Networking S3100 Series

Dell Networking S3100 Series, OS9 User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell Networking S3100 Series User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell EMC Configuration Guide for the S3100
Series
9.14.2.8
September 2020
Rev. A00
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
Chapter 1: About this Guide......................................................................................................... 31
Audience...............................................................................................................................................................................31
Conventions.........................................................................................................................................................................31
Related Documents........................................................................................................................................................... 31
Chapter 2: Configuration Fundamentals...................................................................................... 32
Accessing the Command Line........................................................................................................................................ 32
CLI Modes........................................................................................................................................................................... 32
Navigating CLI Modes................................................................................................................................................ 34
The do Command.............................................................................................................................................................. 36
Undoing Commands..........................................................................................................................................................37
Obtaining Help....................................................................................................................................................................37
Entering and Editing Commands................................................................................................................................... 38
Command History..............................................................................................................................................................39
Filtering show Command Outputs.................................................................................................................................39
Multiple Users in Configuration Mode..........................................................................................................................40
Chapter 3: Getting Started.......................................................................................................... 41
Console Access..................................................................................................................................................................42
Serial Console............................................................................................................................................................... 42
Accessing the CLI Interface and Running Scripts Using SSH................................................................................43
Default Configuration....................................................................................................................................................... 44
Configuring a Host Name................................................................................................................................................ 44
Accessing the System Remotely................................................................................................................................... 44
Configure the Management Port IP Address........................................................................................................44
Configure a Management Route..............................................................................................................................45
Configuring a Username and Password................................................................................................................. 45
Configuring the Enable Password................................................................................................................................. 46
Configuration File Management.....................................................................................................................................46
Copy Files to and from the System........................................................................................................................ 46
Mounting an NFS File System.................................................................................................................................. 47
Save the Running-Configuration............................................................................................................................. 49
Configure the Overload Bit for a Startup Scenario.............................................................................................49
Viewing Files................................................................................................................................................................. 49
Compressing Configuration Files.............................................................................................................................50
Managing the File System...............................................................................................................................................52
Enabling Software Features on Devices Using a Command Option..................................................................... 53
View Command History................................................................................................................................................... 53
Upgrading Dell EMC Networking OS............................................................................................................................55
Verify Software Images Before Installation................................................................................................................ 55
Using HTTP for File Transfers....................................................................................................................................... 56
Chapter 4: Management.............................................................................................................. 57
Configuring Privilege Levels............................................................................................................................................57
Contents
Contents 3
Removing a Command from EXEC Mode..............................................................................................................58
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 58
Allowing Access to CONFIGURATION Mode Commands................................................................................. 58
Allowing Access to Different Modes...................................................................................................................... 58
Applying a Privilege Level to a Username............................................................................................................. 60
Applying a Privilege Level to a Terminal Line....................................................................................................... 60
Configuring Logging......................................................................................................................................................... 60
Audit and Security Logs.............................................................................................................................................60
Configuring Logging Format .............................................................................................................................62
Display the Logging Buffer and the Logging Configuration..............................................................................62
Setting Up a Secure Connection to a Syslog Server.................................................................................63
Sending System Messages to a Syslog Server.................................................................................................... 64
Track Login Activity..........................................................................................................................................................64
Restrictions for Tracking Login Activity................................................................................................................ 64
Configuring Login Activity Tracking........................................................................................................................64
Display Login Statistics.............................................................................................................................................. 65
Limit Concurrent Login Sessions...................................................................................................................................66
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 66
Configuring Concurrent Session Limit....................................................................................................................67
Enabling the System to Clear Existing Sessions.................................................................................................. 67
Enabling Secured CLI Mode............................................................................................................................................68
Log Messages in the Internal Buffer............................................................................................................................ 68
Disabling System Logging............................................................................................................................................... 68
Sending System Messages to a Syslog Server..........................................................................................................69
Configuring a UNIX System as a Syslog Server...................................................................................................69
Changing System Logging Settings..............................................................................................................................69
Display the Logging Buffer and the Logging Configuration....................................................................................70
Configuring a UNIX Logging Facility Level..................................................................................................................70
Synchronizing Log Messages.......................................................................................................................................... 71
Enabling Timestamp on Syslog Messages................................................................................................................... 72
File Transfer Services.......................................................................................................................................................74
