MANUZOID
Explore
Explore
Bookmarks
Dell
PowerSwitch S6100-ON
Dell PowerSwitch S6100-ON Administrator Guide
Type
Administrator Guide
Brand
Dell
Size
24.16 MB
Category
Software
Pages
1119
Language
English
View document
Dell PowerSwitch S6100-ON Administrator Guide
Type
Administrator Guide
Brand
Dell
Size
8.47 MB
Category
Software
Pages
1714
Language
English
View document
Dell PowerSwitch S6100-ON Administrator Guide
Type
Administrator Guide
Brand
Dell
Size
8.47 MB
Category
Software
Pages
1725
Language
English
View document
Dell PowerSwitch S6100-ON Administrator Guide
Type
Administrator Guide
Brand
Dell
Size
24.18 MB
Category
Software
Pages
1128
Language
English
View document
Dell PowerSwitch S6100-ON Owner's manual
Type
Owner's manual
Brand
Dell
Size
37.38 MB
Category
Software
Pages
1227
Language
English
View document
Dell PowerSwitch S6100-ON Owner's manual
Type
Owner's manual
Brand
Dell
Size
40.39 MB
Category
Software
Pages
1961
Language
English
View document
Dell PowerSwitch S6100-ON Owner's manual
Type
Owner's manual
Brand
Dell
Size
37.09 MB
Category
Software
Pages
1210
Language
English
View document
Dell PowerSwitch S6100-ON Owner's manual
Type
Owner's manual
Brand
Dell
Size
40.26 MB
Category
Software
Pages
1958
Language
English
View document
Dell PowerSwitch S6100-ON Owner's manual
Type
Owner's manual
Brand
Dell
Size
36.84 MB
Category
Software
Pages
1202
Language
English
View document
Dell PowerSwitch S6100-ON Owner's manual
Type
Owner's manual
Brand
Dell
Size
41.24 MB
Category
Software
Pages
1914
Language
English
View document
Dell PowerSwitch S6100-ON Owner's manual
Type
Owner's manual
Brand
Dell
Size
36.18 MB
Category
General utility software
Pages
1132
Language
English
View document
Dell PowerSwitch S6100-ON Owner's manual
Type
Owner's manual
Brand
Dell
Size
40.41 MB
Category
Software
Pages
1962
Language
English
View document
Dell PowerSwitch S6100-ON Owner's manual
Type
Owner's manual
Brand
Dell
Size
2.15 MB
Category
Network switches
Pages
48
Language
English
View document
Dell PowerSwitch S6100-ON Quick start guide
Type
Quick start guide
Brand
Dell
Size
40.41 MB
Category
Software
Pages
1962
Language
English
View document
Dell PowerSwitch S6100-ON Quick start guide
Type
Quick start guide
Brand
Dell
Size
37.40 MB
Category
Software
Pages
1229
Language
English
View document
Dell PowerSwitch S6100-ON Quick start guide
Type
Quick start guide
Brand
Dell
Size
829.99 KB
Category
Networking
Pages
30
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
11.59 MB
Category
Software
Pages
1610
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
24.03 MB
Category
Software
Pages
959
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
11.45 MB
Category
Software
Pages
1666
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
24.19 MB
Category
Software
Pages
1070
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
39.75 MB
Category
Software
Pages
1933
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
36.15 MB
Category
Software
Pages
1182
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
37.67 MB
Category
Software
Pages
1753
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
34.65 MB
Category
General utility software
Pages
1082
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
37.46 MB
Category
Software
Pages
1743
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
34.60 MB
Category
General utility software
Pages
1081
Language
English
Table of contents
Dell Configuration Guide for the S6100–ON System 9.11(2.0P1)
3
About this Guide
34
Audience
34
Conventions
34
Related Documents
34
Configuration Fundamentals
35
Accessing the Command Line
35
CLI Modes
35
Navigating CLI Modes
37
The do Command
40
Undoing Commands
40
Obtaining Help
41
Entering and Editing Commands
41
Command History
42
Filtering show Command Outputs
42
Example of the grep Keyword
43
Multiple Users in Configuration Mode
43
Getting Started
45
Console Access
46
Serial Console
46
Micro USB-B Access
47
Default Configuration
48
Configuring a Host Name
48
Accessing the System Remotely
48
Accessing the System Remotely
48
Configure the Management Port IP Address
48
Configure a Management Route
49
Configuring a Username and Password
49
Configuring the Enable Password
49
Configuration File Management
50
Copy Files to and from the System
50
Mounting an NFS File System
51
Save the Running-Configuration
52
Configure the Overload Bit for a Startup Scenario
53
Viewing Files
53
Managing the File System
54
View Command History
54
Upgrading Dell Networking OS
55
Using HTTP for File Transfers
55
Verify Software Images Before Installation
56
Management
58
Configuring Privilege Levels
58
Creating a Custom Privilege Level
59
Removing a Command from EXEC Mode
59
Moving a Command from EXEC Privilege Mode to EXEC Mode
59
Allowing Access to CONFIGURATION Mode Commands
59
Allowing Access to Different Modes
59
Applying a Privilege Level to a Username
61
Applying a Privilege Level to a Terminal Line
61
Configuring Logging
61
Audit and Security Logs
62
Configuring Logging Format
63
Setting Up a Secure Connection to a Syslog Server
63
Log Messages in the Internal Buffer
65
Configuration Task List for System Log Management
65
Disabling System Logging
65
Sending System Messages to a Syslog Server
65
Configuring a UNIX System as a Syslog Server
65
Track Login Activity
66
Restrictions for Tracking Login Activity
66
Configuring Login Activity Tracking
66
Display Login Statistics
67
Limit Concurrent Login Sessions
68
Restrictions for Limiting the Number of Concurrent Sessions
68
Configuring Concurrent Session Limit
68
Enabling the System to Clear Existing Sessions
69
Enabling Secured CLI Mode
70
Changing System Logging Settings
70
Display the Logging Buffer and the Logging Configuration
71
Configuring a UNIX Logging Facility Level
71
Synchronizing Log Messages
72
Enabling Timestamp on Syslog Messages
73
File Transfer Services
73
Configuration Task List for File Transfer Services
73
Enabling the FTP Server
74
Configuring FTP Server Parameters
74
Configuring FTP Client Parameters
74
Terminal Lines
75
Denying and Permitting Access to a Terminal Line
75
Configuring Login Authentication for Terminal Lines
76
Setting Timeout for EXEC Privilege Mode
77
Using Telnet to get to Another Network Device
78
Lock CONFIGURATION Mode
78
Viewing the Configuration Lock Status
78
LPC Bus Quality Degradation
79
LBQA (LPC Bus Quality Analyzer) Failure Detection mode
80
Restoring the Factory Default Settings
80
Important Points to Remember
