Dell Z9000 Configuration Manual

Dell Configuration Guide for the Z9000 System
9.7(0.0)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2015 - 02
Rev. A00
Contents
1 About this Guide..................................................................................................31
Audience.............................................................................................................................................. 31
Conventions.........................................................................................................................................31
Related Documents.............................................................................................................................31
2 Configuration Fundamentals........................................................................... 32
Accessing the Command Line............................................................................................................32
CLI Modes............................................................................................................................................32
Navigating CLI Modes................................................................................................................... 34
The do Command............................................................................................................................... 37
Undoing Commands...........................................................................................................................38
Obtaining Help.................................................................................................................................... 39
Entering and Editing Commands....................................................................................................... 39
Command History.............................................................................................................................. 40
Filtering show Command Outputs.....................................................................................................40
Multiple Users in Configuration Mode............................................................................................... 42
3 Getting Started....................................................................................................43
Console Access...................................................................................................................................43
Serial Console................................................................................................................................43
Accessing the CLI Interface and Running Scripts Using SSH............................................................44
Entering CLI commands Using an SSH Connection....................................................................45
Executing Local CLI Scripts Using an SSH Connection...............................................................45
Default Configuration......................................................................................................................... 46
Configuring a Host Name...................................................................................................................46
Accessing the System Remotely........................................................................................................ 46
Accessing the System Remotely...................................................................................................46
Configure the Management Port IP Address............................................................................... 46
Configure a Management Route.................................................................................................. 47
Configuring a Username and Password.......................................................................................47
Configuring the Enable Password...................................................................................................... 47
Configuration File Management.........................................................................................................48
Copy Files to and from the System.............................................................................................. 48
Mounting an NFS File System....................................................................................................... 49
Save the Running-Configuration.................................................................................................. 51
Configure the Overload Bit for a Startup Scenario...................................................................... 51
Viewing Files...................................................................................................................................51
Managing the File System................................................................................................................... 53
Enabling Software Features on Devices Using a Command Option................................................ 54
View Command History......................................................................................................................55
Upgrading Dell Networking OS.......................................................................................................... 55
Using HTTP for File Transfers............................................................................................................. 55
Using Hashes to Validate Software Images........................................................................................55
4 Management........................................................................................................57
Configuring Privilege Levels................................................................................................................57
Creating a Custom Privilege Level................................................................................................57
Removing a Command from EXEC Mode....................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 58
Allowing Access to CONFIGURATION Mode Commands.......................................................... 58
Allowing Access to the Following Modes.................................................................................... 58
Applying a Privilege Level to a Username.................................................................................... 60
Applying a Privilege Level to a Terminal Line...............................................................................60
Configuring Logging...........................................................................................................................60
Audit and Security Logs.................................................................................................................61
Configuring Logging Format ...................................................................................................... 63
Setting Up a Secure Connection to a Syslog Server....................................................................63
Log Messages in the Internal Buffer...................................................................................................64
Configuration Task List for System Log Management................................................................ 64
Disabling System Logging.................................................................................................................. 64
Sending System Messages to a Syslog Server....................................................................................65
Configuring a UNIX System as a Syslog Server............................................................................65
Changing System Logging Settings....................................................................................................65
Display the Logging Buffer and the Logging Configuration............................................................. 66
Configuring a UNIX Logging Facility Level.........................................................................................67
Synchronizing Log Messages............................................................................................................. 68
Enabling Timestamp on Syslog Messages......................................................................................... 68
File Transfer Services.......................................................................................................................... 69
Configuration Task List for File Transfer Services........................................................................69
Enabling the FTP Server................................................................................................................ 69
Configuring FTP Server Parameters............................................................................................. 70
Configuring FTP Client Parameters..............................................................................................70
Terminal Lines......................................................................................................................................71
Denying and Permitting Access to a Terminal Line......................................................................71
Configuring Login Authentication for Terminal Lines..................................................................71
Setting Time Out of EXEC Privilege Mode..........................................................................................72
Using Telnet to get to Another Network Device................................................................................73
Lock CONFIGURATION Mode............................................................................................................74
Viewing the Configuration Lock Status........................................................................................ 74
Recovering from a Forgotten Password on the Z9000 System........................................................75
Recovering from a Forgotten Enable Password on the Z9000.................................................. 76
Recovering from a Failed Start on the Z9000 System.......................................................................77
Restoring the Factory Default Settings...............................................................................................78
Important Points to Remember....................................................................................................78
Restoring Factory Default Environment Variables....................................................................... 78
5 802.1X................................................................................................................... 81
The Port-Authentication Process.......................................................................................................82
EAP over RADIUS...........................................................................................................................84
Configuring 802.1X............................................................................................................................. 84
Related Configuration Tasks.........................................................................................................84
Important Points to Remember..........................................................................................................85
Enabling 802.1X...................................................................................................................................85
Configuring Request Identity Re-Transmissions............................................................................... 87
Configuring a Quiet Period after a Failed Authentication........................................................... 87
Forcibly Authorizing or Unauthorizing a Port....................................................................................88
Re-Authenticating a Port....................................................................................................................89
Configuring Timeouts.........................................................................................................................90
Configuring Dynamic VLAN Assignment with Port Authentication.................................................. 91
Guest and Authentication-Fail VLANs................................................................................................92
Configuring a Guest VLAN............................................................................................................93
Configuring an Authentication-Fail VLAN....................................................................................93
6 Access Control Lists (ACLs)...............................................................................95
IP Access Control Lists (ACLs)............................................................................................................ 95
CAM Usage....................................................................................................................................96
Implementing ACLs on Dell Networking OS................................................................................97
IP Fragment Handling......................................................................................................................... 98
IP Fragments ACL Examples......................................................................................................... 98
Layer 4 ACL Rules Examples.........................................................................................................99
Configure a Standard IP ACL............................................................................................................100
Configuring a Standard IP ACL Filter.......................................................................................... 101
Configure an Extended IP ACL......................................................................................................... 102
Configuring Filters with a Sequence Number............................................................................102
Configuring Filters Without a Sequence Number......................................................................103
Configure Layer 2 and Layer 3 ACLs................................................................................................104
Assign an IP ACL to an Interface...................................................................................................... 105
Applying an IP ACL............................................................................................................................105
Counting ACL Hits.......................................................................................................................106
Configure Ingress ACLs.................................................................................................................... 106
Configure Egress ACLs......................................................................................................................107
Applying Egress Layer 3 ACLs (Control-Plane).......................................................................... 108
IP Prefix Lists......................................................................................................................................109
Implementation Information...................................................................................................... 109
Configuration Task List for Prefix Lists....................................................................................... 109
ACL Resequencing.............................................................................................................................113
Resequencing an ACL or Prefix List............................................................................................ 114
Route Maps........................................................................................................................................ 115
Implementation Information.......................................................................................................116
Important Points to Remember........................................................................................................ 116
Configuration Task List for Route Maps......................................................................................116
Configuring Match Routes.......................................................................................................... 118
Configuring Set Conditions........................................................................................................ 120
Configure a Route Map for Route Redistribution.......................................................................121
Configure a Route Map for Route Tagging................................................................................ 122
Continue Clause..........................................................................................................................122
Logging of ACL Processes................................................................................................................ 122
Guidelines for Configuring ACL Logging......................................................................................... 123
Configuring ACL Logging................................................................................................................. 124
Flow-Based Monitoring Support for ACLs....................................................................................... 125
Behavior of Flow-Based Monitoring...........................................................................................125