Enabling the FTP Server............................................................................................................................................75
Configuring FTP Server Parameters.......................................................................................................................75
Configuring FTP Client Parameters........................................................................................................................ 76
Terminal Lines.....................................................................................................................................................................76
Denying and Permitting Access to a Terminal Line............................................................................................. 76
Configuring Login Authentication for Terminal Lines..........................................................................................77
Setting Timeout for EXEC Privilege Mode..................................................................................................................78
Using Telnet to get to Another Network Device....................................................................................................... 78
Lock CONFIGURATION Mode........................................................................................................................................79
Viewing the Reason for Last System Reboot............................................................................................................ 80
Chapter 5: 802.1X........................................................................................................................ 81
Port-Authentication Process..........................................................................................................................................82
EAP over RADIUS........................................................................................................................................................83
Configuring 802.1X............................................................................................................................................................84
Important Points to Remember..................................................................................................................................... 84
Enabling 802.1X................................................................................................................................................................. 85
Configuring dot1x Profile ................................................................................................................................................86
Configuring MAC addresses for a do1x Profile.......................................................................................................... 86
4
Contents
Configuring the Static MAB and MAB Profile ...........................................................................................................87
Configuring Critical VLAN .............................................................................................................................................. 88
Configuring Request Identity Re-Transmissions........................................................................................................88
Configuring a Quiet Period after a Failed Authentication..................................................................................89
Forcibly Authorizing or Unauthorizing a Port.............................................................................................................90
Re-Authenticating a Port................................................................................................................................................ 90
Configuring Timeouts........................................................................................................................................................91
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 92
Guest and Authentication-Fail VLANs..........................................................................................................................93
Configuring a Guest VLAN........................................................................................................................................ 94
Configuring an Authentication-Fail VLAN............................................................................................................. 94
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).... 96
Optimizing CAM Utilization During the Attachment of ACLs to VLANs............................................................. 96
Guidelines for Configuring ACL VLAN Groups........................................................................................................... 97
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.......................................... 97
Configuring ACL VLAN Groups................................................................................................................................ 97
Configuring FP Blocks for VLAN Parameters.......................................................................................................98
Viewing CAM Usage......................................................................................................................................................... 99
Allocating FP Blocks for VLAN Processes.................................................................................................................100
Chapter 7: Access Control Lists (ACLs)......................................................................................101
IP Access Control Lists (ACLs)....................................................................................................................................102
CAM Usage................................................................................................................................................................. 102
Implementing ACLs on Dell EMC Networking OS..............................................................................................103
Important Points to Remember....................................................................................................................................104
Configuration Task List for Route Maps..............................................................................................................105
Configuring Match Routes.......................................................................................................................................107
Configuring Set Conditions..................................................................................................................................... 108
Configure a Route Map for Route Redistribution.............................................................................................. 108
Configure a Route Map for Route Tagging......................................................................................................... 109
Continue Clause......................................................................................................................................................... 109
IP Fragment Handling......................................................................................................................................................110
IP Fragments ACL Examples....................................................................................................................................110
Layer 4 ACL Rules Examples................................................................................................................................... 110
Configure a Standard IP ACL......................................................................................................................................... 111
Configuring a Standard IP ACL Filter.....................................................................................................................112
Configure an Extended IP ACL......................................................................................................................................113
Configuring Filters with a Sequence Number...................................................................................................... 113
Configuring Filters Without a Sequence Number............................................................................................... 114
Configure Layer 2 and Layer 3 ACLs........................................................................................................................... 114
Assign an IP ACL to an Interface..................................................................................................................................115
Applying an IP ACL...........................................................................................................................................................115
Counting ACL Hits......................................................................................................................................................116
Configure Ingress ACLs.................................................................................................................................................. 116
Configure Egress ACLs................................................................................................................................................... 117
Applying Egress Layer 3 ACLs (Control-Plane)...................................................................................................117
IP Prefix Lists.................................................................................................................................................................... 118
Configuration Task List for Prefix Lists.................................................................................................................118
Contents
5
ACL Remarks..................................................................................................................................................................... 121
Configuring a Remark............................................................................................................................................... 122
Deleting a Remark......................................................................................................................................................122
ACL Resequencing...........................................................................................................................................................123
Resequencing an ACL or Prefix List......................................................................................................................123
Route Maps.......................................................................................................................................................................124
Logging of ACL Processes............................................................................................................................................ 125
Guidelines for Configuring ACL Logging.............................................................................................................. 125
Configuring ACL Logging......................................................................................................................................... 126