80
Restoring Factory Default Environment Variables
81
Reloading the system
82
802.1X
84
Port-Authentication Process
86
EAP over RADIUS
87
Configuring 802.1X
87
Related Configuration Tasks
87
Important Points to Remember
88
Enabling 802.1X
88
Configuring dot1x Profile
89
Configuring MAC addresses for a do1x Profile
90
Configuring the Static MAB and MAB Profile
90
Configuring Critical VLAN
91
Configuring Request Identity Re-Transmissions
92
Configuring a Quiet Period after a Failed Authentication
92
Configuring a Quiet Period after a Failed Authentication
93
Forcibly Authorizing or Unauthorizing a Port
94
Re-Authenticating a Port
95
Configuring Dynamic VLAN Assignment with Port Authentication
96
Guest and Authentication-Fail VLANs
97
Configuring a Guest VLAN
97
Configuring an Authentication-Fail VLAN
97
Configuring Timeouts
98
Multi-Host Authentication
99
Configuring Multi-Host AuthenticationConfiguring Single-Host Authentication
101
Multi-Supplicant Authentication
102
Configuring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication
102
MAC Authentication Bypass
103
MAB in Single-host and Multi-Host Mode
104
MAB in Multi-Supplicant Authentication Mode
104
Configuring MAC Authentication Bypass
104
Dynamic CoS with 802.1X
105
Access Control Lists (ACLs)
107
IP Access Control Lists (ACLs)
108
CAM Usage
109
Implementing ACLs on Dell Networking OS
109
Configure ACL Range Profiles
111
Important Points to Remember
111
Configuration Task List for Route Maps
112
Configuring Match Routes
114
Configuring Set Conditions
115
Configure a Route Map for Route Redistribution
116
Configure a Route Map for Route Tagging
117
Continue Clause
117
IP Fragment Handling
117
IP Fragments ACL Examples
118
Layer 4 ACL Rules Examples
118
Configure a Standard IP ACL
119
Configuring a Standard IP ACL Filter
120
Configure an Extended IP ACL
121
Configuring Filters with a Sequence Number
121
Configuring Filters Without a Sequence Number
124
Configure Layer 2 and Layer 3 ACLs
124
Assign an IP ACL to an Interface
125
Applying an IP ACL
125
Counting ACL Hits
126
Configure Ingress ACLs
126
Configure Egress ACLs
127
Applying Egress Layer 3 ACLs (Control-Plane)
128
IP Prefix Lists
128
Implementation Information
129
Configuration Task List for Prefix Lists
129
ACL Resequencing
132
Resequencing an ACL or Prefix List
133
Route Maps
134
Implementation Information
134
Flow-Based Monitoring Support for ACLs
134
Behavior of Flow-Based Monitoring
135
Enabling Flow-Based Monitoring
136
Configuring IP Mirror Access Group
136
Bidirectional Forwarding Detection (BFD)
139
How BFD Works
139
BFD Packet Format
140
BFD Sessions
141
BFD Three-Way Handshake
142
Session State Changes
144
Important Points to Remember
144
Configure BFD
144
Configure BFD for Physical Ports
145
Configure BFD for Static Routes
148
Configure BFD for OSPF
151
Configure BFD for OSPFv3
156
Configure BFD for IS-IS
158
Configure BFD for BGP
160
Configure BFD for VRRP
167
Configuring Protocol Liveness
170
Troubleshooting BFD
170
Border Gateway Protocol IPv4 (BGPv4)
172
Autonomous Systems (AS)
172
Sessions and Peers
174
Establish a Session
174
Route Reflectors
175
BGP Attributes
176
Best Path Selection Criteria
176
Weight
178
Local Preference
178
Multi-Exit Discriminators (MEDs)
179
Origin
180
AS Path
181
Next Hop
181
Multiprotocol BGP
181
Implement BGP with Dell Networking OS
182
Additional Path (Add-Path) Support
182
Advertise IGP Cost as MED for Redistributed Routes
182
Ignore Router-ID in Best-Path Calculation
183
Four-Byte AS Numbers
183
AS4 Number Representation
183
AS Number Migration
185
BGP4 Management Information Base (MIB)
186
Important Points to Remember
186
Configuration Information
187
BGP Configuration
187
Enabling BGP
188
Configuring AS4 Number Representations
191
Configuring Peer Groups
193
Configuring BGP Fast Fall-Over
195
Configuring Passive Peering
197
Maintaining Existing AS Numbers During an AS Migration
197
Allowing an AS Number to Appear in its Own AS Path
198
Enabling Graceful Restart
199
Enabling Neighbor Graceful Restart
200
Filtering on an AS-Path Attribute
200
Regular Expressions as Filters
202
Redistributing Routes
203
Enabling Additional Paths
204
Configuring IP Community Lists
204
Configuring an IP Extended Community List
205
Filtering Routes with Community Lists
206
Manipulating the COMMUNITY Attribute
207
Changing MED Attributes
208
Changing the LOCAL_PREFERENCE Attribute
208
Configuring the local System or a Different System to be the Next Hop for BGP-Learned Routes
209
Changing the WEIGHT Attribute
210
Enabling Multipath
210
Filtering BGP Routes
210
Filtering BGP Routes Using Route Maps
212
Filtering BGP Routes Using AS-PATH Information
212
Configuring BGP Route Reflectors
213
Aggregating Routes
214
Configuring BGP Confederations
214
Enabling Route Flap Dampening
215
Changing BGP Timers
217
Enabling BGP Neighbor Soft-Reconfiguration
217
Enabling or disabling BGP neighbors
218
Route Map Continue
220
Enabling MBGP Configurations
220
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor
221
BGP Regular Expression Optimization
221
Debugging BGP
221
Storing Last and Bad PDUs
222
Capturing PDUs
223
PDU Counters
224
Sample Configurations
224
Content Addressable Memory (CAM)
231
CAM Allocation
231
Test CAM Usage
233
View CAM-ACL Settings
233
View CAM Usage
234
CAM Optimization
235
Troubleshoot CAM Profiling
235
QoS CAM Region Limitation
235
Syslog Error When the Table is Full
235
Syslog Warning Upon 90 Percent Utilization of CAM
236
Syslog Warning for Discrepancies Between Configured Extended Prefixes
236
Unified Forwarding Table (UFT) Modes
236
Configuring UFT Modes
236
Control Plane Policing (CoPP)
238
Configure Control Plane Policing
239
Configuring CoPP for Protocols
240
Configuring CoPP for CPU Queues
242
Protocol to CPU Queue Mapping
243
Configuring Protocol to CPU Queue Mapping
243
Displaying CoPP Configuration
244
Data Center Bridging (DCB)
246
Ethernet Enhancements in Data Center Bridging
246
Priority-Based Flow Control
247
Enhanced Transmission Selection
248
Data Center Bridging Exchange Protocol (DCBx)
249
Data Center Bridging in a Traffic Flow
250
Enabling Data Center Bridging
250
DCB Maps and its Attributes
251
Data Center Bridging: Default Configuration
251
Configuring Priority-Based Flow Control
252
Configuring Lossless Queues
253
Configuring PFC in a DCB Map
254
PFC Configuration Notes
254
PFC Prerequisites and Restrictions
255
Applying a DCB Map on a Port
255
Configuring PFC without a DCB Map
