6 Recursive DNS Server.............................................................................. 461
Debugging IPv6 RDNSS Information Sent to the Host ............................................................ 462
Displaying IPv6 RDNSS Information...........................................................................................463
Secure Shell (SSH) Over an IPv6 Transport..................................................................................... 464
Configuration Tasks for IPv6............................................................................................................464
Adjusting Your CAM-Profile....................................................................................................... 464
Assigning an IPv6 Address to an Interface.................................................................................465
Assigning a Static IPv6 Route..................................................................................................... 465
Configuring Telnet with IPv6..................................................................................................... 466
SNMP over IPv6.......................................................................................................................... 466
Showing IPv6 Information.......................................................................................................... 467
Showing an IPv6 Interface..........................................................................................................467
Showing IPv6 Routes..................................................................................................................468
Showing the Running-Configuration for an Interface..............................................................469
Clearing IPv6 Routes...................................................................................................................470
Configuring IPv6 RA Guard.............................................................................................................. 470
Configuring IPv6 RA Guard on an Interface...............................................................................472
16
Monitoring IPv6 RA Guard.......................................................................................................... 473
22 iSCSI Optimization.........................................................................................474
iSCSI Optimization Overview........................................................................................................... 474
Monitoring iSCSI Traffic Flows................................................................................................... 476
Application of Quality of Service to iSCSI Traffic Flows............................................................ 477
Information Monitored in iSCSI Traffic Flows............................................................................ 477
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................ 478
Configuring Detection and Ports for Dell Compellent Arrays.................................................. 478
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................479
Enable and Disable iSCSI Optimization......................................................................................479
Default iSCSI Optimization Values...................................................................................................480
iSCSI Optimization Prerequisites......................................................................................................481
Configuring iSCSI Optimization....................................................................................................... 481
Displaying iSCSI Optimization Information..................................................................................... 483
23 Intermediate System to Intermediate System..........................................485
IS-IS Protocol Overview................................................................................................................... 485
IS-IS Addressing................................................................................................................................485
Multi-Topology IS-IS........................................................................................................................ 486
Transition Mode.......................................................................................................................... 487
Interface Support........................................................................................................................ 487
Adjacencies................................................................................................................................. 487
Graceful Restart................................................................................................................................ 487
Timers..........................................................................................................................................488
Implementation Information............................................................................................................488
Configuration Information............................................................................................................... 489
Configuration Tasks for IS-IS..................................................................................................... 489
Configuring the Distance of a Route......................................................................................... 498
Changing the IS-Type.................................................................................................................498
Redistributing IPv4 Routes..........................................................................................................501
Redistributing IPv6 Routes..........................................................................................................502
Configuring Authentication Passwords..................................................................................... 503
Setting the Overload Bit............................................................................................................. 504
Debugging IS-IS..........................................................................................................................504
IS-IS Metric Styles............................................................................................................................. 506
Configure Metric Values...................................................................................................................506
Maximum Values in the Routing Table...................................................................................... 506
Change the IS-IS Metric Style in One Level Only......................................................................506
Leaks from One Level to Another.............................................................................................. 508
Sample Configurations.....................................................................................................................509
17
24 Link Aggregation Control Protocol (LACP)............................................... 512
Introduction to Dynamic LAGs and LACP........................................................................................512
Important Points to Remember..................................................................................................512
LACP Modes.................................................................................................................................513
Configuring LACP Commands....................................................................................................513
LACP Configuration Tasks................................................................................................................ 514
Creating a LAG.............................................................................................................................514
Configuring the LAG Interfaces as Dynamic.............................................................................. 515
Setting the LACP Long Timeout................................................................................................. 515
Monitoring and Debugging LACP...............................................................................................516
Shared LAG State Tracking............................................................................................................... 516
Configuring Shared LAG State Tracking..................................................................................... 517
Important Points about Shared LAG State Tracking.................................................................. 518
LACP Basic Configuration Example..................................................................................................519
Configure a LAG on ALPHA........................................................................................................ 519