Flow-Based Monitoring.................................................................................................................................................. 126
Enabling Flow-Based Monitoring............................................................................................................................128
Chapter 8: Bidirectional Forwarding Detection (BFD)................................................................ 130
How BFD Works...............................................................................................................................................................130
BFD Packet Format....................................................................................................................................................131
BFD Sessions.............................................................................................................................................................. 132
BFD Three-Way Handshake.................................................................................................................................... 133
Session State Changes.............................................................................................................................................134
Important Points to Remember....................................................................................................................................134
Configure BFD.................................................................................................................................................................. 134
Configure BFD for Physical Ports..........................................................................................................................135
Configure BFD for Static Routes........................................................................................................................... 136
Configure BFD for IPv6 Static Routes................................................................................................................. 139
Configure BFD for OSPF.......................................................................................................................................... 141
Configure BFD for OSPFv3.....................................................................................................................................145
Configure BFD for IS-IS............................................................................................................................................147
Configure BFD for BGP............................................................................................................................................149
Configure BFD for VRRP......................................................................................................................................... 156
Configuring Protocol Liveness................................................................................................................................158
Chapter 9: Border Gateway Protocol (BGP)............................................................................... 159
BGP IP version 4 (BGPv4) Overview......................................................................................................................... 159
BGP Autonomous Systems..................................................................................................................................... 159
AS4 Number Representation................................................................................................................................... 161
Four-Byte AS Numbers............................................................................................................................................ 163
BGP router ID............................................................................................................................................................. 163
Sessions and Peers....................................................................................................................................................163
Establish a Session.................................................................................................................................................... 163
BGP Attributes for selecting Best Path............................................................................................................... 164
Multiprotocol BGP..................................................................................................................................................... 169
BGP global and address family configuration......................................................................................................170
Implement BGP with Dell EMC Networking OS.................................................................................................. 171
Configuration Information........................................................................................................................................ 174
Basic BGP configuration tasks..................................................................................................................................... 175
Prerequisite for configuring a BGP network....................................................................................................... 175
Restrictions..................................................................................................................................................................175
Enabling BGP.............................................................................................................................................................. 175
Enabling four-byte autonomous system numbers..............................................................................................177
Changing a BGP router ID........................................................................................................................................178
6
Contents
Configuring AS4 Number Representations..........................................................................................................178
Configuring a BGP peer............................................................................................................................................179
Example-Configuring BGP routing between peers............................................................................................180
BGP peer group...........................................................................................................................................................181
Advanced BGP configuration tasks.............................................................................................................................188
Route-refresh and Soft-reconfiguration.............................................................................................................. 188
Aggregating Routes...................................................................................................................................................190
Filtering BGP...............................................................................................................................................................192
Configuring BGP Fast Fall-Over.............................................................................................................................197
Configuring Passive Peering................................................................................................................................... 199
Enabling Graceful Restart.......................................................................................................................................200
Redistributing Routes............................................................................................................................................... 201
Redistributing iBGP Routes into IGP.....................................................................................................................201
Enabling Additional Paths........................................................................................................................................204
Configuring IP Community Lists............................................................................................................................204
Configuring an IP Extended Community List..................................................................................................... 205
Configure BGP attributes....................................................................................................................................... 206
Enabling Multipath.....................................................................................................................................................210
Route Reflectors........................................................................................................................................................210
Enabling Route Flap Dampening.............................................................................................................................212
Changing BGP keepalive and hold timers............................................................................................................ 214
Setting the extended timer..................................................................................................................................... 214
Enabling or disabling BGP neighbors.....................................................................................................................215
Route Map Continue................................................................................................................................................. 216
Configuring BGP Confederations...........................................................................................................................217
Configuring a BGP VRF address family................................................................................................................ 217
Maintaining Existing AS Numbers During an AS Migration..............................................................................218
Allowing an AS Number to Appear in its Own AS Path.................................................................................... 219
Enabling MBGP Configurations............................................................................................................................. 220
MBGP support for IPv6...........................................................................................................................................220
Configuring IPv6 MBGP between peers............................................................................................................. 220
Example-Configuring IPv4 and IPv6 neighbors.................................................................................................. 221
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor...................................223
BGP Regular Expression Optimization.................................................................................................................225
Debugging BGP......................................................................................................................................................... 225
Chapter 10: Content Addressable Memory (CAM)......................................................................227