256
Priority-Based Flow Control Using Dynamic Buffer Method
256
Pause and Resume of Traffic
256
Buffer Sizes for Lossless or PFC Packets
257
Shared headroom for lossless or PFC packets
257
Example Scenario
258
Configuring Shared Head Room Buffer
259
Viewing Shared Head Room Usage
259
Monitoring Buffer Statistics for Tracking Purposes
260
Behavior of Tagged Packets
260
SNMP Support for PFC and Buffer Statistics Tracking
261
Performing PFC Using DSCP Bits Instead of 802.1p Bits
261
Configuration Example for DSCP and PFC Priorities
262
Using PFC to Manage Converged Ethernet Traffic
262
Generation of PFC for a Priority for Untagged Packets
262
Configure Enhanced Transmission Selection
263
Creating an ETS Priority Group
263
ETS Operation with DCBx
264
Configuring ETS in a DCB Map
264
Hierarchical Scheduling in ETS Output Policies
266
Using ETS to Manage Converged Ethernet Traffic
266
Applying DCB Policies in a Switch Stack
266
Configure a DCBx Operation
266
DCBx Operation
267
DCBx Port Roles
267
DCB Configuration Exchange
268
Configuration Source Election
269
Propagation of DCB Information
269
Auto-Detection and Manual Configuration of the DCBx Version
270
DCBx Example
270
DCBx Prerequisites and Restrictions
271
Configuring DCBx
271
Verifying the DCB Configuration
275
QoS dot1p Traffic Classification and Queue Assignment
282
Configuring the Dynamic Buffer Method
282
Sample DCB Configuration
283
PFC and ETS Configuration Command Examples
285
Dynamic Host Configuration Protocol (DHCP)
286
DHCP Packet Format and Options
286
Assign an IP Address using DHCP
288
Implementation Information
289
Configure the System to be a DHCP Server
289
Configuring the Server for Automatic Address Allocation
290
Specifying a Default Gateway
291
Configure a Method of Hostname Resolution
291
Using DNS for Address Resolution
291
Using NetBIOS WINS for Address Resolution
292
Creating Manual Binding Entries
292
Debugging the DHCP Server
292
Using DHCP Clear Commands
293
Configure the System to be a DHCP Client
293
Configuring the DHCP Client System
293
DHCP Client on a Management Interface
295
DHCP Client Operation with Other Features
295
Configure the System for User Port Stacking (Option 230)
296
Configure Secure DHCP
296
Option 82
297
DHCP Snooping
297
Drop DHCP Packets on Snooped VLANs Only
300
Dynamic ARP Inspection
301
Configuring Dynamic ARP Inspection
302
Source Address Validation
303
Enabling IP Source Address Validation
303
DHCP MAC Source Address Validation
304
Enabling IP+MAC Source Address Validation
304
Viewing the Number of SAV Dropped Packets
305
Clearing the Number of SAV Dropped Packets
305
Equal Cost Multi-Path (ECMP)
306
ECMP for Flow-Based Affinity
306
Configuring the Hash Algorithm Seed
306
Link Bundle Monitoring
306
Managing ECMP Group Paths
307
Creating an ECMP Group Bundle
307
Modifying the ECMP Group Threshold
308
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table
308
Support for ECMP in host table
309
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes
309
RTAG7
309
Flow-based Hashing for ECMP
310
FIP Snooping
314
Fibre Channel over Ethernet
314
Ensure Robustness in a Converged Ethernet Network
314
FIP Snooping on Ethernet Bridges
316
Using FIP Snooping
318
FIP Snooping Prerequisites
318
Important Points to Remember
318
Enabling the FCoE Transit Feature
319
Enable FIP Snooping on VLANs
320
Configure the FC-MAP Value
320
Configure a Port for a Bridge-to-Bridge Link
320
Configure a Port for a Bridge-to-FCF Link
320
Impact on Other Software Features
321
FIP Snooping Restrictions
321
Configuring FIP Snooping
321
Displaying FIP Snooping Information
322
FCoE Transit Configuration Example
327
Flex Hash and Optimized Boot-Up
329
Flex Hash Capability Overview
329
Configuring the Flex Hash Mechanism
329
Configuring Fast Boot and LACP Fast Switchover
330
Optimizing the Boot Time
330
Booting Process When Optimized Boot Time Mechanism is Enabled
330
Guidelines for Configuring Optimized Booting Mechanism
331
Interoperation of Applications with Fast Boot and System States
332
LACP and IPv4 Routing
332
LACP and IPv6 Routing
332
BGP Graceful Restart
333
Cold Boot Caused by Power Cycling the System
333
Unexpected Reload of the System
333
Software Upgrade
333
LACP Fast Switchover
333
Changes to BGP Multipath
334
Delayed Installation of ECMP Routes Into BGP
334
RDMA Over Converged Ethernet (RoCE) Overview
334
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces
335
Force10 Resilient Ring Protocol (FRRP)
336
Protocol Overview
336
Ring Status
337
Multiple FRRP Rings
337
Important FRRP Points
338
Important FRRP Concepts
339
Implementing FRRP
340
FRRP Configuration
340
Creating the FRRP Group
340
Configuring the Control VLAN
341
Configuring and Adding the Member VLANs
342
Setting the FRRP Timers
343
Clearing the FRRP Counters
343
Viewing the FRRP Configuration
343
Viewing the FRRP Information
344
Troubleshooting FRRP
344
Configuration Checks
344
Sample Configuration and Topology
344
FRRP Support on VLT
346
Example Scenario
346
Important Points to Remember
347
GARP VLAN Registration Protocol (GVRP)
349
Important Points to Remember
349
Configure GVRP
350
Related Configuration Tasks
350
Enabling GVRP Globally
351
Enabling GVRP on a Layer 2 Interface
351
Configure GVRP Registration
351
Configure a GARP Timer
352
Internet Group Management Protocol (IGMP)
353
IGMP Implementation Information
353
IGMP Protocol Overview
353
IGMP Version 2
353
IGMP Version 3
355
Configure IGMP
358
Related Configuration Tasks
358
Viewing IGMP Enabled Interfaces
359
Selecting an IGMP Version
359
Viewing IGMP Groups
359
Adjusting Timers
360
Adjusting Query and Response Timers
360
Enabling IGMP Immediate-Leave
361
IGMP Snooping
361
IGMP Snooping Implementation Information
361
Configuring IGMP Snooping
361
Removing a Group-Port Association
362
Disabling Multicast Flooding
362
Specifying a Port as Connected to a Multicast Router
362
Configuring the Switch as Querier
363
Fast Convergence after MSTP Topology Changes
363
Egress Interface Selection (EIS) for HTTP and IGMP Applications
364
Protocol Separation
364
Enabling and Disabling Management Egress Interface Selection
365
Handling of Management Route Configuration
366
Handling of Switch-Initiated Traffic
366
Handling of Switch-Destined Traffic
367
Handling of Transit Traffic (Traffic Separation)
368
Mapping of Management Applications and Traffic Type
368
Behavior of Various Applications for Switch-Initiated Traffic
369