Enabling Flow-Based Monitoring..................................................................................................... 127
7 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)......................................................................................................129
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................... 129
Guidelines for Configuring ACL VLAN groups.................................................................................130
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.........................131
Configuring ACL VLAN Groups................................................................................................... 131
Configuring FP Blocks for VLAN Parameters............................................................................. 132
Viewing CAM Usage.......................................................................................................................... 133
Allocating FP Blocks for VLAN Processes.........................................................................................134
8 Bidirectional Forwarding Detection (BFD)...................................................136
How BFD Works................................................................................................................................ 136
BFD Packet Format......................................................................................................................137
BFD Sessions................................................................................................................................139
BFD Three-Way Handshake........................................................................................................139
Session State Changes................................................................................................................140
Important Points to Remember........................................................................................................ 141
Configure BFD................................................................................................................................... 141
Configure BFD for Physical Ports............................................................................................... 142
Configure BFD for Static Routes.................................................................................................145
Configure BFD for OSPF..............................................................................................................147
Configure BFD for OSPFv3......................................................................................................... 150
Configure BFD for IS-IS............................................................................................................... 151
Configure BFD for BGP............................................................................................................... 154
Configure BFD for VRRP..............................................................................................................161
Configuring Protocol Liveness................................................................................................... 164
Troubleshooting BFD..................................................................................................................164
9 Border Gateway Protocol IPv4 (BGPv4).......................................................166
Autonomous Systems (AS)................................................................................................................166
Sessions and Peers............................................................................................................................168
Establish a Session.......................................................................................................................169
Route Reflectors................................................................................................................................169
BGP Attributes................................................................................................................................... 170
Best Path Selection Criteria......................................................................................................... 171
Weight.......................................................................................................................................... 173
Local Preference..........................................................................................................................173
Multi-Exit Discriminators (MEDs)................................................................................................ 174
Origin............................................................................................................................................175
AS Path......................................................................................................................................... 176
Next Hop......................................................................................................................................176
Multiprotocol BGP............................................................................................................................. 177
Implement BGP with Dell Networking OS........................................................................................177
Additional Path (Add-Path) Support............................................................................................177
Advertise IGP Cost as MED for Redistributed Routes.................................................................177
Ignore Router-ID for Some Best-Path Calculations..................................................................178
Four-Byte AS Numbers................................................................................................................178
AS4 Number Representation.......................................................................................................179
AS Number Migration..................................................................................................................180
BGP4 Management Information Base (MIB).............................................................................. 182
Important Points to Remember..................................................................................................182
Configuration Information................................................................................................................183
BGP Configuration............................................................................................................................ 183
Enabling BGP...............................................................................................................................184
Configuring AS4 Number Representations................................................................................188
Configuring Peer Groups............................................................................................................190
Configuring BGP Fast Fall-Over..................................................................................................192
Configuring Passive Peering....................................................................................................... 194
Maintaining Existing AS Numbers During an AS Migration........................................................195
Allowing an AS Number to Appear in its Own AS Path..............................................................196
Enabling Graceful Restart............................................................................................................197
Enabling Neighbor Graceful Restart...........................................................................................198
Filtering on an AS-Path Attribute................................................................................................198
Regular Expressions as Filters.................................................................................................... 200
Redistributing Routes..................................................................................................................201
Enabling Additional Paths...........................................................................................................202
Configuring IP Community Lists................................................................................................ 202
Configuring an IP Extended Community List............................................................................ 204
Filtering Routes with Community Lists...................................................................................... 205
Manipulating the COMMUNITY Attribute.................................................................................. 205
Changing MED Attributes........................................................................................................... 207
Changing the LOCAL_PREFERENCE Attribute.......................................................................... 207
Changing the NEXT_HOP Attribute...........................................................................................208
Changing the WEIGHT Attribute................................................................................................209
Enabling Multipath......................................................................................................................209
Filtering BGP Routes...................................................................................................................209
Filtering BGP Routes Using Route Maps.....................................................................................211
Filtering BGP Routes Using AS-PATH Information.................................................................... 212
Configuring BGP Route Reflectors.............................................................................................212
Aggregating Routes.....................................................................................................................213
Configuring BGP Confederations...............................................................................................214
Enabling Route Flap Dampening................................................................................................ 214
Changing BGP Timers................................................................................................................. 217
Enabling BGP Neighbor Soft-Reconfiguration...........................................................................217
Route Map Continue...................................................................................................................219
Enabling MBGP Configurations........................................................................................................ 219
BGP Regular Expression Optimization.............................................................................................220
Debugging BGP................................................................................................................................ 220
Storing Last and Bad PDUs..........................................................................................................221
Capturing PDUs...........................................................................................................................222
PDU Counters............................................................................................................................. 223
Sample Configurations..................................................................................................................... 223
10 Content Addressable Memory (CAM).........................................................230
CAM Allocation................................................................................................................................. 230
Test CAM Usage................................................................................................................................232
View CAM Profiles.............................................................................................................................232
View CAM-ACL Settings................................................................................................................... 233
View CAM Usage...............................................................................................................................235
CAM Optimization.............................................................................................................................235
Troubleshoot CAM Profiling.............................................................................................................236
CAM Profile Mismatches.............................................................................................................236
QoS CAM Region Limitation.......................................................................................................236
11 Control Plane Policing (CoPP)......................................................................237
Configure Control Plane Policing.................................................................................................... 238
Configuring CoPP for Protocols................................................................................................ 239
Configuring CoPP for CPU Queues........................................................................................... 241
CoPP for OSPFv3 Packets...........................................................................................................242
Configuring CoPP for OSPFv3....................................................................................................245
Show Commands....................................................................................................................... 246
12 Dynamic Host Configuration Protocol (DHCP)........................................248
DHCP Packet Format and Options.................................................................................................. 248
Assign an IP Address using DHCP....................................................................................................250
Implementation Information............................................................................................................ 251
Configure the System to be a DHCP Server.................................................................................... 252
Configuring the Server for Automatic Address Allocation........................................................ 252
Specifying a Default Gateway.....................................................................................................254
Configure a Method of Hostname Resolution.......................................................................... 254
Using DNS for Address Resolution.............................................................................................254
Using NetBIOS WINS for Address Resolution............................................................................ 254
Creating Manual Binding Entries................................................................................................ 254
Debugging the DHCP Server......................................................................................................255
Using DHCP Clear Commands...................................................................................................255
Configure the System to be a Relay Agent......................................................................................255
Configure the System to be a DHCP Client.....................................................................................257
DHCP Client on a Management Interface................................................................................. 258
DHCP Client Operation with Other Features............................................................................ 258
Configure the System for User Port Stacking (Option 230)............................................................259
Configure Secure DHCP...................................................................................................................259
Option 82....................................................................................................................................260
DHCP Snooping..........................................................................................................................260
Drop DHCP Packets on Snooped VLANs Only..........................................................................264
Dynamic ARP Inspection............................................................................................................ 264
Configuring Dynamic ARP Inspection........................................................................................265
Source Address Validation................................................................................................................266
Enabling IP Source Address Validation.......................................................................................267
DHCP MAC Source Address Validation......................................................................................267
Enabling IP+MAC Source Address Validation............................................................................ 267
Viewing the Number of SAV Dropped Packets..........................................................................268
Clearing the Number of SAV Dropped Packets.........................................................................269
13 Equal Cost Multi-Path (ECMP)..................................................................... 270
ECMP for Flow-Based Affinity.......................................................................................................... 270