CAM Allocation................................................................................................................................................................ 227
Test CAM Usage............................................................................................................................................................. 229
View CAM-ACL Settings...............................................................................................................................................229
View CAM Usage............................................................................................................................................................. 231
Configuring CAM Threshold and Silence Period...................................................................................................... 231
CAM Optimization...........................................................................................................................................................232
Troubleshoot CAM Profiling......................................................................................................................................... 233
QoS CAM Region Limitation...................................................................................................................................233
Chapter 11: Control Plane Policing (CoPP).................................................................................234
Configure Control Plane Policing................................................................................................................................ 235
Configuring CoPP for Protocols............................................................................................................................236
Contents
7
Configuring CoPP for CPU Queues...................................................................................................................... 237
CoPP for OSPFv3 Packets.....................................................................................................................................238
Configuring CoPP for OSPFv3............................................................................................................................... 241
Displaying CoPP Configuration .............................................................................................................................242
Chapter 12: Dynamic Host Configuration Protocol (DHCP)........................................................ 244
DHCP Packet Format and Options.............................................................................................................................244
Assign an IP Address using DHCP.............................................................................................................................. 246
Implementation Information..........................................................................................................................................246
Configure the System to be a DHCP Server............................................................................................................247
Configuring the Server for Automatic Address Allocation.............................................................................. 247
Specifying a Default Gateway................................................................................................................................248
Configure a Method of Hostname Resolution....................................................................................................249
Using DNS for Address Resolution....................................................................................................................... 249
Using NetBIOS WINS for Address Resolution....................................................................................................249
Creating Manual Binding Entries........................................................................................................................... 249
Debugging the DHCP Server................................................................................................................................. 250
Using DHCP Clear Commands...............................................................................................................................250
Configure the System to be a Relay Agent..............................................................................................................250
Configure the System to be a DHCP Client............................................................................................................. 252
Configuring the DHCP Client System.................................................................................................................. 252
DHCP Client on a Management Interface...........................................................................................................253
DHCP Client Operation with Other Features.....................................................................................................254
DHCP Relay When DHCP Server and Client are in Different VRFs................................................................... 255
Configuring Route Leaking between VRFs on DHCP Relay Agent...............................................................255
Non-default VRF configuration for DHCPv6 helper address...............................................................................256
Configuring DHCP relay source interface.................................................................................................................256
Global DHCP relay source IPv4 or IPv6 configuration ....................................................................................256
Interface level DHCP relay source IPv4 or IPv6 configuration .....................................................................257
Configure the System for User Port Stacking (Option 230)............................................................................... 258
Configure Secure DHCP............................................................................................................................................... 258
Option 82 (DHCPv4 relay options).......................................................................................................................258
DHCPv6 relay agent options..................................................................................................................................259
DHCP Snooping.........................................................................................................................................................259
Drop DHCP Packets on Snooped VLANs Only.................................................................................................. 264
Dynamic ARP Inspection......................................................................................................................................... 264
Configuring Dynamic ARP Inspection...................................................................................................................264
Source Address Validation............................................................................................................................................266
Enabling IP Source Address Validation................................................................................................................ 266
DHCP MAC Source Address Validation...............................................................................................................266
Enabling IP+MAC Source Address Validation.....................................................................................................267
Viewing the Number of SAV Dropped Packets..................................................................................................267
Clearing the Number of SAV Dropped Packets.................................................................................................268
Chapter 13: Equal Cost Multi-Path (ECMP)............................................................................... 269
ECMP for Flow-Based Affinity.................................................................................................................................... 269
Configuring the Hash Algorithm............................................................................................................................ 269
Enabling Deterministic ECMP Next Hop............................................................................................................. 269
Configuring the Hash Algorithm Seed..................................................................................................................270
8
Contents
Link Bundle Monitoring..................................................................................................................................................270
Managing ECMP Group Paths................................................................................................................................ 271
Creating an ECMP Group Bundle...........................................................................................................................271
Modifying the ECMP Group Threshold.................................................................................................................271
Chapter 14: FIPS Cryptography................................................................................................. 273
Configuration Tasks........................................................................................................................................................273
Preparing the System.....................................................................................................................................................273
Enabling FIPS Mode........................................................................................................................................................274
Generating Host-Keys....................................................................................................................................................274
Monitoring FIPS Mode Status......................................................................................................................................274
Disabling FIPS Mode.......................................................................................................................................................275
Chapter 15: Force10 Resilient Ring Protocol (FRRP)..................................................................276
Protocol Overview.......................................................................................................................................................... 276
Ring Status..................................................................................................................................................................277
Multiple FRRP Rings................................................................................................................................................. 277
Important FRRP Points............................................................................................................................................278
Important FRRP Concepts......................................................................................................................................279