Behavior of Various Applications for Switch-Destined Traffic
370
Interworking of EIS With Various Applications
371
Designating a Multicast Router Interface
371
Interfaces
372
Basic Interface Configuration
372
Advanced Interface Configuration
372
Interface Types
373
View Basic Interface Information
373
Resetting an Interface to its Factory Default State
375
Enabling a Physical Interface
376
Physical Interfaces
376
Configuration Task List for Physical Interfaces
376
Overview of Layer Modes
377
Configuring Layer 2 (Data Link) Mode
377
Configuring Layer 2 (Interface) Mode
378
Configuring Layer 3 (Network) Mode
378
Configuring Layer 3 (Interface) Mode
378
Egress Interface Selection (EIS)
379
Important Points to Remember
379
Configuring EIS
379
Management Interfaces
380
Configuring Management Interfaces
380
Configuring a Management Interface on an Ethernet Port
381
S6100 — OIR
382
VLAN Interfaces
382
Loopback Interfaces
383
Null Interfaces
384
Port Channel Interfaces
384
Port Channel Definition and Standards
384
Port Channel Benefits
384
Port Channel Implementation
384
Interfaces in Port Channels
385
Configuration Tasks for Port Channel Interfaces
385
Creating a Port Channel
386
Adding a Physical Interface to a Port Channel
386
Reassigning an Interface to a New Port Channel
388
Configuring the Minimum Oper Up Links in a Port Channel
388
Adding or Removing a Port Channel from a VLAN
389
Assigning an IP Address to a Port Channel
390
Deleting or Disabling a Port Channel
390
Load Balancing Through Port Channels
390
Load-Balancing Method
391
Changing the Hash Algorithm
391
Bulk Configuration
392
Interface Range
392
Bulk Configuration Examples
393
Defining Interface Range Macros
394
Define the Interface Range
395
Choosing an Interface-Range Macro
395
Monitoring and Maintaining Interfaces
395
Split 40G Ports on a 16X40G QSFP+ Module
396
Splitting 100G Ports
397
Link Dampening
398
Important Points to Remember
398
Enabling Link Dampening
398
Link Bundle Monitoring
400
Using Ethernet Pause Frames for Flow Control
400
Enabling Pause Frames
401
Configure the MTU Size on an Interface
401
Port-Pipes
402
CR4 Auto-Negotiation
402
FEC Configuration
403
Setting the Speed of Ethernet Interfaces
405
Adjusting the Keepalive Timer
406
View Advanced Interface Information
406
Configuring the Interface Sampling Size
407
Configuring the Traffic Sampling Size Globally
408
Dynamic Counters
409
Clearing Interface Counters
410
Enhanced Validation of Interface Ranges
410
Compressing Configuration Files
411
IPv4 Routing
414
IP Addresses
415
Implementation Information
415
Configuration Tasks for IP Addresses
415
Assigning IP Addresses to an Interface
415
Configuring Static Routes
416
Configure Static Routes for the Management Interface
417
Using the Configured Source IP Address in ICMP Messages
418
Configuring the ICMP Source Interface
418
Configuring the Duration to Establish a TCP Connection
418
Enabling Directed Broadcast
419
Resolution of Host Names
419
Enabling Dynamic Resolution of Host Names
419
Specifying the Local System Domain and a List of Domains
420
Configuring DNS with Traceroute
420
ARP
421
Configuration Tasks for ARP
421
Configuring Static ARP Entries
421
Enabling Proxy ARP
422
Clearing ARP Cache
422
ARP Learning via Gratuitous ARP
422
Enabling ARP Learning via Gratuitous ARP
423
ARP Learning via ARP Request
423
Configuring ARP Retries
424
ICMP
424
Configuration Tasks for ICMP
424
Enabling ICMP Unreachable Messages
424
UDP Helper
425
Configure UDP Helper
425
Important Points to Remember
425
Enabling UDP Helper
425
Configuring a Broadcast Address
425
Configurations Using UDP Helper
426
UDP Helper with Broadcast-All Addresses
426
UDP Helper with Subnet Broadcast Addresses
427
UDP Helper with Configured Broadcast Addresses
427
UDP Helper with No Configured Broadcast Addresses
428
Troubleshooting UDP Helper
428
IPv6 Routing
429
Protocol Overview
429
Extended Address Space
430
Stateless Autoconfiguration
430
IPv6 Headers
430
Longest Prefix Match (LPM) Table and IPv6 /65 – /128 support
431
IPv6 Header Fields
432
Extension Header Fields
434
Addressing
435
Implementing IPv6 with Dell Networking OS
436
ICMPv6
436
Path MTU Discovery
436
IPv6 Neighbor Discovery
437
IPv6 Neighbor Discovery of MTU Packets
437
Configuring the IPv6 Recursive DNS Server
437
Debugging IPv6 RDNSS Information Sent to the Host
438
Displaying IPv6 RDNSS Information
439
Secure Shell (SSH) Over an IPv6 Transport
439
Configuration Tasks for IPv6
440
Adjusting Your CAM-Profile
440
Assigning an IPv6 Address to an Interface
441
Assigning a Static IPv6 Route
441
Configuring Telnet with IPv6
442
SNMP over IPv6
442
Displaying IPv6 Information
442
Displaying an IPv6 Interface Information
443
Showing IPv6 Routes
444
Showing the Running-Configuration for an Interface
445
Clearing IPv6 Routes
445
Disabling ND Entry Timeout
446
Configuring IPv6 RA Guard
446
Configuring IPv6 RA Guard on an Interface
448
Monitoring IPv6 RA Guard
448
iSCSI Optimization
449
iSCSI Optimization Overview
449
Monitoring iSCSI Traffic Flows
451
Application of Quality of Service to iSCSI Traffic Flows
451
Information Monitored in iSCSI Traffic Flows
451
Detection and Auto-Configuration for Dell EqualLogic Arrays
452
Configuring Detection and Ports for Dell Compellent Arrays
452
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer
453
Enable and Disable iSCSI Optimization
453
Default iSCSI Optimization Values
454
iSCSI Optimization Prerequisites
454
Configuring iSCSI Optimization
454
Displaying iSCSI Optimization Information
456
Intermediate System to Intermediate System
458
IS-IS Protocol Overview
458
IS-IS Addressing
458
Multi-Topology IS-IS
459
Transition Mode
459
Interface Support
460
Adjacencies
460
Graceful Restart
460
Timers
460
Implementation Information
460
Configuration Information
461
Configuration Tasks for IS-IS
462
Configuring the Distance of a Route
469
Changing the IS-Type
470
Redistributing IPv4 Routes
472
Redistributing IPv6 Routes
473
Configuring Authentication Passwords
474
Setting the Overload Bit
474
Debugging IS-IS
475
IS-IS Metric Styles
476
Configure Metric Values
476
Maximum Values in the Routing Table
477
Change the IS-IS Metric Style in One Level Only
477
Leaks from One Level to Another
478
Sample Configurations
479
Link Aggregation Control Protocol (LACP)
482
Introduction to Dynamic LAGs and LACP
482
Important Points to Remember
482
LACP Modes
483
Configuring LACP Commands
483
LACP Configuration Tasks
484
Creating a LAG
484