25 Layer 2.............................................................................................................. 527
Manage the MAC Address Table.......................................................................................................527
Clearing the MAC Address Table................................................................................................ 527
Setting the Aging Time for Dynamic Entries.............................................................................. 527
Configuring a Static MAC Address............................................................................................. 528
Displaying the MAC Address Table.............................................................................................528
MAC Learning Limit.......................................................................................................................... 528
Setting the MAC Learning Limit..................................................................................................529
mac learning-limit Dynamic.......................................................................................................529
mac learning-limit mac-address-sticky.....................................................................................530
mac learning-limit station-move............................................................................................... 530
mac learning-limit no-station-move.........................................................................................530
Learning Limit Violation Actions................................................................................................. 531
Setting Station Move Violation Actions.......................................................................................531
Recovering from Learning Limit and Station Move Violations..................................................532
NIC Teaming..................................................................................................................................... 532
Configure Redundant Pairs.............................................................................................................. 534
Important Points about Configuring Redundant Pairs.............................................................. 535
Far-End Failure Detection.................................................................................................................537
FEFD State Changes....................................................................................................................538
Configuring FEFD........................................................................................................................539
Enabling FEFD on an Interface...................................................................................................540
Debugging FEFD..........................................................................................................................541
26 Link Layer Discovery Protocol (LLDP)........................................................543
18
802.1AB (LLDP) Overview.................................................................................................................543
Protocol Data Units.....................................................................................................................543
Optional TLVs....................................................................................................................................544
Management TLVs...................................................................................................................... 545
TIA-1057 (LLDP-MED) Overview...................................................................................................... 547
TIA Organizationally Specific TLVs............................................................................................. 547
Configure LLDP.................................................................................................................................552
Related Configuration Tasks.......................................................................................................552
Important Points to Remember..................................................................................................552
LLDP Compatibility......................................................................................................................552
CONFIGURATION versus INTERFACE Configurations....................................................................552
Enabling LLDP................................................................................................................................... 553
Disabling and Undoing LLDP......................................................................................................553
Enabling LLDP on Management Ports............................................................................................. 553
Disabling and Undoing LLDP on Management Ports................................................................554
Advertising TLVs................................................................................................................................554
Viewing the LLDP Configuration......................................................................................................555
Viewing Information Advertised by Adjacent LLDP Agents.............................................................556
Configuring LLDPDU Intervals..........................................................................................................557
Configuring Transmit and Receive Mode........................................................................................ 558
Configuring a Time to Live............................................................................................................... 559
Debugging LLDP...............................................................................................................................559
Relevant Management Objects........................................................................................................560
27 Microsoft Network Load Balancing............................................................ 567
NLB Unicast Mode Scenario.............................................................................................................567
NLB Multicast Mode Scenario.......................................................................................................... 568
Limitations of the NLB Feature.........................................................................................................568
Microsoft Clustering......................................................................................................................... 568
Enable and Disable VLAN Flooding .................................................................................................569
Configuring a Switch for NLB ..........................................................................................................569
..................................................................................................................................................... 569
28 Multicast Source Discovery Protocol (MSDP)........................................... 571
Protocol Overview.............................................................................................................................571
Anycast RP.........................................................................................................................................573
Implementation Information............................................................................................................ 573
Configure Multicast Source Discovery Protocol............................................................................. 573
Related Configuration Tasks.......................................................................................................574
Enable MSDP.....................................................................................................................................578
Manage the Source-Active Cache................................................................................................... 579
Viewing the Source-Active Cache..............................................................................................579
19
Limiting the Source-Active Cache.............................................................................................580
Clearing the Source-Active Cache............................................................................................ 580
Enabling the Rejected Source-Active Cache............................................................................ 580
Accept Source-Active Messages that Fail the RFP Check.............................................................. 580
Specifying Source-Active Messages................................................................................................ 584
Limiting the Source-Active Messages from a Peer......................................................................... 585