Configuring the Hash Algorithm................................................................................................ 270
Enabling Deterministic ECMP Next Hop....................................................................................270
Configuring the Hash Algorithm Seed........................................................................................271
Link Bundle Monitoring..................................................................................................................... 271
Managing ECMP Group Paths.................................................................................................... 272
Creating an ECMP Group Bundle...............................................................................................272
Modifying the ECMP Group Threshold...................................................................................... 273
14 Enabling FIPS Cryptography........................................................................ 274
Configuration Tasks..........................................................................................................................274
Preparing the System........................................................................................................................274
Enabling FIPS Mode.......................................................................................................................... 275
Generating Host-Keys.......................................................................................................................275
Monitoring FIPS Mode Status........................................................................................................... 276
Disabling FIPS Mode......................................................................................................................... 276
15 Force10 Resilient Ring Protocol (FRRP)..................................................... 278
Protocol Overview............................................................................................................................ 278
Ring Status...................................................................................................................................279
Multiple FRRP Rings....................................................................................................................280
Important FRRP Points............................................................................................................... 280
Important FRRP Concepts..........................................................................................................280
Implementing FRRP.......................................................................................................................... 282
FRRP Configuration.......................................................................................................................... 282
Creating the FRRP Group........................................................................................................... 282
Configuring the Control VLAN................................................................................................... 283
Configuring and Adding the Member VLANs............................................................................ 284
Setting the FRRP Timers............................................................................................................. 285
Clearing the FRRP Counters.......................................................................................................285
Viewing the FRRP Configuration................................................................................................286
Viewing the FRRP Information................................................................................................... 286
Troubleshooting FRRP......................................................................................................................286
Configuration Checks.................................................................................................................286
Sample Configuration and Topology.............................................................................................. 286
16 GARP VLAN Registration Protocol (GVRP)................................................289
Important Points to Remember....................................................................................................... 289
Configure GVRP................................................................................................................................290
Related Configuration Tasks...................................................................................................... 290
Enabling GVRP Globally....................................................................................................................291
Enabling GVRP on a Layer 2 Interface..............................................................................................291
Configure GVRP Registration........................................................................................................... 291
Configure a GARP Timer.................................................................................................................. 292
17 Internet Group Management Protocol (IGMP).........................................294
IGMP Implementation Information..................................................................................................294
IGMP Protocol Overview..................................................................................................................294
IGMP Version 2............................................................................................................................294
IGMP Version 3............................................................................................................................296
Configure IGMP................................................................................................................................ 299
Related Configuration Tasks...................................................................................................... 299
Viewing IGMP Enabled Interfaces....................................................................................................300
Selecting an IGMP Version...............................................................................................................300
Viewing IGMP Groups.......................................................................................................................301
Adjusting Timers................................................................................................................................301
Adjusting Query and Response Timers...................................................................................... 301
Adjusting the IGMP Querier Timeout Value...............................................................................302
Configuring a Static IGMP Group.................................................................................................... 302
Enabling IGMP Immediate-Leave.................................................................................................... 303
IGMP Snooping.................................................................................................................................303
IGMP Snooping Implementation Information...........................................................................303
Configuring IGMP Snooping...................................................................................................... 303
Removing a Group-Port Association.........................................................................................304
Disabling Multicast Flooding...................................................................................................... 304
Specifying a Port as Connected to a Multicast Router..............................................................305
Configuring the Switch as Querier.............................................................................................305
Fast Convergence after MSTP Topology Changes......................................................................... 306
Egress Interface Selection (EIS) for HTTP and IGMP Applications................................................. 306
Protocol Separation.................................................................................................................... 307
Enabling and Disabling Management Egress Interface Selection............................................ 308
Handling of Management Route Configuration........................................................................309
Handling of Switch-Initiated Traffic...........................................................................................309
Handling of Switch-Destined Traffic..........................................................................................310
Handling of Transit Traffic (Traffic Separation)...........................................................................311
Mapping of Management Applications and Traffic Type........................................................... 311
Behavior of Various Applications for Switch-Initiated Traffic ...................................................312
Behavior of Various Applications for Switch-Destined Traffic ................................................. 313
Interworking of EIS With Various Applications...........................................................................314
Designating a Multicast Router Interface......................................................................................... 315
18 Interfaces......................................................................................................... 316
Basic Interface Configuration...........................................................................................................316
Advanced Interface Configuration................................................................................................... 316
Interface Types.................................................................................................................................. 317
View Basic Interface Information......................................................................................................317
Enabling a Physical Interface............................................................................................................ 319
Physical Interfaces.............................................................................................................................319
Configuration Task List for Physical Interfaces..........................................................................320
Overview of Layer Modes...........................................................................................................320
Configuring Layer 2 (Data Link) Mode....................................................................................... 320
Configuring Layer 2 (Interface) Mode.........................................................................................321
Configuring Layer 3 (Network) Mode......................................................................................... 321
Configuring Layer 3 (Interface) Mode........................................................................................ 322
Egress Interface Selection (EIS)........................................................................................................ 322
Important Points to Remember..................................................................................................323
Configuring EIS........................................................................................................................... 323
Management Interfaces....................................................................................................................323
Configuring Management Interfaces......................................................................................... 323
Configuring Management Interfaces on the S-Series...............................................................324
VLAN Interfaces.................................................................................................................................325
Loopback Interfaces......................................................................................................................... 325
Null Interfaces...................................................................................................................................326
Port Channel Interfaces....................................................................................................................326
Port Channel Definition and Standards......................................................................................326
Port Channel Benefits................................................................................................................. 327
Port Channel Implementation.................................................................................................... 327
10/100/1000 Mbps Interfaces in Port Channels........................................................................328
Configuration Tasks for Port Channel Interfaces...................................................................... 328
Creating a Port Channel............................................................................................................. 328
Adding a Physical Interface to a Port Channel.......................................................................... 329
Reassigning an Interface to a New Port Channel...................................................................... 331
Configuring the Minimum Oper Up Links in a Port Channel.................................................... 332
..................................................................................................................................................... 332
Assigning an IP Address to a Port Channel................................................................................ 333
Deleting or Disabling a Port Channel.........................................................................................333
Load Balancing Through Port Channels.................................................................................... 333
Load-Balancing Method............................................................................................................. 333
Changing the Hash Algorithm....................................................................................................334
Bulk Configuration............................................................................................................................335
Interface Range........................................................................................................................... 335
Bulk Configuration Examples..................................................................................................... 336
Defining Interface Range Macros.....................................................................................................337
Define the Interface Range.........................................................................................................338
Choosing an Interface-Range Macro........................................................................................ 338
Monitoring and Maintaining Interfaces............................................................................................338
Maintenance Using TDR............................................................................................................. 339
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 340
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................340
Important Points to Remember..................................................................................................341
Support for LM4 Optics.............................................................................................................. 342
Example Scenarios......................................................................................................................342
Link Dampening................................................................................................................................346
Important Points to Remember................................................................................................. 346
Enabling Link Dampening...........................................................................................................346
Link Bundle Monitoring.................................................................................................................... 348
Using Ethernet Pause Frames for Flow Control.............................................................................. 348
Enabling Pause Frames...............................................................................................................349
Configure the MTU Size on an Interface......................................................................................... 349
Port-Pipes......................................................................................................................................... 350
Auto-Negotiation on Ethernet Interfaces........................................................................................ 351
Setting the Speed and Duplex Mode of Ethernet Interfaces..................................................... 351
Set Auto-Negotiation Options....................................................................................................353
View Advanced Interface Information............................................................................................. 354