Configuring the LAG Interfaces as Dynamic
484
Setting the LACP Long Timeout
485
Monitoring and Debugging LACP
485
Shared LAG State Tracking
486
Configuring Shared LAG State Tracking
486
Important Points about Shared LAG State Tracking
488
LACP Basic Configuration Example
488
Configure a LAG on ALPHA
488
Layer 2
497
Manage the MAC Address Table
497
Clearing the MAC Address Table
497
Setting the Aging Time for Dynamic Entries
497
Configuring a Static MAC Address
498
Displaying the MAC Address Table
498
MAC Learning Limit
498
Setting the MAC Learning Limit
499
mac learning-limit Dynamic
499
mac learning-limit mac-address-sticky
499
mac learning-limit station-move
500
mac learning-limit no-station-move
500
Learning Limit Violation Actions
500
Setting Station Move Violation Actions
501
Recovering from Learning Limit and Station Move Violations
501
Disabling MAC Address Learning on the System
502
NIC Teaming
502
Configure Redundant Pairs
503
Important Points about Configuring Redundant Pairs
505
Far-End Failure Detection
506
FEFD State Changes
507
Configuring FEFD
508
Enabling FEFD on an Interface
508
Debugging FEFD
509
Link Layer Discovery Protocol (LLDP)
511
802.1AB (LLDP) Overview
511
Protocol Data Units
511
Optional TLVs
512
Management TLVs
512
TIA-1057 (LLDP-MED) Overview
514
TIA Organizationally Specific TLVs
514
Configure LLDP
518
Related Configuration Tasks
518
Important Points to Remember
518
LLDP Compatibility
518
CONFIGURATION versus INTERFACE Configurations
518
Enabling LLDP
519
Disabling and Undoing LLDP
519
Enabling LLDP on Management Ports
520
Disabling and Undoing LLDP on Management Ports
520
Advertising TLVs
520
Viewing the LLDP Configuration
521
Viewing Information Advertised by Adjacent LLDP Agents
522
Configuring LLDPDU Intervals
523
Configuring Transmit and Receive Mode
523
Configuring the Time to Live Value
524
Debugging LLDP
525
Relevant Management Objects
526
Microsoft Network Load Balancing
531
NLB Unicast Mode Scenario
531
NLB Multicast Mode Scenario
531
Limitations of the NLB Feature
532
Microsoft Clustering
532
Enable and Disable VLAN Flooding
532
Configuring a Switch for NLB
532
Multicast Source Discovery Protocol (MSDP)
534
Protocol Overview
534
Anycast RP
535
Implementation Information
536
Configure Multicast Source Discovery Protocol
536
Related Configuration Tasks
536
Enable MSDP
540
Manage the Source-Active Cache
541
Viewing the Source-Active Cache
541
Limiting the Source-Active Cache
541
Clearing the Source-Active Cache
542
Enabling the Rejected Source-Active Cache
542
Accept Source-Active Messages that Fail the RFP Check
542
Specifying Source-Active Messages
545
Limiting the Source-Active Messages from a Peer
546
Preventing MSDP from Caching a Local Source
546
Preventing MSDP from Caching a Remote Source
547
Preventing MSDP from Advertising a Local Source
547
Logging Changes in Peership States
548
Terminating a Peership
548
Clearing Peer Statistics
549
Debugging MSDP
549
MSDP with Anycast RP
550
Configuring Anycast RP
551
Reducing Source-Active Message Flooding
552
Specifying the RP Address Used in SA Messages
552
MSDP Sample Configurations
554
Multiple Spanning Tree Protocol (MSTP)
557
Protocol Overview
557
Spanning Tree Variations
558
Implementation Information
558
Configure Multiple Spanning Tree Protocol
558
Related Configuration Tasks
559
Enable Multiple Spanning Tree Globally
559
Adding and Removing Interfaces
559
Creating Multiple Spanning Tree Instances
560
Influencing MSTP Root Selection
560
Interoperate with Non-Dell Bridges
561
Changing the Region Name or Revision
561
Modifying Global Parameters
562
Modifying the Interface Parameters
563
Configuring an EdgePort
564
Flush MAC Addresses after a Topology Change
565
MSTP Sample Configurations
565
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-ConfigurationSFTOS Example Running-Configuration
565
Debugging and Verifying MSTP Configurations
567
Multicast Features
569
Enabling IP Multicast
569
Implementation Information
569
Multicast Policies
570
IPv4 Multicast Policies
570
Understanding Multicast Traceroute (mtrace)
577
Important Points to Remember
578
Printing Multicast Traceroute (mtrace) Paths
578
Supported Error Codes
579
mtrace Scenarios
580
Object Tracking
586
Object Tracking Overview
586
Track Layer 2 Interfaces
587
Track Layer 3 Interfaces
587
Track IPv4 and IPv6 Routes
588
Set Tracking Delays
589
VRRP Object Tracking
589
Object Tracking Configuration
589
Tracking a Layer 2 Interface
589
Tracking a Layer 3 Interface
590
Track an IPv4/IPv6 Route
592
Displaying Tracked Objects
595
Open Shortest Path First (OSPFv2 and OSPFv3)
597
Protocol Overview
597
Autonomous System (AS) Areas
597
Area Types
598
Networks and Neighbors
599
Router Types
599
Designated and Backup Designated Routers
601
Link-State Advertisements (LSAs)
601
Router Priority and Cost
602
OSPF with Dell Networking OS
603
Graceful Restart
604
Fast Convergence (OSPFv2, IPv4 Only)
605
Multi-Process OSPFv2 with VRF
605
RFC-2328 Compliant OSPF Flooding
605
OSPF ACK Packing
606
Setting OSPF Adjacency with Cisco Routers
606
Configuration Information
607
Configuration Task List for OSPFv2 (OSPF for IPv4)
607
Configuration Task List for OSPFv3 (OSPF for IPv6)
621
Enabling IPv6 Unicast Routing
622
Assigning IPv6 Addresses on an Interface
622
Assigning Area ID on an Interface
623
Assigning OSPFv3 Process ID and Router ID Globally
623
Assigning OSPFv3 Process ID and Router ID to a VRF
624
Applying cost for OSPFv3
624
Configuring Stub Areas
625
Configuring Passive-Interface
625
Redistributing Routes
625
Configuring a Default Route
626
Applying cost for OSPFv3
626
Enabling OSPFv3 Graceful Restart
626
OSPFv3 Authentication Using IPsec
629
Troubleshooting OSPFv3
635
Policy-based Routing (PBR)
637
Overview
637
Implementing PBR
638
Configuration Task List for Policy-based Routing
638
PBR Exceptions (Permit)
639
Create a Redirect List
639
Create a Rule for a Redirect-list
639
Apply a Redirect-list to an Interface using a Redirect-group
641
Sample Configuration
643
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View Redirect-List GOLD
644
PIM Sparse-Mode (PIM-SM)
648
Implementation Information
648
Protocol Overview
648
Requesting Multicast Traffic
648
Refuse Multicast Traffic
649
Send Multicast Traffic
649
Configuring PIM-SM
649
Related Configuration Tasks
650
Enable PIM-SM
650
Configuring S,G Expiry Timers
651
Configuring a Static Rendezvous Point
652
Overriding Bootstrap Router Updates
652
Configuring a Designated Router