Preventing MSDP from Caching a Local Source.............................................................................585
Preventing MSDP from Caching a Remote Source.........................................................................586
Preventing MSDP from Advertising a Local Source.........................................................................587
Logging Changes in Peership States................................................................................................588
Terminating a Peership.....................................................................................................................588
Clearing Peer Statistics..................................................................................................................... 589
Debugging MSDP..............................................................................................................................589
MSDP with Anycast RP..................................................................................................................... 590
Configuring Anycast RP.................................................................................................................... 591
Reducing Source-Active Message Flooding..............................................................................592
Specifying the RP Address Used in SA Messages.......................................................................592
MSDP Sample Configurations.......................................................................................................... 595
29 Multiple Spanning Tree Protocol (MSTP).................................................. 598
Protocol Overview............................................................................................................................598
Spanning Tree Variations..................................................................................................................599
Implementation Information......................................................................................................599
Configure Multiple Spanning Tree Protocol....................................................................................599
Related Configuration Tasks...................................................................................................... 599
Enable Multiple Spanning Tree Globally..........................................................................................600
Adding and Removing Interfaces.....................................................................................................600
Creating Multiple Spanning Tree Instances..................................................................................... 601
Influencing MSTP Root Selection.................................................................................................... 602
Interoperate with Non-Dell Networking OS Bridges......................................................................603
Changing the Region Name or Revision......................................................................................... 603
Modifying Global Parameters...........................................................................................................604
Modifying the Interface Parameters................................................................................................ 605
Configuring an EdgePort................................................................................................................. 606
Flush MAC Addresses after a Topology Change............................................................................. 607
MSTP Sample Configurations...........................................................................................................607
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration............................................................608
Debugging and Verifying MSTP Configurations...............................................................................611
30 Multicast Features..........................................................................................614
Enabling IP Multicast.........................................................................................................................614
20
Implementation Information............................................................................................................ 614
Multicast Policies...............................................................................................................................615
IPv4 Multicast Policies.................................................................................................................615
31 Object Tracking.............................................................................................. 623
Object Tracking Overview................................................................................................................623
Track Layer 2 Interfaces..............................................................................................................624
Track Layer 3 Interfaces..............................................................................................................624
Track IPv4 and IPv6 Routes........................................................................................................ 625
Set Tracking Delays.....................................................................................................................626
VRRP Object Tracking.................................................................................................................626
Object Tracking Configuration........................................................................................................ 626
Tracking a Layer 2 Interface....................................................................................................... 627
Tracking a Layer 3 Interface....................................................................................................... 628
Track an IPv4/IPv6 Route........................................................................................................... 629
Displaying Tracked Objects..............................................................................................................633
32 Open Shortest Path First (OSPFv2 and OSPFv3)...................................... 636
Protocol Overview............................................................................................................................636
Autonomous System (AS) Areas................................................................................................. 636
Area Types................................................................................................................................... 637
Networks and Neighbors............................................................................................................638
Router Types............................................................................................................................... 638
Designated and Backup Designated Routers............................................................................ 640
Link-State Advertisements (LSAs)...............................................................................................640
Router Priority and Cost............................................................................................................. 642
OSPF with Dell Networking OS........................................................................................................643
Graceful Restart.......................................................................................................................... 643
Fast Convergence (OSPFv2, IPv4 Only)..................................................................................... 644
Multi-Process OSPFv2 with VRF.................................................................................................645
RFC-2328 Compliant OSPF Flooding........................................................................................ 645
OSPF ACK Packing......................................................................................................................646
Setting OSPF Adjacency with Cisco Routers.............................................................................646
Configuration Information............................................................................................................... 647
Configuration Task List for OSPFv2 (OSPF for IPv4)..................................................................647
Configuration Task List for OSPFv3 (OSPF for IPv6)....................................................................... 663
Enabling IPv6 Unicast Routing................................................................................................... 664
Assigning IPv6 Addresses on an Interface................................................................................. 664
Assigning Area ID on an Interface..............................................................................................665