Configuring the Interface Sampling Size................................................................................... 354
Dynamic Counters............................................................................................................................356
Clearing Interface Counters....................................................................................................... 356
Enhanced Validation of Interface Ranges........................................................................................ 357
19 Internet Protocol Security (IPSec)...............................................................358
Configuring IPSec ............................................................................................................................ 359
20 IPv4 Routing................................................................................................... 360
IP Addresses......................................................................................................................................360
Implementation Information......................................................................................................360
Configuration Tasks for IP Addresses.............................................................................................. 360
Assigning IP Addresses to an Interface.............................................................................................361
Configuring Static Routes.................................................................................................................362
Configure Static Routes for the Management Interface.................................................................364
IPv4 Path MTU Discovery Overview.................................................................................................364
Using the Configured Source IP Address in ICMP Messages..........................................................365
Configuring the ICMP Source Interface.....................................................................................365
Configuring the Duration to Establish a TCP Connection..............................................................366
Enabling Directed Broadcast............................................................................................................366
Resolution of Host Names................................................................................................................367
Enabling Dynamic Resolution of Host Names.................................................................................367
Specifying the Local System Domain and a List of Domains..........................................................368
Configuring DNS with Traceroute................................................................................................... 368
ARP.................................................................................................................................................... 369
Configuration Tasks for ARP............................................................................................................ 369
Configuring Static ARP Entries......................................................................................................... 370
Enabling Proxy ARP...........................................................................................................................370
Clearing ARP Cache..........................................................................................................................370
ARP Learning via Gratuitous ARP......................................................................................................371
Enabling ARP Learning via Gratuitous ARP.......................................................................................371
ARP Learning via ARP Request..........................................................................................................372
Configuring ARP Retries....................................................................................................................372
ICMP.................................................................................................................................................. 373
Configuration Tasks for ICMP...........................................................................................................373
Enabling ICMP Unreachable Messages............................................................................................373
UDP Helper........................................................................................................................................374
Configure UDP Helper................................................................................................................ 374
Important Points to Remember..................................................................................................374
Enabling UDP Helper........................................................................................................................ 374
Configuring a Broadcast Address.....................................................................................................375
Configurations Using UDP Helper....................................................................................................375
UDP Helper with Broadcast-All Addresses...................................................................................... 376
UDP Helper with Subnet Broadcast Addresses................................................................................376
UDP Helper with Configured Broadcast Addresses.........................................................................377
UDP Helper with No Configured Broadcast Addresses.................................................................. 378
Troubleshooting UDP Helper...........................................................................................................378
21 IPv6 Routing.................................................................................................... 379
Protocol Overview............................................................................................................................ 379
Extended Address Space.............................................................................................................379
Stateless Autoconfiguration........................................................................................................379
IPv6 Headers............................................................................................................................... 380
IPv6 Header Fields.......................................................................................................................381
Extension Header Fields..............................................................................................................382
Addressing...................................................................................................................................383
Implementing IPv6 with Dell Networking OS..................................................................................385
ICMPv6.............................................................................................................................................. 387
Path MTU Discovery..........................................................................................................................387
IPv6 Neighbor Discovery..................................................................................................................388
IPv6 Neighbor Discovery of MTU Packets.................................................................................389
Configuration Task List for IPv6 RDNSS.......................................................................................... 389
Configuring the IPv6 Recursive DNS Server.............................................................................. 389
Debugging IPv6 RDNSS Information Sent to the Host ............................................................ 390
Displaying IPv6 RDNSS Information........................................................................................... 391
Secure Shell (SSH) Over an IPv6 Transport...................................................................................... 391
Configuration Tasks for IPv6............................................................................................................ 392
Adjusting Your CAM-Profile........................................................................................................392
Assigning an IPv6 Address to an Interface.................................................................................393
Assigning a Static IPv6 Route..................................................................................................... 393
Configuring Telnet with IPv6......................................................................................................394
SNMP over IPv6...........................................................................................................................394
Showing IPv6 Information..........................................................................................................394
Showing an IPv6 Interface..........................................................................................................395
Showing IPv6 Routes..................................................................................................................396
Showing the Running-Configuration for an Interface.............................................................. 397
Clearing IPv6 Routes...................................................................................................................397
Configuring IPv6 RA Guard.............................................................................................................. 398
Configuring IPv6 RA Guard on an Interface..............................................................................400
Monitoring IPv6 RA Guard..........................................................................................................400
22 Intermediate System to Intermediate System.......................................... 401
IS-IS Protocol Overview................................................................................................................... 401
IS-IS Addressing................................................................................................................................ 401
Multi-Topology IS-IS........................................................................................................................ 402
Transition Mode..........................................................................................................................403
Interface Support........................................................................................................................403
Adjacencies................................................................................................................................. 403
Graceful Restart................................................................................................................................403
Timers..........................................................................................................................................404
Implementation Information........................................................................................................... 404
Configuration Information............................................................................................................... 405
Configuration Tasks for IS-IS..................................................................................................... 405
Configuring the Distance of a Route..........................................................................................414
Changing the IS-Type................................................................................................................. 414
Redistributing IPv4 Routes.......................................................................................................... 417
Redistributing IPv6 Routes..........................................................................................................418
Configuring Authentication Passwords......................................................................................418
Setting the Overload Bit..............................................................................................................419
Debugging IS-IS..........................................................................................................................420
IS-IS Metric Styles..............................................................................................................................421
Configure Metric Values................................................................................................................... 421
Maximum Values in the Routing Table...................................................................................... 422
Change the IS-IS Metric Style in One Level Only...................................................................... 422
Leaks from One Level to Another.............................................................................................. 423
Sample Configurations.....................................................................................................................424
23 Link Aggregation Control Protocol (LACP)...............................................427
Introduction to Dynamic LAGs and LACP........................................................................................427
Important Points to Remember..................................................................................................427
LACP Modes................................................................................................................................428
Configuring LACP Commands...................................................................................................428
LACP Configuration Tasks................................................................................................................429
Creating a LAG............................................................................................................................ 429
Configuring the LAG Interfaces as Dynamic............................................................................. 430
Setting the LACP Long Timeout.................................................................................................430
Monitoring and Debugging LACP...............................................................................................431
Shared LAG State Tracking............................................................................................................... 431
Configuring Shared LAG State Tracking.................................................................................... 432
Important Points about Shared LAG State Tracking..................................................................433
LACP Basic Configuration Example................................................................................................. 434
Configure a LAG on ALPHA........................................................................................................434
Setting Up a Threshold for Utilization of High-Gigabit Port Channels...........................................441
Guidelines for Monitoring High-Gigabit Port Channels............................................................443
Enabling the Verification of Member Links Utilization in a High-Gigabit Port Channel................444
Viewing Buffer Utilization and Queue Statistics on High-Gigabit Ethernet Backplane Ports....... 444
24 Layer 2..............................................................................................................446
Manage the MAC Address Table......................................................................................................446
Clearing the MAC Address Table............................................................................................... 446
Setting the Aging Time for Dynamic Entries..............................................................................446
Configuring a Static MAC Address............................................................................................. 447
Displaying the MAC Address Table.............................................................................................447
MAC Learning Limit...........................................................................................................................447
Setting the MAC Learning Limit................................................................................................. 448
mac learning-limit Dynamic.......................................................................................................448
mac learning-limit mac-address-sticky.................................................................................... 449
mac learning-limit station-move...............................................................................................449
mac learning-limit no-station-move.........................................................................................449
Learning Limit Violation Actions................................................................................................ 450
Setting Station Move Violation Actions......................................................................................450
Recovering from Learning Limit and Station Move Violations.................................................. 451
NIC Teaming......................................................................................................................................451