652
Creating Multicast Boundaries and Domains
653
PIM Source-Specific Mode (PIM-SSM)
654
Implementation Information
654
Important Points to Remember
654
Configure PIM-SSM
655
Related Configuration Tasks
655
Enabling PIM-SSM
655
Use PIM-SSM with IGMP Version 2 Hosts
655
Configuring PIM-SSM with IGMPv2
656
Electing an RP using the BSR Mechanism
657
Enabling RP to Server Specific Multicast Groups
657
Port Monitoring
659
Important Points to Remember
659
Port Monitoring
660
Configuring Port Monitoring
661
Configuring Monitor Multicast Queue
662
Enabling Flow-Based Monitoring
663
Remote Port Mirroring
663
Remote Port Mirroring Example
664
Configuring Remote Port Mirroring
664
Displaying Remote-Port Mirroring Configurations
666
Configuring the Sample Remote Port Mirroring
667
Encapsulated Remote Port Monitoring
670
ERPM Behavior on a typical Dell Networking OS
672
Decapsulation of ERPM packets at the Destination IP/ Analyzer
672
Port Monitoring on VLT
673
VLT Non-fail over Scenario
673
VLT Fail-over Scenario
674
RPM over VLT Scenarios
674
Private VLANs (PVLAN)
676
Private VLAN Concepts
676
Using the Private VLAN Commands
677
Configuration Task List
678
Creating PVLAN ports
678
Creating a Primary VLAN
679
Creating a Community VLAN
680
Creating an Isolated VLAN
680
Private VLAN Configuration Example
682
Inspecting the Private VLAN Configuration
683
Per-VLAN Spanning Tree Plus (PVST+)
685
Protocol Overview
685
Implementation Information
686
Configure Per-VLAN Spanning Tree Plus
686
Related Configuration Tasks
686
Enabling PVST+
686
Disabling PVST+
687
Influencing PVST+ Root Selection
687
Modifying Global PVST+ Parameters
689
Modifying Interface PVST+ Parameters
690
Configuring an EdgePort
691
PVST+ in Multi-Vendor Networks
691
Enabling PVST+ Extend System ID
691
PVST+ Sample Configurations
692
Quality of Service (QoS)
695
Implementation Information
697
Port-Based QoS Configurations
697
Setting dot1p Priorities for Incoming Traffic
697
Honoring dot1p Priorities on Ingress Traffic
698
Configuring Port-Based Rate Policing
699
Configuring Port-Based Rate Shaping
699
Policy-Based QoS Configurations
700
Classify Traffic
700
Dot1p to Queue Mapping Requirement
703
Create a QoS Policy
704
DSCP Color Maps
706
Create Policy Maps
708
Enabling QoS Rate Adjustment
712
Enabling Strict-Priority Queueing
712
Queue Classification Requirements for PFC Functionality
713
Support for marking dot1p value in L3 Input Qos Policy
713
Weighted Random Early Detection
714
Creating WRED Profiles
714
Applying a WRED Profile to Traffic
715
Displaying Default and Configured WRED Profiles
715
Displaying WRED Drop Statistics
715
Displaying egress–queue Statistics
716
Pre-Calculating Available QoS CAM Space
716
Specifying Policy-Based Rate Shaping in Packets Per Second
717
Configuring Policy-Based Rate Shaping
718
Configuring Weights and ECN for WRED
718
Global Service Pools With WRED and ECN Settings
719
Configuring WRED and ECN Attributes
720
Guidelines for Configuring ECN for Classifying and Color-Marking Packets
720
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class
721
Classifying Incoming Packets Using ECN and Color-Marking
721
Sample configuration to mark non-ecn packets as “yellow” with single traffic class
723
Applying Layer 2 Match Criteria on a Layer 3 Interface
724
Managing Hardware Buffer Statistics
725
Enabling Buffer Statistics Tracking
725
Routing Information Protocol (RIP)
727
Protocol Overview
727
RIPv1
727
RIPv2
727
Implementation Information
728
Configuration Information
728
Configuration Task List
728
RIP Configuration Example
734
Remote Monitoring (RMON)
740
Implementation Information
740
Fault Recovery
740
Setting the RMON Alarm
741
Configuring an RMON Event
741
Configuring RMON Collection Statistics
742
Configuring the RMON Collection History
742
Rapid Spanning Tree Protocol (RSTP)
744
Protocol Overview
744
Configuring Rapid Spanning Tree
744
Related Configuration Tasks
744
Important Points to Remember
744
RSTP and VLT
745
Configuring Interfaces for Layer 2 Mode
745
Enabling Rapid Spanning Tree Protocol Globally
746
Adding and Removing Interfaces
748
Modifying Global Parameters
748
Enabling SNMP Traps for Root Elections and Topology Changes
750
Modifying Interface Parameters
750
Enabling SNMP Traps for Root Elections and Topology Changes
750
Influencing RSTP Root Selection
751
Configuring an EdgePort
751
Configuring Fast Hellos for Link State Detection
752
Software-Defined Networking (SDN)
753
Security
754
AAA Accounting
754
Configuration Task List for AAA Accounting
754
AAA Authentication
756
Configuration Task List for AAA Authentication
757
Obscuring Passwords and Keys
760
AAA Authorization
760
Privilege Levels Overview
760
Configuration Task List for Privilege Levels
761
RADIUS
765
RADIUS Authentication
765
Configuration Task List for RADIUS
766
TACACS+
769
Configuration Task List for TACACS+
769
TACACS+ Remote Authentication
771
Command Authorization
772
Protection from TCP Tiny and Overlapping Fragment Attacks
772
Enabling SCP and SSH
772
Using SCP with SSH to Copy a Software Image
773
Removing the RSA Host Keys and Zeroizing Storage
774
Configuring When to Re-generate an SSH Key
774
Configuring the SSH Server Key Exchange Algorithm
775
Configuring the HMAC Algorithm for the SSH Server
775
Configuring the SSH Server Cipher List
776
Secure Shell Authentication
776
Troubleshooting SSH
779
Telnet
779
VTY Line and Access-Class Configuration
779
VTY Line Local Authentication and Authorization
780
VTY Line Remote Authentication and Authorization
780
VTY MAC-SA Filter Support
781
Role-Based Access Control
781
Overview of RBAC
782
User Roles
784
AAA Authentication and Authorization for Roles
787
Role Accounting
790
Display Information About User Roles
791
Two Factor Authentication (2FA)
792
Handling Access-Challenge Message
792
Configuring Challenge Response Authentication for SSHv2
792
SMS-OTP Mechanism
793
Configuring the System to Drop Certain ICMP Reply Messages
793
Service Provider Bridging
795
VLAN Stacking
795
Important Points to Remember
796
Configure VLAN Stacking
796
Creating Access and Trunk Ports
797
Enable VLAN-Stacking for a VLAN
798
Configuring the Protocol Type Value for the Outer VLAN Tag
798
Configuring Dell Networking OS Options for Trunk Ports
798
Debugging VLAN Stacking
799
VLAN Stacking in Multi-Vendor Networks
799
VLAN Stacking Packet Drop Precedence
803
Enabling Drop Eligibility
803
Honoring the Incoming DEI Value
804
Marking Egress Packets with a DEI Value