Implementing FRRP........................................................................................................................................................ 279
FRRP Configuration....................................................................................................................................................... 280
Creating the FRRP Group.......................................................................................................................................280
Configuring the Control VLAN...............................................................................................................................280
Configuring and Adding the Member VLANs...................................................................................................... 281
Setting the FRRP Timers........................................................................................................................................ 282
Clearing the FRRP Counters.................................................................................................................................. 282
Viewing the FRRP Configuration...........................................................................................................................282
Viewing the FRRP Information.............................................................................................................................. 282
Troubleshooting FRRP...................................................................................................................................................283
Sample Configuration and Topology...........................................................................................................................283
Chapter 16: GARP VLAN Registration Protocol (GVRP)............................................................. 285
Configure GVRP..............................................................................................................................................................286
Enabling GVRP Globally.................................................................................................................................................286
Enabling GVRP on a Layer 2 Interface.......................................................................................................................287
Configure GVRP Registration...................................................................................................................................... 287
Configure a GARP Timer...............................................................................................................................................288
RPM Redundancy........................................................................................................................................................... 288
Chapter 17: High Availability (HA)............................................................................................. 289
Component Redundancy...............................................................................................................................................289
Automatic and Manual Stack Unit Failover.........................................................................................................289
Synchronization between Management and Standby Units...........................................................................290
Forcing a Stack Unit Failover.................................................................................................................................290
Disabling Auto-Reboot..............................................................................................................................................291
Pre-Configuring a Stack Unit Slot...............................................................................................................................291
Removing a Provisioned Logical Stack Unit..............................................................................................................291
Hitless Behavior............................................................................................................................................................... 291
Graceful Restart..............................................................................................................................................................292
Contents
9
Software Resiliency........................................................................................................................................................292
Software Component Health Monitoring............................................................................................................ 292
System Health Monitoring...................................................................................................................................... 292
Failure and Event Logging.......................................................................................................................................292
Hot-Lock Behavior..........................................................................................................................................................293
Chapter 18: Internet Group Management Protocol (IGMP)........................................................ 294
IGMP Protocol Overview.............................................................................................................................................. 294
IGMP Version 2..........................................................................................................................................................294
IGMP Version 3..........................................................................................................................................................296
Configure IGMP...............................................................................................................................................................298
Viewing IGMP Enabled Interfaces.............................................................................................................................. 299
Selecting an IGMP Version...........................................................................................................................................299
Viewing IGMP Groups....................................................................................................................................................300
Adjusting Timers..............................................................................................................................................................300
Adjusting Query and Response Timers................................................................................................................ 300
Preventing a Host from Joining a Group................................................................................................................... 301
Enabling IGMP Immediate-Leave................................................................................................................................ 303
IGMP Snooping................................................................................................................................................................304
Configuring IGMP Snooping................................................................................................................................... 304
Removing a Group-Port Association.................................................................................................................... 304
Disabling Multicast Flooding...................................................................................................................................305
Specifying a Port as Connected to a Multicast Router...................................................................................305
Configuring the Switch as Querier....................................................................................................................... 305
Fast Convergence after MSTP Topology Changes................................................................................................306
Egress Interface Selection (EIS) for HTTP and IGMP Applications...................................................................306
Designating a Multicast Router Interface.................................................................................................................. 313
Chapter 19: Interfaces............................................................................................................... 314
Interface Types................................................................................................................................................................ 315
Optional Modules............................................................................................................................................................. 315
View Basic Interface Information.................................................................................................................................315
Resetting an Interface to its Factory Default State................................................................................................317
Enabling Energy Efficient Ethernet............................................................................................................................. 317
View EEE Information..................................................................................................................................................... 317
Clear EEE Counters........................................................................................................................................................ 322
Enabling a Physical Interface....................................................................................................................................... 322
Physical Interfaces..........................................................................................................................................................323
Configuration Task List for Physical Interfaces.................................................................................................323
Overview of Layer Modes.......................................................................................................................................323
Configuring Layer 2 (Data Link) Mode................................................................................................................ 323
Configuring Layer 2 (Interface) Mode................................................................................................................. 324
Configuring Layer 3 (Network) Mode..................................................................................................................324
Configuring Layer 3 (Interface) Mode.................................................................................................................325
Automatic recovery of an Err-disabled interface....................................................................................................325
Configuring an automatic recovery for an Err-disabled interface.................................................................326
Egress Interface Selection (EIS).................................................................................................................................326