Configure Redundant Pairs.............................................................................................................. 452
Important Points about Configuring Redundant Pairs..............................................................454
Far-End Failure Detection................................................................................................................ 455
FEFD State Changes....................................................................................................................456
Configuring FEFD........................................................................................................................ 457
Enabling FEFD on an Interface...................................................................................................458
Debugging FEFD......................................................................................................................... 459
25 Link Layer Discovery Protocol (LLDP)........................................................ 461
802.1AB (LLDP) Overview................................................................................................................. 461
Protocol Data Units.....................................................................................................................461
Optional TLVs....................................................................................................................................462
Management TLVs...................................................................................................................... 462
TIA-1057 (LLDP-MED) Overview......................................................................................................464
TIA Organizationally Specific TLVs.............................................................................................465
Configure LLDP................................................................................................................................ 469
Related Configuration Tasks...................................................................................................... 469
Important Points to Remember................................................................................................. 470
LLDP Compatibility..................................................................................................................... 470
CONFIGURATION versus INTERFACE Configurations....................................................................470
Enabling LLDP....................................................................................................................................471
Disabling and Undoing LLDP...................................................................................................... 471
Enabling LLDP on Management Ports..............................................................................................471
Disabling and Undoing LLDP on Management Ports................................................................ 471
Advertising TLVs................................................................................................................................472
Viewing the LLDP Configuration......................................................................................................473
Viewing Information Advertised by Adjacent LLDP Agents.............................................................474
Configuring LLDPDU Intervals..........................................................................................................475
Configuring Transmit and Receive Mode........................................................................................ 475
Configuring a Time to Live............................................................................................................... 476
Debugging LLDP............................................................................................................................... 477
Relevant Management Objects........................................................................................................478
26 Microsoft Network Load Balancing........................................................... 484
NLB Unicast Mode Scenario............................................................................................................ 484
NLB Multicast Mode Scenario.......................................................................................................... 485
Limitations With Enabling NLB on Switches....................................................................................485
Benefits and Working of Microsoft Clustering................................................................................ 485
Enable and Disable VLAN Flooding .................................................................................................486
Configuring a Switch for NLB ......................................................................................................... 486
.....................................................................................................................................................486
27 Multicast Source Discovery Protocol (MSDP)...........................................487
Protocol Overview............................................................................................................................487
Anycast RP........................................................................................................................................ 489
Implementation Information............................................................................................................489
Configure Multicast Source Discovery Protocol.............................................................................489
Related Configuration Tasks...................................................................................................... 489
Enable MSDP.....................................................................................................................................493
Manage the Source-Active Cache...................................................................................................494
Viewing the Source-Active Cache............................................................................................. 494
Limiting the Source-Active Cache............................................................................................. 495
Clearing the Source-Active Cache.............................................................................................495
Enabling the Rejected Source-Active Cache.............................................................................495
Accept Source-Active Messages that Fail the RFP Check.............................................................. 495
Specifying Source-Active Messages................................................................................................ 499
Limiting the Source-Active Messages from a Peer......................................................................... 500
Preventing MSDP from Caching a Local Source.............................................................................500
Preventing MSDP from Caching a Remote Source.........................................................................501
Preventing MSDP from Advertising a Local Source........................................................................ 502
Logging Changes in Peership States................................................................................................503
Terminating a Peership.....................................................................................................................503
Clearing Peer Statistics..................................................................................................................... 503
Debugging MSDP............................................................................................................................. 504
MSDP with Anycast RP..................................................................................................................... 504
Configuring Anycast RP....................................................................................................................506
Reducing Source-Active Message Flooding..............................................................................506
Specifying the RP Address Used in SA Messages...................................................................... 506
MSDP Sample Configurations..........................................................................................................509
28 Multiple Spanning Tree Protocol (MSTP)...................................................513
Protocol Overview.............................................................................................................................513
Spanning Tree Variations.................................................................................................................. 514
Implementation Information...................................................................................................... 514
Configure Multiple Spanning Tree Protocol.................................................................................... 514
Related Configuration Tasks.......................................................................................................514
Enable Multiple Spanning Tree Globally...........................................................................................515
Adding and Removing Interfaces......................................................................................................515
Creating Multiple Spanning Tree Instances......................................................................................515
Influencing MSTP Root Selection..................................................................................................... 517
Interoperate with Non-Dell Networking OS Bridges.......................................................................517
Changing the Region Name or Revision..........................................................................................518
Modifying Global Parameters........................................................................................................... 518
Modifying the Interface Parameters................................................................................................. 519
Configuring an EdgePort..................................................................................................................520
Flush MAC Addresses after a Topology Change..............................................................................521
MSTP Sample Configurations........................................................................................................... 521
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration............................................................ 522
Debugging and Verifying MSTP Configurations.............................................................................. 525
29 Multicast Features..........................................................................................528
Enabling IP Multicast.........................................................................................................................528
Multicast with ECMP.........................................................................................................................528
Implementation Information............................................................................................................529
First Packet Forwarding for Lossless Multicast................................................................................530
Multicast Policies.............................................................................................................................. 530
IPv4 Multicast Policies................................................................................................................ 530
30 Object Tracking..............................................................................................538
Object Tracking Overview................................................................................................................538
Track Layer 2 Interfaces..............................................................................................................539
Track Layer 3 Interfaces..............................................................................................................539
Track IPv4 and IPv6 Routes........................................................................................................540
Set Tracking Delays..................................................................................................................... 541
VRRP Object Tracking................................................................................................................. 541
Object Tracking Configuration.........................................................................................................541
Tracking a Layer 2 Interface........................................................................................................541
Tracking a Layer 3 Interface....................................................................................................... 543
Track an IPv4/IPv6 Route........................................................................................................... 544
Displaying Tracked Objects..............................................................................................................548
31 Open Shortest Path First (OSPFv2 and OSPFv3).......................................550
Protocol Overview............................................................................................................................550
Autonomous System (AS) Areas................................................................................................. 550
Area Types....................................................................................................................................551
Networks and Neighbors............................................................................................................552
Router Types............................................................................................................................... 552
Designated and Backup Designated Routers............................................................................ 554
Link-State Advertisements (LSAs)............................................................................................... 554
Router Priority and Cost............................................................................................................. 556
OSPF with Dell Networking OS........................................................................................................ 556
Graceful Restart...........................................................................................................................557
Fast Convergence (OSPFv2, IPv4 Only)..................................................................................... 558
Multi-Process OSPFv2 (IPv4 only)..............................................................................................558
RFC-2328 Compliant OSPF Flooding........................................................................................ 559
OSPF ACK Packing......................................................................................................................560
Setting OSPF Adjacency with Cisco Routers.............................................................................560
Configuration Information................................................................................................................561
Configuration Task List for OSPFv2 (OSPF for IPv4).................................................................. 561
Sample Configurations for OSPFv2..................................................................................................576
Basic OSPFv2 Router Topology..................................................................................................576
OSPF Area 0 — Te 1/1 and 1/2.................................................................................................... 576
OSPF Area 0 — Te 3/1 and 3/2....................................................................................................577
OSPF Area 0 — Te 2/1 and 2/2....................................................................................................577
Configuration Task List for OSPFv3 (OSPF for IPv6)........................................................................577
Enabling IPv6 Unicast Routing....................................................................................................578
Assigning IPv6 Addresses on an Interface..................................................................................578
Assigning Area ID on an Interface.............................................................................................. 578
Assigning OSPFv3 Process ID and Router ID Globally...............................................................579
Configuring Stub Areas............................................................................................................... 579
Configuring Passive-Interface.................................................................................................... 579
Redistributing Routes................................................................................................................. 580
Configuring a Default Route...................................................................................................... 580