805
Dynamic Mode CoS for VLAN Stacking
805
Mapping C-Tag to S-Tag dot1p Values
806
Layer 2 Protocol Tunneling
807
Implementation Information
809
Enabling Layer 2 Protocol Tunneling
809
Specifying a Destination MAC Address for BPDUs
810
Setting Rate-Limit BPDUs
810
Debugging Layer 2 Protocol Tunneling
811
Provider Backbone Bridging
811
sFlow
812
Overview
812
Implementation Information
812
Important Points to Remember
813
Enabling Extended sFlow
813
Enabling and Disabling sFlow on an Interface
814
Enabling sFlow Max-Header Size Extended
814
sFlow Show Commands
815
Displaying Show sFlow Global
815
Displaying Show sFlow on an Interface
815
Displaying Show sFlow on a Stack-unit
816
Configuring Specify Collectors
816
Changing the Polling Intervals
816
Back-Off Mechanism
817
sFlow on LAG ports
817
Enabling Extended sFlow
817
Important Points to Remember
818
Simple Network Management Protocol (SNMP)
820
Protocol Overview
821
Implementation Information
821
SNMPv3 Compliance With FIPS
821
Configuration Task List for SNMP
822
Related Configuration Tasks
822
Important Points to Remember
823
Set up SNMP
823
Creating a Community
823
Setting Up User-Based Security (SNMPv3)
823
Reading Managed Object Values
825
Writing Managed Object Values
825
Configuring Contact and Location Information using SNMP
826
Subscribing to Managed Object Value Updates using SNMP
826
Enabling a Subset of SNMP Traps
827
Enabling an SNMP Agent to Notify Syslog Server Failure
828
Copy Configuration Files Using SNMP
829
Copying a Configuration File
830
Copying Configuration Files via SNMP
831
Copying the Startup-Config Files to the Running-Config
831
Copying the Startup-Config Files to the Server via FTP
832
Copying the Startup-Config Files to the Server via TFTP
832
Copy a Binary File to the Startup-Configuration
833
Additional MIB Objects to View Copy Statistics
833
Obtaining a Value for MIB Objects
834
MIB Support for 25G, 40G, 50G, 100G Optical Transceiver or DAC cable IDPROM user info
834
MIB Support to Display the Available Memory Size on Flash
836
Viewing the Available Flash Memory Size
836
MIB Support to Display the Software Core Files Generated by the System
836
Viewing the Software Core Files Generated by the System
837
MIB Support for PFC Storm Control
837
MIB Support for PFC no-drop-priority L2Dlf Drop
839
MIB Support for Monitoring the overall buffer usage for lossy and lossless traffic per XPE
840
SNMP Support for WRED Green/Yellow/Red Drop Counters
841
MIB Support to Display the Available Partitions on Flash
842
Viewing the Available Partitions on Flash
842
MIB Support to Display the ECN Marked Packets
843
MIB Support to Display Egress Queue Statistics
843
MIB Support to Display Egress Queue Statistics
844
Viewing the ECMP Group Count Information
844
MIB Support to Display the FEC BER Details
846
Viewing the FEC BER Details
848
MIB Support for entAliasMappingTable
850
Viewing the entAliasMappingTable MIB
850
MIB Support for LAG
850
Viewing the LAG MIB
852
Manage VLANs using SNMP
852
Creating a VLAN
852
Assigning a VLAN Alias
852
Displaying the Ports in a VLAN
853
Add Tagged and Untagged Ports to a VLAN
853
Managing Overload on Startup
854
Enabling and Disabling a Port using SNMP
854
Fetch Dynamic MAC Entries using SNMP
855
Deriving Interface Indices
856
Monitor Port-Channels
857
Troubleshooting SNMP Operation
858
Transceiver Monitoring
858
Storm Control
860
Configure Storm Control
860
Configuring Storm Control from INTERFACE Mode
860
Configuring Storm Control from CONFIGURATION Mode
861
PFC Storm
861
Detect PFC Storm
862
Restore Queue Drop State
862
View Details of Storm Control PFC
862
Spanning Tree Protocol (STP)
864
Protocol Overview
864
Configure Spanning Tree
865
Related Configuration Tasks
865
Important Points to Remember
865
Configuring Interfaces for Layer 2 Mode
866
Enabling Spanning Tree Protocol Globally
867
Adding an Interface to the Spanning Tree Group
869
Modifying Global Parameters
869
Modifying Interface STP Parameters
870
Enabling PortFast
871
Prevent Network Disruptions with BPDU Guard
871
Selecting STP Root
873
STP Root Guard
873
Root Guard Scenario
874
Configuring Root Guard
874
Enabling SNMP Traps for Root Elections and Topology Changes
875
Configuring Spanning Trees as Hitless
875
STP Loop Guard
876
Configuring Loop Guard
877
Displaying STP Guard Configuration
878
SupportAssist
879
Configuring SupportAssist Using a Configuration Wizard
880
Configuring SupportAssist Manually
880
Configuring SupportAssist Activity
882
Configuring SupportAssist Company
883
Configuring SupportAssist Person
884
Configuring SupportAssist Server
884
Viewing SupportAssist Configuration
885
System Time and Date
887
Network Time Protocol
887
Protocol Overview
888
Configure the Network Time Protocol
888
Enabling NTP
889
Configuring NTP Broadcasts
889
Disabling NTP on an Interface
890
Configuring a Source IP Address for NTP Packets
890
Configuring NTP Authentication
890
Configuring a Custom-defined Period for NTP time Synchronization
893
Dell Networking OS Time and Date
893
Configuration Task List
893
Setting the Time and Date for the Switch Software Clock
893
Setting the Timezone
894
Set Daylight Saving Time
894
Setting Daylight Saving Time Once
894
Setting Recurring Daylight Saving Time
895
Tunneling
897
Configuring a Tunnel
897
Configuring Tunnel Keepalive Settings
898
Configuring a Tunnel Interface
899
Configuring Tunnel Allow-Remote Decapsulation
899
Configuring Tunnel source anylocal Decapsulation
900
Guidelines for Configuring Multipoint Receive-Only Tunnels
900
Multipoint Receive-Only Tunnels
900
Uplink Failure Detection (UFD)
901
Feature Description
901
How Uplink Failure Detection Works
902
UFD and NIC Teaming
903
Important Points to Remember
903
Configuring Uplink Failure Detection
904
Clearing a UFD-Disabled Interface
905
Displaying Uplink Failure Detection
906
Sample Configuration: Uplink Failure Detection
908
Upgrade Procedures
909
Get Help with Upgrades
909
Virtual LANs (VLANs)
910
Default VLAN
911
Port-Based VLANs
911
VLANs and Port Tagging
912
Configuration Task List
912
Creating a Port-Based VLAN
912
Assigning Interfaces to a VLAN
913
Moving Untagged Interfaces
914
Assigning an IP Address to a VLAN
915
Configuring Native VLANs
915
Enabling Null VLAN as the Default VLAN
916
Virtual Link Trunking (VLT)
917
Overview
917
VLT Terminology
920
Layer-2 Traffic in VLT Domains
921
Interspersed VLANs
922
VLT on Core Switches
922
Enhanced VLT
923
Configure Virtual Link Trunking