Assigning OSPFv3 Process ID and Router ID Globally.............................................................. 665
Assigning OSPFv3 Process ID and Router ID to a VRF..............................................................666
Configuring Stub Areas...............................................................................................................666
21
Configuring Passive-Interface....................................................................................................666
Redistributing Routes..................................................................................................................667
Configuring a Default Route.......................................................................................................667
Enabling OSPFv3 Graceful Restart............................................................................................. 668
OSPFv3 Authentication Using IPsec...........................................................................................670
Troubleshooting OSPFv3............................................................................................................ 677
33 Policy-based Routing (PBR)......................................................................... 679
Overview........................................................................................................................................... 679
Implementing Policy-based Routing with Dell Networking OS.....................................................680
Configuration Task List for Policy-based Routing...........................................................................681
PBR Exceptions (Permit)..............................................................................................................681
Create a Redirect List..................................................................................................................682
Create a Rule for a Redirect-list.................................................................................................682
Apply a Redirect-list to an Interface using a Redirect-group...................................................684
Sample Configuration...................................................................................................................... 686
34 PIM Sparse-Mode (PIM-SM).........................................................................688
Implementation Information............................................................................................................688
Protocol Overview............................................................................................................................688
Requesting Multicast Traffic.......................................................................................................688
Refuse Multicast Traffic.............................................................................................................. 689
Send Multicast Traffic................................................................................................................. 689
Configuring PIM-SM.........................................................................................................................690
Related Configuration Tasks...................................................................................................... 690
Enable PIM-SM................................................................................................................................. 690
Configuring S,G Expiry Timers..........................................................................................................691
Configuring a Static Rendezvous Point........................................................................................... 692
Overriding Bootstrap Router Updates....................................................................................... 693
Configuring a Designated Router.................................................................................................... 693
Creating Multicast Boundaries and Domains..................................................................................694
35 PIM Source-Specific Mode (PIM-SSM)....................................................... 695
Implementation Information............................................................................................................695
Important Points to Remember................................................................................................. 695
Configure PIM-SMM.........................................................................................................................696
Related Configuration Tasks...................................................................................................... 696
Enabling PIM-SSM............................................................................................................................ 696
Use PIM-SSM with IGMP Version 2 Hosts....................................................................................... 696
Configuring PIM-SSM with IGMPv2........................................................................................... 697
36 Port Monitoring..............................................................................................699
22
Important Points to Remember.......................................................................................................699
Port Monitoring.................................................................................................................................700
Configuring Port Monitoring............................................................................................................ 701
Configuring Monitor Multicast Queue.............................................................................................703
Enabling Flow-Based Monitoring.....................................................................................................704
Remote Port Mirroring......................................................................................................................705
Remote Port Mirroring Example.................................................................................................705
Configuring Remote Port Mirroring...........................................................................................706
Displaying Remote-Port Mirroring Configurations................................................................... 708
Configuring the Sample Remote Port Mirroring....................................................................... 708
Configuring the Encapsulated Remote Port Mirroring....................................................................712
Changes to Default BehaviorConfiguration steps for ERPM .................................................... 712
ERPM Behavior on a typical Dell Networking OS ........................................................................... 714
Decapsulation of ERPM packets at the Destination IP/ Analyzer..............................................714
37 Per-VLAN Spanning Tree Plus (PVST+).......................................................716
Protocol Overview.............................................................................................................................716
Implementation Information.............................................................................................................717
Configure Per-VLAN Spanning Tree Plus......................................................................................... 717
Related Configuration Tasks....................................................................................................... 717
Enabling PVST+..................................................................................................................................717
Disabling PVST+................................................................................................................................ 718
Influencing PVST+ Root Selection................................................................................................... 718
Modifying Global PVST+ Parameters...............................................................................................720
Modifying Interface PVST+ Parameters............................................................................................721
Configuring an EdgePort.................................................................................................................. 722
PVST+ in Multi-Vendor Networks.................................................................................................... 723
Enabling PVST+ Extend System ID...................................................................................................723
PVST+ Sample Configurations......................................................................................................... 724
38 Quality of Service (QoS)................................................................................726
Implementation Information............................................................................................................728