Enabling OSPFv3 Graceful Restart..............................................................................................581
OSPFv3 Authentication Using IPsec...........................................................................................583
Troubleshooting OSPFv3............................................................................................................590
32 Policy-based Routing (PBR)......................................................................... 592
Overview........................................................................................................................................... 592
Implementing Policy-based Routing with Dell Networking OS.....................................................594
Configuration Task List for Policy-based Routing.......................................................................... 594
PBR Exceptions (Permit)..............................................................................................................597
Sample Configuration...................................................................................................................... 600
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View
Redirect-List GOLD.....................................................................................................................601
33 PIM Sparse-Mode (PIM-SM)......................................................................... 605
Implementation Information............................................................................................................605
Protocol Overview............................................................................................................................605
Requesting Multicast Traffic.......................................................................................................605
Refuse Multicast Traffic.............................................................................................................. 606
Send Multicast Traffic................................................................................................................. 606
Configuring PIM-SM.........................................................................................................................607
Related Configuration Tasks.......................................................................................................607
Enable PIM-SM..................................................................................................................................607
Configuring S,G Expiry Timers.........................................................................................................608
Configuring a Static Rendezvous Point...........................................................................................609
Overriding Bootstrap Router Updates....................................................................................... 609
Configuring a Designated Router.....................................................................................................610
Creating Multicast Boundaries and Domains.................................................................................. 610
Enabling PIM-SM Graceful Restart....................................................................................................611
34 PIM Source-Specific Mode (PIM-SSM)....................................................... 612
Implementation Information............................................................................................................ 612
Important Points to Remember..................................................................................................612
Configure PIM-SMM......................................................................................................................... 613
Related Configuration Tasks.......................................................................................................613
Enabling PIM-SSM.............................................................................................................................613
Use PIM-SSM with IGMP Version 2 Hosts........................................................................................613
Configuring PIM-SSM with IGMPv2............................................................................................614
35 Port Monitoring.............................................................................................. 616
Important Points to Remember........................................................................................................616
Port Monitoring................................................................................................................................. 617
Configuring Port Monitoring............................................................................................................ 618
Enabling Flow-Based Monitoring.................................................................................................... 620
Remote Port Mirroring...................................................................................................................... 621
Remote Port Mirroring Example................................................................................................. 621
Configuring Remote Port Mirroring........................................................................................... 622
Displaying Remote-Port Mirroring Configurations................................................................... 624
Configuring the Sample Remote Port Mirroring....................................................................... 624
Configuring the Encapsulated Remote Port Mirroring................................................................... 628
Changes to Default BehaviorConfiguration steps for ERPM ................................................... 628
ERPM Behavior on a typical Dell Networking OS ...........................................................................630
Decapsulation of ERPM packets at the Destination IP/ Analyzer............................................. 630
36 Private VLANs (PVLAN)..................................................................................632
Private VLAN Concepts.....................................................................................................................632
Using the Private VLAN Commands.................................................................................................633
Configuration Task List.....................................................................................................................634
Creating PVLAN ports.................................................................................................................634
Creating a Primary VLAN............................................................................................................ 635
Creating a Community VLAN..................................................................................................... 636
Creating an Isolated VLAN..........................................................................................................637
Private VLAN Configuration Example.............................................................................................. 638
Inspecting the Private VLAN Configuration.....................................................................................639
37 Per-VLAN Spanning Tree Plus (PVST+)...................................................... 642
Protocol Overview............................................................................................................................642
Implementation Information............................................................................................................643
Configure Per-VLAN Spanning Tree Plus........................................................................................ 643
Related Configuration Tasks...................................................................................................... 643
Enabling PVST+.................................................................................................................................643
Disabling PVST+............................................................................................................................... 644
Influencing PVST+ Root Selection...................................................................................................644
Modifying Global PVST+ Parameters...............................................................................................646
Modifying Interface PVST+ Parameters...........................................................................................647
Configuring an EdgePort..................................................................................................................648
PVST+ in Multi-Vendor Networks....................................................................................................649
Enabling PVST+ Extend System ID.................................................................................................. 649
PVST+ Sample Configurations.........................................................................................................650
38 Quality of Service (QoS)................................................................................652
Implementation Information............................................................................................................654
Port-Based QoS Configurations...................................................................................................... 654
Setting dot1p Priorities for Incoming Traffic..............................................................................655
Honoring dot1p Priorities on Ingress Traffic..............................................................................655
Configuring Port-Based Rate Policing.......................................................................................656
Configuring Port-Based Rate Shaping.......................................................................................656
Policy-Based QoS Configurations....................................................................................................657
Classify Traffic.............................................................................................................................658
Create a QoS Policy.................................................................................................................... 661
Create Policy Maps..................................................................................................................... 663
Enabling QoS Rate Adjustment........................................................................................................669
Enabling Strict-Priority Queueing.................................................................................................... 670
Weighted Random Early Detection..................................................................................................670
Creating WRED Profiles...............................................................................................................671
Applying a WRED Profile to Traffic............................................................................................. 671
Displaying Default and Configured WRED Profiles....................................................................672
Displaying WRED Drop Statistics................................................................................................ 672
Pre-Calculating Available QoS CAM Space..................................................................................... 672
Configuring Weights and ECN for WRED ....................................................................................... 673
Global Service Pools With WRED and ECN Settings................................................................. 674
Configuring WRED and ECN Attributes........................................................................................... 675
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................676
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class.......... 677
Classifying Incoming Packets Using ECN and Color-Marking..................................................677
Sample configuration to mark non-ecn packets as “yellow” with single traffic class.............680
Applying Layer 2 Match Criteria on a Layer 3 Interface...................................................................681
Applying DSCP and VLAN Match Criteria on a Service Queue....................................................... 681
39 Routing Information Protocol (RIP)........................................................... 683
Protocol Overview............................................................................................................................683
RIPv1............................................................................................................................................ 683
RIPv2............................................................................................................................................683
Implementation Information............................................................................................................684
Configuration Information............................................................................................................... 684
Configuration Task List...............................................................................................................684
RIP Configuration Example.........................................................................................................691
40 Remote Monitoring (RMON)........................................................................697
Implementation Information............................................................................................................697
Fault Recovery...................................................................................................................................697
Setting the rmon Alarm.............................................................................................................. 698
Configuring an RMON Event......................................................................................................699
Configuring RMON Collection Statistics................................................................................... 700
Configuring the RMON Collection History................................................................................700
41 Rapid Spanning Tree Protocol (RSTP)........................................................702
Protocol Overview............................................................................................................................702
Configuring Rapid Spanning Tree.................................................................................................... 702
Related Configuration Tasks.......................................................................................................702
Important Points to Remember....................................................................................................... 703
RSTP and VLT.............................................................................................................................. 703
Configuring Interfaces for Layer 2 Mode.........................................................................................703
Enabling Rapid Spanning Tree Protocol Globally........................................................................... 704
Adding and Removing Interfaces.....................................................................................................706
Modifying Global Parameters........................................................................................................... 707
Enabling SNMP Traps for Root Elections and Topology Changes........................................... 708
Modifying Interface Parameters.......................................................................................................708
Enabling SNMP Traps for Root Elections and Topology Changes................................................. 709
Influencing RSTP Root Selection..................................................................................................... 709
Configuring an EdgePort..................................................................................................................709
Configuring Fast Hellos for Link State Detection.............................................................................710
42 Software-Defined Networking (SDN)......................................................... 712
43 Security.............................................................................................................713
AAA Accounting.................................................................................................................................713
Configuration Task List for AAA Accounting.............................................................................. 713
AAA Authentication............................................................................................................................715
Configuration Task List for AAA Authentication.........................................................................716
Obscuring Passwords and Keys........................................................................................................718
AAA Authorization............................................................................................................................. 719
Privilege Levels Overview............................................................................................................719