924
Important Points to Remember
924
Configuration Notes
925
Primary and Secondary VLT Peers
928
RSTP and VLT
928
VLT Bandwidth Monitoring
929
VLT and Stacking
929
VLT and IGMP Snooping
929
VLT IPv6
929
VLT Port Delayed Restoration
930
PIM-Sparse Mode Support on VLT
930
VLT Routing
932
Non-VLT ARP Sync
935
RSTP Configuration
936
Preventing Forwarding Loops in a VLT Domain
936
Sample RSTP Configuration
936
Configuring VLT
937
PVST+ Configuration
947
Sample PVST+ Configuration
947
Peer Routing Configuration Example
948
eVLT Configuration Example
958
eVLT Configuration Step Examples
958
PIM-Sparse Mode Configuration Example
960
Verifying a VLT Configuration
961
Additional VLT Sample Configurations
964
Troubleshooting VLT
966
Reconfiguring Stacked Switches as VLT
967
Specifying VLT Nodes in a PVLAN
967
Association of VLTi as a Member of a PVLAN
968
MAC Synchronization for VLT Nodes in a PVLAN
968
PVLAN Operations When One VLT Peer is Down
969
PVLAN Operations When a VLT Peer is Restarted
969
Interoperation of VLT Nodes in a PVLAN with ARP Requests
969
Scenarios for VLAN Membership and MAC Synchronization With VLT Nodes in PVLAN
969
Configuring a VLT VLAN or LAG in a PVLAN
971
Proxy ARP Capability on VLT Peer Nodes
973
Working of Proxy ARP for VLT Peer Nodes
973
VLT Nodes as Rendezvous Points for Multicast Resiliency
974
Configuring VLAN-Stack over VLT
975
IPv6 Peer Routing in VLT Domains Overview
978
IPv6 Peer Routing
978
Synchronization of IPv6 ND Entries in a VLT Domain
978
Synchronization of IPv6 ND Entries in a Non-VLT Domain
979
Tunneling IPv6 ND in a VLT Domain
979
Sample Configuration of IPv6 Peer Routing in a VLT Domain
980
VLT Proxy Gateway
984
Proxy Gateway in VLT Domains
984
Guidelines for Enabling the VLT Proxy Gateway
985
Enable VLT Proxy Gateway
986
LLDP Organizational TLV for Proxy Gateway
986
Configuring a Static VLT Proxy Gateway
989
Configuring an LLDP VLT Proxy Gateway
989
VLT Proxy Gateway Sample Topology
989
Virtual Extensible LAN (VXLAN)
994
Overview
994
Components of VXLAN network
995
Components of VXLAN network
995
Functional Overview of VXLAN Gateway
996
VXLAN Frame Format
996
Components of VXLAN Frame Format
997
Configuring and Controlling VXLAN from the NVP Controller GUI
997
Configuring VxLAN Gateway
999
Connecting to an NVP Controller
999
Advertising VXLAN Access Ports to Controller
1000
Displaying VXLAN Configurations
1001
VXLAN Service nodes for BFD
1002
Examples of the show bfd neighbors command.
1003
Static Virtual Extensible LAN (VXLAN)
1003
Configuring Static VXLAN
1003
Limitations on Static VXLAN
1004
Displaying Static VXLAN Configurations
1004
Preserving 802.1 p value across VXLAN tunnels
1005
Virtual Routing and Forwarding (VRF)
1006
VRF Overview
1006
VRF Configuration Notes
1007
DHCP
1009
VRF Configuration
1009
Loading VRF CAM
1009
Creating a Non-Default VRF Instance
1009
Assigning an Interface to a VRF
1010
Assigning a Front-end Port to a Management VRF
1010
View VRF Instance Information
1010
Assigning an OSPF Process to a VRF Instance
1011
Configuring VRRP on a VRF Instance
1011
Configuring Management VRF
1012
Configuring a Static Route
1012
Sample VRF Configuration
1013
Route Leaking VRFs
1017
Dynamic Route Leaking
1018
Configuring Route Leaking without Filtering Criteria
1018
Configuring Route Leaking with Filtering
1021
Virtual Router Redundancy Protocol (VRRP)
1024
VRRP Overview
1024
VRRP Benefits
1025
VRRP Implementation
1025
VRRP Configuration
1026
Configuration Task List
1026
Setting VRRP Initialization Delay
1035
Sample Configurations
1036
VRRP for an IPv4 Configuration
1036
VRRP in a VRF Configuration
1039
VRRP for IPv6 Configuration
1044
Debugging and Diagnostics
1048
Offline Diagnostics
1048
Important Points to Remember
1048
Running Offline Diagnostics
1048
Trace Logs
1049
Auto Save on Crash or Rollover
1049
Hardware Watchdog Timer
1049
Enabling Environmental Monitoring
1049
Recognize an Overtemperature Condition
1050
Troubleshoot an Over-temperature Condition
1051
Recognize an Under-Voltage Condition
1052
Troubleshoot an Under-Voltage Condition
1052
Buffer Tuning
1052
Troubleshooting Packet Loss
1053
Displaying Drop Counters
1054
Dataplane Statistics
1055
Display Stack Port Statistics
1056
Display Stack Member Counters
1056
Enabling Application Core Dumps
1058
Mini Core Dumps
1058
Enabling TCP Dumps
1059
Standards Compliance
1061
IEEE Compliance
1061
RFC and I-D Compliance
1062
General Internet Protocols
1062
General IPv4 Protocols
1063
General IPv6 Protocols
1064
Border Gateway Protocol (BGP)
1066
Open Shortest Path First (OSPF)
1066
Intermediate System to Intermediate System (IS-IS)
1067
Routing Information Protocol (RIP)
1067
Multicast
1068
Network Management
1068
MIB Location
1072
X.509v3
1073
Introduction to X.509v3 certification
1073
X.509v3 certificates
1073
Certificate authority (CA)
1073
Certificate signing requests (CSR)
1073
How certificates are requested
1073
Advantages of X.509v3 certificates
1074
X.509v3 support in Dell Networking OS
1074
Information about installing CA certificates
1076
Installing CA certificate
1076
Information about Creating Certificate Signing Requests (CSR)
1076
Creating Certificate Signing Requests (CSR)
1077
Information about installing trusted certificates
1078
Installing trusted certificates
1078
Transport layer security (TLS)
1078
Syslog over TLS
1079
Online Certificate Status Protocol (OSCP)
1079
Configuring OCSP setting on CA
1079
Configuring OCSP behavior
1080
Configuring Revocation Behavior
1080
Configuring OSCP responder preference
1080
Verifying certificates
1080
Verifying Server certificates
1081
Verifying Client Certificates
1081
Event logging
1081
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
36.14 MB
Category
Software
Pages
1677
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
33.11 MB
Category
Software
Pages
999
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
2.27 MB
Category
Network switches
Pages
51
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
6.17 MB
Category
Software
Pages
1667
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
22.11 MB
Category
Software
Pages
1070
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
11.46 MB
Category
Software
Pages
1666
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
24.21 MB
Category
Software
Pages
1070
Language
English
View document
Dell PowerSwitch S6100-ON User guide
Type
User guide
Brand
Dell
Size
7.03 MB
Category
Software
Pages
1439
Language
English
View document