Port-Based QoS Configurations.......................................................................................................729
Setting dot1p Priorities for Incoming Traffic..............................................................................729
Honoring dot1p Priorities on Ingress Traffic..............................................................................729
Configuring Port-Based Rate Policing....................................................................................... 730
Configuring Port-Based Rate Shaping........................................................................................731
Policy-Based QoS Configurations....................................................................................................732
Classify Traffic............................................................................................................................. 732
Dot1p to Queue Mapping Requirement.....................................................................................736
Create a QoS Policy.................................................................................................................... 737
DSCP Color Maps........................................................................................................................739
23
Create Policy Maps......................................................................................................................741
Enabling QoS Rate Adjustment........................................................................................................ 746
Enabling Strict-Priority Queueing.................................................................................................... 746
Queue Classification Requirements for PFC Functionality............................................................. 747
Support for marking dot1p value in L3 Input Qos Policy................................................................ 747
Weighted Random Early Detection..................................................................................................748
Creating WRED Profiles.............................................................................................................. 749
Applying a WRED Profile to Traffic.............................................................................................749
Displaying Default and Configured WRED Profiles....................................................................750
Displaying WRED Drop Statistics................................................................................................750
Displaying egress-queue Statistics.............................................................................................750
Pre-Calculating Available QoS CAM Space......................................................................................751
Specifying Policy-Based Rate Shaping in Packets Per Second....................................................... 752
Configuring Policy-Based Rate Shaping.......................................................................................... 753
Configuring Weights and ECN for WRED ....................................................................................... 753
Global Service Pools With WRED and ECN Settings..................................................................754
Configuring WRED and ECN Attributes........................................................................................... 756
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................ 757
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class.......... 757
Classifying Incoming Packets Using ECN and Color-Marking..................................................758
Sample configuration to mark non-ecn packets as “yellow” with single traffic class............. 760
Applying Layer 2 Match Criteria on a Layer 3 Interface...................................................................761
Managing Hardware Buffer Statistics......................................................................................... 762
Enabling Buffer Statistics Tracking .................................................................................................. 762
39 Routing Information Protocol (RIP)........................................................... 766
Protocol Overview............................................................................................................................766
RIPv1............................................................................................................................................ 766
RIPv2............................................................................................................................................ 767
Implementation Information............................................................................................................ 767
Configuration Information................................................................................................................767
Configuration Task List............................................................................................................... 767
RIP Configuration Example.........................................................................................................775
40 Remote Monitoring (RMON)........................................................................781
Implementation Information............................................................................................................ 781
Fault Recovery................................................................................................................................... 781
Setting the rmon Alarm...............................................................................................................782
Configuring an RMON Event...................................................................................................... 783
Configuring RMON Collection Statistics....................................................................................784
Configuring the RMON Collection History................................................................................784
24
41 Rapid Spanning Tree Protocol (RSTP)........................................................786
Protocol Overview............................................................................................................................786
Configuring Rapid Spanning Tree....................................................................................................786
Related Configuration Tasks.......................................................................................................786
Important Points to Remember........................................................................................................787
RSTP and VLT.............................................................................................................................. 787
Configuring Interfaces for Layer 2 Mode.........................................................................................787
Enabling Rapid Spanning Tree Protocol Globally............................................................................788
Adding and Removing Interfaces.....................................................................................................790
Modifying Global Parameters........................................................................................................... 791
Enabling SNMP Traps for Root Elections and Topology Changes........................................... 792
Modifying Interface Parameters....................................................................................................... 792
Enabling SNMP Traps for Root Elections and Topology Changes................................................. 793
Influencing RSTP Root Selection......................................................................................................793
Configuring an EdgePort.................................................................................................................. 793
Configuring Fast Hellos for Link State Detection............................................................................ 794
42 Software-Defined Networking (SDN).........................................................796
43 Security............................................................................................................ 797
AAA Accounting................................................................................................................................ 797
Configuration Task List for AAA Accounting..............................................................................797
AAA Authentication...........................................................................................................................799
Configuration Task List for AAA Authentication........................................................................800
Obscuring Passwords and Keys....................................................................................................... 802