Configuration Task List for Privilege Levels................................................................................719
RADIUS.............................................................................................................................................. 725
RADIUS Authentication............................................................................................................... 725
Configuration Task List for RADIUS............................................................................................726
TACACS+...........................................................................................................................................729
Configuration Task List for TACACS+........................................................................................ 729
TACACS+ Remote Authentication..............................................................................................731
Command Authorization............................................................................................................ 732
Protection from TCP Tiny and Overlapping Fragment Attacks.......................................................732
Enabling SCP and SSH...................................................................................................................... 732
Using SCP with SSH to Copy a Software Image........................................................................ 733
Removing the RSA Host Keys and Zeroizing Storage ...............................................................733
Configuring When to Re-generate an SSH Key ........................................................................734
Configuring the SSH Server Key Exchange Algorithm...............................................................734
Configuring the HMAC Algorithm for the SSH Server............................................................... 735
Configuring the SSH Server Cipher List......................................................................................735
Secure Shell Authentication........................................................................................................736
Troubleshooting SSH.................................................................................................................. 739
Telnet.................................................................................................................................................739
VTY Line and Access-Class Configuration.......................................................................................739
VTY Line Local Authentication and Authorization.....................................................................740
VTY Line Remote Authentication and Authorization.................................................................740
VTY MAC-SA Filter Support.........................................................................................................741
Role-Based Access Control.............................................................................................................. 741
Overview of RBAC.......................................................................................................................742
User Roles....................................................................................................................................744
AAA Authentication and Authorization for Roles.......................................................................748
Role Accounting.......................................................................................................................... 751
Display Information About User Roles....................................................................................... 752
44 Service Provider Bridging.............................................................................754
VLAN Stacking...................................................................................................................................754
Important Points to Remember..................................................................................................755
Configure VLAN Stacking............................................................................................................756
Creating Access and Trunk Ports............................................................................................... 756
Enable VLAN-Stacking for a VLAN..............................................................................................757
Configuring the Protocol Type Value for the Outer VLAN Tag.................................................757
Configuring Dell Networking OS Options for Trunk Ports........................................................757
Debugging VLAN Stacking..........................................................................................................758
VLAN Stacking in Multi-Vendor Networks................................................................................. 759
VLAN Stacking Packet Drop Precedence.........................................................................................762
Enabling Drop Eligibility.............................................................................................................. 762
Honoring the Incoming DEI Value............................................................................................. 763
Marking Egress Packets with a DEI Value...................................................................................764
Dynamic Mode CoS for VLAN Stacking........................................................................................... 764
Mapping C-Tag to S-Tag dot1p Values......................................................................................766
Layer 2 Protocol Tunneling.............................................................................................................. 766
Implementation Information...................................................................................................... 768
Enabling Layer 2 Protocol Tunneling.........................................................................................769
Specifying a Destination MAC Address for BPDUs.................................................................... 769
Setting Rate-Limit BPDUs...........................................................................................................769
Debugging Layer 2 Protocol Tunneling..................................................................................... 770
Provider Backbone Bridging.............................................................................................................770
45 sFlow................................................................................................................. 771
Overview............................................................................................................................................ 771
Implementation Information.............................................................................................................771
Important Points to Remember..................................................................................................772
Enabling Extended sFlow..................................................................................................................772
Enabling and Disabling sFlow on an Interface.................................................................................773
Enabling sFlow Max-Header Size Extended.....................................................................................773
sFlow Show Commands................................................................................................................... 774
Displaying Show sFlow Global....................................................................................................774
Displaying Show sFlow on an Interface......................................................................................775
Displaying Show sFlow on a Stack-unit..................................................................................... 776
Configuring Specify Collectors.........................................................................................................776
Changing the Polling Intervals..........................................................................................................776
Back-Off Mechanism........................................................................................................................ 777
sFlow on LAG ports........................................................................................................................... 777
Enabling Extended sFlow.................................................................................................................. 777
Important Points to Remember..................................................................................................778
46 Simple Network Management Protocol (SNMP)..................................... 780
Protocol Overview............................................................................................................................780
Implementation Information............................................................................................................780
SNMPv3 Compliance With FIPS....................................................................................................... 780
Configuration Task List for SNMP.................................................................................................... 782
Related Configuration Tasks.......................................................................................................782
Important Points to Remember....................................................................................................... 782
Set up SNMP......................................................................................................................................782
Creating a Community............................................................................................................... 783
Setting Up User-Based Security (SNMPv3).................................................................................783
Reading Managed Object Values..................................................................................................... 784
Writing Managed Object Values.......................................................................................................785
Configuring Contact and Location Information using SNMP.........................................................786
Subscribing to Managed Object Value Updates using SNMP......................................................... 787
Enabling a Subset of SNMP Traps.................................................................................................... 788
Copy Configuration Files Using SNMP............................................................................................ 790
Copying a Configuration File......................................................................................................792
Copying Configuration Files via SNMP.......................................................................................792
Copying the Startup-Config Files to the Running-Config........................................................ 793
Copying the Startup-Config Files to the Server via FTP............................................................793
Copying the Startup-Config Files to the Server via TFTP..........................................................794
Copy a Binary File to the Startup-Configuration.......................................................................794
Additional MIB Objects to View Copy Statistics.........................................................................795
Obtaining a Value for MIB Objects.............................................................................................795
MIB Support to Display the Available Memory Size on Flash..........................................................796
Viewing the Available Flash Memory Size.................................................................................. 796
MIB Support to Display the Software Core Files Generated by the System................................... 797
Viewing the Software Core Files Generated by the System......................................................797
Manage VLANs using SNMP............................................................................................................. 798
Creating a VLAN..........................................................................................................................798
Assigning a VLAN Alias................................................................................................................798
Displaying the Ports in a VLAN................................................................................................... 799
Add Tagged and Untagged Ports to a VLAN..............................................................................799
Managing Overload on Startup........................................................................................................800
Enabling and Disabling a Port using SNMP..................................................................................... 800
Fetch Dynamic MAC Entries using SNMP........................................................................................ 801
Deriving Interface Indices................................................................................................................ 802
Monitor Port-Channels.................................................................................................................... 803
Troubleshooting SNMP Operation.................................................................................................. 804
47 Storm Control.................................................................................................806
Configure Storm Control................................................................................................................. 806
Configuring Storm Control from INTERFACE Mode.................................................................806
Configuring Storm Control from CONFIGURATION Mode......................................................806
48 Spanning Tree Protocol (STP)..................................................................... 807
Protocol Overview............................................................................................................................807
Configure Spanning Tree................................................................................................................. 807
Related Configuration Tasks...................................................................................................... 807
Important Points to Remember.......................................................................................................808
Configuring Interfaces for Layer 2 Mode........................................................................................ 808
Enabling Spanning Tree Protocol Globally..................................................................................... 809
Adding an Interface to the Spanning Tree Group............................................................................811
Modifying Global Parameters........................................................................................................... 812
Modifying Interface STP Parameters................................................................................................ 813
Enabling PortFast...............................................................................................................................813
Prevent Network Disruptions with BPDU Guard........................................................................814
Selecting STP Root............................................................................................................................816
STP Root Guard.................................................................................................................................817
Root Guard Scenario...................................................................................................................817
Configuring Root Guard............................................................................................................. 818
Enabling SNMP Traps for Root Elections and Topology Changes................................................. 819
Configuring Spanning Trees as Hitless.............................................................................................819
STP Loop Guard................................................................................................................................820
Configuring Loop Guard.............................................................................................................821
Displaying STP Guard Configuration............................................................................................... 822
49 System Time and Date.................................................................................. 823
Network Time Protocol....................................................................................................................823
Protocol Overview......................................................................................................................824
Configure the Network Time Protocol...................................................................................... 825
Enabling NTP...............................................................................................................................825
Configuring NTP Broadcasts...................................................................................................... 825
Disabling NTP on an Interface....................................................................................................826
Configuring a Source IP Address for NTP Packets....................................................................826
Configuring NTP Authentication................................................................................................826
Dell Networking OS Time and Date.................................................................................................830
Configuration Task List ..............................................................................................................830
Setting the Time and Date for the Switch Software Clock....................................................... 830
Setting the Timezone................................................................................................................. 830
Set Daylight Saving Time.............................................................................................................831
Setting Daylight Saving Time Once............................................................................................ 831
Setting Recurring Daylight Saving Time.....................................................................................832
50 Tunneling ....................................................................................................... 834
Configuring a Tunnel........................................................................................................................834
Configuring Tunnel Keepalive Settings............................................................................................835
Configuring a Tunnel Interface........................................................................................................836
Configuring Tunnel allow-remote Decapsulation..........................................................................836
Configuring Tunnel source anylocal Decapsulation.......................................................................837
Guidelines for Configuring Multipoint Receive-Only Tunnels........................................................837
Multipoint Receive-Only Type and IP Unnumbered Interfaces for Tunnels..................................838
51 Upgrade Procedures......................................................................................839
Get Help with Upgrades................................................................................................................... 839
52 Virtual LANs (VLANs)..................................................................................... 840
Default VLAN.................................................................................................................................... 840
Port-Based VLANs.............................................................................................................................841
VLANs and Port Tagging...................................................................................................................842
Configuration Task List.....................................................................................................................842
Creating a Port-Based VLAN...................................................................................................... 842
Assigning Interfaces to a VLAN.................................................................................................. 843
Moving Untagged Interfaces...................................................................................................... 845
Assigning an IP Address to a VLAN............................................................................................ 846
Configuring Native VLANs................................................................................................................846
Enabling Null VLAN as the Default VLAN.........................................................................................847
53 Virtual Link Trunking (VLT).......................................................................... 848
Overview...........................................................................................................................................848
VLT on Core Switches................................................................................................................ 849
Enhanced VLT.............................................................................................................................849
VLT Terminology.............................................................................................................................. 850
Configure Virtual Link Trunking........................................................................................................851
Important Points to Remember..................................................................................................851
Configuration Notes................................................................................................................... 852
Primary and Secondary VLT Peers............................................................................................. 856
RSTP and VLT..............................................................................................................................856
VLT Bandwidth Monitoring.........................................................................................................856
VLT and IGMP Snooping.............................................................................................................857
VLT IPv6.......................................................................................................................................857
VLT Port Delayed Restoration.....................................................................................................857
PIM-Sparse Mode Support on VLT.............................................................................................857
VLT Routing ................................................................................................................................859
Non-VLT ARP Sync......................................................................................................................861
RSTP Configuration...........................................................................................................................861
Preventing Forwarding Loops in a VLT Domain........................................................................862
Sample RSTP Configuration....................................................................................................... 862
Configuring VLT..........................................................................................................................863
PVST+ Configuration........................................................................................................................874
Sample PVST+ Configuration.....................................................................................................874
eVLT Configuration Example............................................................................................................875
eVLT Configuration Step Examples............................................................................................876
PIM-Sparse Mode Configuration Example...................................................................................... 878
Verifying a VLT Configuration.......................................................................................................... 879
Additional VLT Sample Configurations............................................................................................882
Configuring Virtual Link Trunking (VLT Peer 1)Configuring Virtual Link Trunking (VLT Peer
2)Verifying a Port-Channel Connection to a VLT Domain (From an Attached Access
Switch).........................................................................................................................................883
Troubleshooting VLT........................................................................................................................885
Reconfiguring Stacked Switches as VLT..........................................................................................886
Specifying VLT Nodes in a PVLAN....................................................................................................887
Association of VLTi as a Member of a PVLAN........................................................................... 888
MAC Synchronization for VLT Nodes in a PVLAN.....................................................................888
PVLAN Operations When One VLT Peer is Down.....................................................................888
PVLAN Operations When a VLT Peer is Restarted.....................................................................889
Interoperation of VLT Nodes in a PVLAN with ARP Requests...................................................889
Scenarios for VLAN Membership and MAC Synchronization With VLT Nodes in PVLAN....... 889
Configuring a VLT VLAN or LAG in a PVLAN....................................................................................891
Creating a VLT LAG or a VLT VLAN............................................................................................ 891
Associating the VLT LAG or VLT VLAN in a PVLAN....................................................................892
Proxy ARP Capability on VLT Peer Nodes........................................................................................893
Working of Proxy ARP for VLT Peer Nodes............................................................................... 894
VLT Nodes as Rendezvous Points for Multicast Resiliency.............................................................895
Configuring VLAN-Stack over VLT...................................................................................................895
54 VLT Proxy Gateway....................................................................................... 900
Proxy Gateway in VLT Domains.......................................................................................................900
Guidelines for Enabling the VLT Proxy Gateway....................................................................... 901
Enabling the VLT Proxy Gateway............................................................................................... 902
LLDP Organizational TLV for Proxy Gateway............................................................................ 903
Sample Configurations for LLDP VLT Proxy Gateway...............................................................903
Sample Configurations for Static VLT Proxy Gateway..............................................................904
Sample Scenario for VLT Proxy Gateway.................................................................................. 904
Configuring an LLDP VLT Proxy Gateway....................................................................................... 905
55 Virtual Router Redundancy Protocol (VRRP)............................................907
VRRP Overview................................................................................................................................. 907
VRRP Benefits................................................................................................................................... 908
VRRP Implementation...................................................................................................................... 908
VRRP Configuration..........................................................................................................................909
Configuration Task List...............................................................................................................909
Setting VRRP Initialization Delay.................................................................................................919
Sample Configurations..................................................................................................................... 919
VRRP for an IPv4 Configuration..................................................................................................919
VRRP in a VRF Configuration......................................................................................................924
VRRP for IPv6 Configuration...................................................................................................... 930
56 Z-Series Debugging and Diagnostics.........................................................935
Offline Diagnostics............................................................................................................................935
Important Points to Remember................................................................................................. 935
Running Offline Diagnostics.......................................................................................................935
TRACE Logs.......................................................................................................................................939
Auto Save on Crash or Rollover................................................................................................. 940
Last Restart Reason.......................................................................................................................... 940
Line Card Restart Causes and Reasons..................................................................................... 940
Hardware Watchdog Timer..............................................................................................................940
show hardware Commands.............................................................................................................940
Environmental Monitoring............................................................................................................... 943
.....................................................................................................................................................943
Recognize an Over-Temperature Condition.............................................................................943
Troubleshoot an Over-Temperature Condition....................................................................... 944
Recognize an Under-Voltage Condition...................................................................................944
Troubleshoot an Under-Voltage Condition.............................................................................. 944
Buffer Tuning.................................................................................................................................... 945
Buffer Tuning Points...................................................................................................................946
Decide to Tune Buffers...............................................................................................................947
Using the Buffer Tuning Commands......................................................................................... 947
Sample Buffer Profile Configuration..........................................................................................949
Troubleshooting Packet Loss...........................................................................................................950
Displaying Drop Counters.......................................................................................................... 950
Displaying Dataplane Statistics................................................................................................... 951
Displaying Stack Member Counters...........................................................................................952
Enabling Application Core Dumps...................................................................................................952
Mini Core Dumps..............................................................................................................................953
Enabling TCP Dumps........................................................................................................................953
57 Standards Compliance.................................................................................. 955
IEEE Compliance...............................................................................................................................955
RFC and I-D Compliance................................................................................................................. 956
General Internet Protocols.........................................................................................................956
General IPv4 Protocols............................................................................................................... 957
General IPv6 Protocols...............................................................................................................958
Border Gateway Protocol (BGP).................................................................................................958
Open Shortest Path First (OSPF).................................................................................................959
Intermediate System to Intermediate System (IS-IS)................................................................ 960
Routing Information Protocol (RIP)........................................................................................... 960
Multicast...................................................................................................................................... 961
Network Management................................................................................................................ 961
MIB Location.....................................................................................................................................968
Loading...
+ 938 hidden pages