AAA Authorization.............................................................................................................................803
Privilege Levels Overview........................................................................................................... 803
Configuration Task List for Privilege Levels...............................................................................804
RADIUS..............................................................................................................................................808
RADIUS Authentication...............................................................................................................808
Configuration Task List for RADIUS........................................................................................... 809
TACACS+...........................................................................................................................................812
Configuration Task List for TACACS+........................................................................................ 812
TACACS+ Remote Authentication............................................................................................. 814
Command Authorization............................................................................................................ 815
Protection from TCP Tiny and Overlapping Fragment Attacks...................................................... 816
Enabling SCP and SSH...................................................................................................................... 816
Using SCP with SSH to Copy a Software Image.........................................................................817
Removing the RSA Host Keys and Zeroizing Storage ............................................................... 817
Configuring When to Re-generate an SSH Key ........................................................................ 817
Configuring the SSH Server Key Exchange Algorithm...............................................................818
25
Configuring the HMAC Algorithm for the SSH Server............................................................... 819
Configuring the SSH Server Cipher List......................................................................................819
Secure Shell Authentication....................................................................................................... 820
Troubleshooting SSH..................................................................................................................823
Telnet.................................................................................................................................................823
VTY Line and Access-Class Configuration...................................................................................... 823
VTY Line Local Authentication and Authorization.....................................................................824
VTY Line Remote Authentication and Authorization.................................................................825
VTY MAC-SA Filter Support........................................................................................................ 825
Role-Based Access Control............................................................................................................. 826
Overview of RBAC.......................................................................................................................826
User Roles................................................................................................................................... 829
AAA Authentication and Authorization for Roles.......................................................................833
Role Accounting......................................................................................................................... 836
Display Information About User Roles....................................................................................... 837
44 Service Provider Bridging.............................................................................839
VLAN Stacking...................................................................................................................................839
Important Points to Remember.................................................................................................840
Configure VLAN Stacking............................................................................................................841
Creating Access and Trunk Ports............................................................................................... 841
Enable VLAN-Stacking for a VLAN............................................................................................. 842
Configuring the Protocol Type Value for the Outer VLAN Tag................................................ 842
Configuring Dell Networking OS Options for Trunk Ports....................................................... 843
Debugging VLAN Stacking......................................................................................................... 844
VLAN Stacking in Multi-Vendor Networks.................................................................................844
VLAN Stacking Packet Drop Precedence........................................................................................ 848
Enabling Drop Eligibility..............................................................................................................848
Honoring the Incoming DEI Value.............................................................................................849
Marking Egress Packets with a DEI Value.................................................................................. 850
Dynamic Mode CoS for VLAN Stacking...........................................................................................850
Mapping C-Tag to S-Tag dot1p Values......................................................................................852
Layer 2 Protocol Tunneling..............................................................................................................852
Implementation Information......................................................................................................854
Enabling Layer 2 Protocol Tunneling.........................................................................................855
Specifying a Destination MAC Address for BPDUs.................................................................... 855
Setting Rate-Limit BPDUs...........................................................................................................855
Debugging Layer 2 Protocol Tunneling.....................................................................................856
Provider Backbone Bridging.............................................................................................................856
45 sFlow.................................................................................................................857
Overview............................................................................................................................................857
26
Implementation Information............................................................................................................857
Important Points to Remember................................................................................................. 858
Enabling Extended sFlow................................................................................................................. 858
Enabling and Disabling sFlow on an Interface................................................................................ 859
Enabling sFlow Max-Header Size Extended.................................................................................... 859
sFlow Show Commands.................................................................................................................. 860
Displaying Show sFlow Global....................................................................................................861
Displaying Show sFlow on an Interface..................................................................................... 861
Displaying Show sFlow on a Stack-unit.....................................................................................862
Configuring Specify Collectors........................................................................................................862
Changing the Polling Intervals......................................................................................................... 863
Back-Off Mechanism........................................................................................................................863
sFlow on LAG ports.......................................................................................................................... 863
Enabling Extended sFlow................................................................................................................. 863
Important Points to Remember................................................................................................. 864
46 Simple Network Management Protocol (SNMP)..................................... 866
Protocol Overview............................................................................................................................866
Implementation Information............................................................................................................866
SNMPv3 Compliance With FIPS....................................................................................................... 866
Configuration Task List for SNMP....................................................................................................868
Related Configuration Tasks...................................................................................................... 868
Important Points to Remember.......................................................................................................868
Set up SNMP..................................................................................................................................... 868
Creating a Community...............................................................................................................869
Setting Up User-Based Security (SNMPv3)................................................................................ 869
Reading Managed Object Values......................................................................................................871
Writing Managed Object Values....................................................................................................... 871
Configuring Contact and Location Information using SNMP.........................................................872
Subscribing to Managed Object Value Updates using SNMP......................................................... 873
Enabling a Subset of SNMP Traps.................................................................................................... 874
Enabling an SNMP Agent to Notify Syslog Server Failure............................................................... 876
Copy Configuration Files Using SNMP.............................................................................................877
Copying a Configuration File......................................................................................................879
Copying Configuration Files via SNMP......................................................................................880
Copying the Startup-Config Files to the Running-Config........................................................880
Copying the Startup-Config Files to the Server via FTP............................................................881
Copying the Startup-Config Files to the Server via TFTP..........................................................881
Copy a Binary File to the Startup-Configuration.......................................................................882
Additional MIB Objects to View Copy Statistics........................................................................ 882
Obtaining a Value for MIB Objects.............................................................................................883
MIB Support to Display the Available Memory Size on Flash......................................................... 884
27
Viewing the Available Flash Memory Size..................................................................................884
MIB Support to Display the Software Core Files Generated by the System.................................. 884
Viewing the Software Core Files Generated by the System......................................................885
Manage VLANs using SNMP............................................................................................................. 885
Creating a VLAN..........................................................................................................................886
Assigning a VLAN Alias................................................................................................................886
Displaying the Ports in a VLAN...................................................................................................886
Add Tagged and Untagged Ports to a VLAN............................................................................. 886
Managing Overload on Startup........................................................................................................ 887
Enabling and Disabling a Port using SNMP..................................................................................... 888
Fetch Dynamic MAC Entries using SNMP........................................................................................889
Deriving Interface Indices................................................................................................................ 890
Monitor Port-Channels.....................................................................................................................891
Troubleshooting SNMP Operation.................................................................................................. 892
47 Storm Control.................................................................................................894
Configure Storm Control................................................................................................................. 894
Configuring Storm Control from INTERFACE Mode.................................................................894
Configuring Storm Control from CONFIGURATION Mode......................................................894
48 Spanning Tree Protocol (STP)..................................................................... 895
Protocol Overview............................................................................................................................895
Configure Spanning Tree................................................................................................................. 895
Related Configuration Tasks...................................................................................................... 895
Important Points to Remember.......................................................................................................896
Configuring Interfaces for Layer 2 Mode.........................................................................................897
Enabling Spanning Tree Protocol Globally......................................................................................898
Adding an Interface to the Spanning Tree Group...........................................................................900
Modifying Global Parameters........................................................................................................... 901
Modifying Interface STP Parameters................................................................................................902
Enabling PortFast..............................................................................................................................903
Prevent Network Disruptions with BPDU Guard.......................................................................903
Selecting STP Root........................................................................................................................... 906
STP Root Guard................................................................................................................................ 906
Root Guard Scenario.................................................................................................................. 907
Configuring Root Guard.............................................................................................................908
Enabling SNMP Traps for Root Elections and Topology Changes.................................................908
Configuring Spanning Trees as Hitless............................................................................................909
STP Loop Guard................................................................................................................................909
Configuring Loop Guard.............................................................................................................910
Displaying STP Guard Configuration................................................................................................ 911
28
49 System Time and Date...................................................................................913
Network Time Protocol.................................................................................................................... 913
Protocol Overview...................................................................................................................... 914
Configure the Network Time Protocol.......................................................................................915
Enabling NTP............................................................................................................................... 915
Configuring NTP Broadcasts.......................................................................................................915
Disabling NTP on an Interface....................................................................................................916
Configuring a Source IP Address for NTP Packets.................................................................... 916
Configuring NTP Authentication.................................................................................................917
Dell Networking OS Time and Date.................................................................................................920
Configuration Task List ..............................................................................................................920
Setting the Time and Date for the Switch Software Clock....................................................... 920
Setting the Timezone................................................................................................................. 920
Set Daylight Saving Time.............................................................................................................921
Setting Daylight Saving Time Once............................................................................................ 921
Setting Recurring Daylight Saving Time.....................................................................................922
50 Tunneling........................................................................................................ 924
Configuring a Tunnel........................................................................................................................924
Configuring Tunnel Keepalive Settings............................................................................................925
Configuring a Tunnel Interface........................................................................................................926
Configuring Tunnel Allow-Remote Decapsulation.........................................................................926
Configuring Tunnel source anylocal Decapsulation.......................................................................927
Guidelines for Configuring Multipoint Receive-Only Tunnels........................................................927
Multipoint Receive-Only Type and IP Unnumbered Interfaces for Tunnels..................................928
51 Upgrade Procedures......................................................................................929
Get Help with Upgrades................................................................................................................... 929
52 Virtual LANs (VLANs)......................................................................................930
Default VLAN.....................................................................................................................................930
Port-Based VLANs.............................................................................................................................931
VLANs and Port Tagging...................................................................................................................932
Configuration Task List.....................................................................................................................932
Creating a Port-Based VLAN...................................................................................................... 932
Assigning Interfaces to a VLAN...................................................................................................933
Moving Untagged Interfaces...................................................................................................... 935
Assigning an IP Address to a VLAN.............................................................................................936
Configuring Native VLANs................................................................................................................936
Enabling Null VLAN as the Default VLAN......................................................................................... 937
29
53 VLT Proxy Gateway........................................................................................938
Proxy Gateway in VLT Domains.......................................................................................................938
Guidelines for Enabling the VLT Proxy Gateway....................................................................... 939
Enabling the VLT Proxy Gateway...............................................................................................940
LLDP Organizational TLV for Proxy Gateway............................................................................940
Sample Configuration for a VLT Proxy Gateway....................................................................... 942
Configuring a Static VLT Proxy Gateway.........................................................................................943
Configuring an LLDP VLT Proxy Gateway....................................................................................... 943
54 Virtual Link Trunking (VLT).......................................................................... 945
Overview........................................................................................................................................... 945
VLT on Core Switches................................................................................................................ 946
Enhanced VLT.............................................................................................................................946
VLT Terminology...............................................................................................................................947
Configure Virtual Link Trunking....................................................................................................... 948
Important Points to Remember................................................................................................. 948
Configuration Notes...................................................................................................................949
Primary and Secondary VLT Peers............................................................................................. 953
RSTP and VLT.............................................................................................................................. 953
VLT Bandwidth Monitoring.........................................................................................................953
VLT and IGMP Snooping.............................................................................................................954
VLT IPv6.......................................................................................................................................954
VLT Port Delayed Restoration.................................................................................................... 954
PIM-Sparse Mode Support on VLT.............................................................................................955
VLT Routing ................................................................................................................................956
Non-VLT ARP Sync..................................................................................................................... 959
RSTP Configuration.......................................................................................................................... 959
Preventing Forwarding Loops in a VLT Domain........................................................................959
Sample RSTP Configuration.......................................................................................................960
Configuring VLT..........................................................................................................................960
PVST+ Configuration........................................................................................................................ 972
Sample PVST+ Configuration.....................................................................................................972
eVLT Configuration Example............................................................................................................973
eVLT Configuration Step Examples............................................................................................973
PIM-Sparse Mode Configuration Example.......................................................................................975
Verifying a VLT Configuration.......................................................................................................... 976
Additional VLT Sample Configurations............................................................................................980
Configuring Virtual Link Trunking (VLT Peer 1)Configuring Virtual Link Trunking (VLT Peer
2)Verifying a Port-Channel Connection to a VLT Domain (From an Attached Access
Switch).........................................................................................................................................980
Troubleshooting VLT........................................................................................................................982
30