Configuring EIS.......................................................................................................................................................... 327
Management Interfaces.................................................................................................................................................327
10
Contents
Configuring Management Interfaces....................................................................................................................327
Configuring a Management Interface on an Ethernet Port............................................................................328
VLAN Interfaces..............................................................................................................................................................329
Loopback Interfaces.......................................................................................................................................................329
Null Interfaces..................................................................................................................................................................330
Configuring Port Delay.................................................................................................................................................. 330
Port Channel Interfaces................................................................................................................................................ 330
Port Channel Definition and Standards................................................................................................................ 331
Port Channel Benefits...............................................................................................................................................331
Port Channel Implementation................................................................................................................................. 331
Interfaces in Port Channels..................................................................................................................................... 331
Configuration Tasks for Port Channel Interfaces..............................................................................................332
Creating a Port Channel.......................................................................................................................................... 332
Adding a Physical Interface to a Port Channel.................................................................................................. 332
Reassigning an Interface to a New Port Channel............................................................................................. 334
Configuring the Minimum Oper Up Links in a Port Channel...........................................................................334
Adding or Removing a Port Channel from a VLAN........................................................................................... 335
Assigning an IP Address to a Port Channel........................................................................................................ 336
Deleting or Disabling a Port Channel....................................................................................................................336
Load Balancing Through Port Channels.............................................................................................................. 336
Load-Balancing Method...........................................................................................................................................336
Changing the Hash Algorithm................................................................................................................................ 337
Bulk Configuration.......................................................................................................................................................... 338
Interface Range......................................................................................................................................................... 338
Bulk Configuration Examples..................................................................................................................................338
Defining Interface Range Macros............................................................................................................................... 340
Define the Interface Range.................................................................................................................................... 340
Choosing an Interface-Range Macro................................................................................................................... 340
Monitoring and Maintaining Interfaces.......................................................................................................................341
Maintenance Using TDR.......................................................................................................................................... 342
Link Dampening............................................................................................................................................................... 342
Enabling Link Dampening.........................................................................................................................................345
Link Bundle Monitoring..................................................................................................................................................346
Using Ethernet Pause Frames for Flow Control......................................................................................................346
Enabling Pause Frames............................................................................................................................................ 347
Configure the MTU Size on an Interface.................................................................................................................. 347
Port-Pipes.........................................................................................................................................................................348
Auto-Negotiation on Ethernet Interfaces................................................................................................................. 348
Setting the Speed of Ethernet Interfaces.......................................................................................................... 349
Set Auto-Negotiation Options............................................................................................................................... 350
Provisioning Combo Ports............................................................................................................................................. 351
View Advanced Interface Information....................................................................................................................... 352
Configuring the Interface Sampling Size.............................................................................................................352
Configuring the Traffic Sampling Size Globally....................................................................................................... 353
Dynamic Counters...........................................................................................................................................................354
Clearing Interface Counters................................................................................................................................... 355
Chapter 20: Internet Protocol Security (IPSec).........................................................................356
Configuring IPSec ..........................................................................................................................................................356
Contents
11
Chapter 21: IPv4 Routing...........................................................................................................358
IP Addresses.................................................................................................................................................................... 359
Configuration Tasks for IP Addresses....................................................................................................................... 359
Assigning IP Addresses to an Interface.....................................................................................................................359
Configuring Static Routes............................................................................................................................................ 360
Adding description for IPv4 and IPv6 static routes...........................................................................................361
Configure Static Routes for the Management Interface...................................................................................... 362
IPv4 Path MTU Discovery Overview..........................................................................................................................362
Using the Configured Source IP Address in ICMP Messages..............................................................................363
Configuring the Duration to Establish a TCP Connection.....................................................................................363
Enabling Directed Broadcast........................................................................................................................................363
Resolution of Host Names............................................................................................................................................ 364
Enabling Dynamic Resolution of Host Names.......................................................................................................... 364
Specifying the Local System Domain and a List of Domains............................................................................... 365
Configuring DNS with Traceroute.............................................................................................................................. 365
ARP.................................................................................................................................................................................... 366
Configuration Tasks for ARP....................................................................................................................................... 366
Configuring Static ARP Entries................................................................................................................................... 366
Enabling Proxy ARP........................................................................................................................................................367
Clearing ARP Cache....................................................................................................................................................... 367
ARP Learning via Gratuitous ARP...............................................................................................................................367
Enabling ARP Learning via Gratuitous ARP.............................................................................................................. 367
ARP Learning via ARP Request................................................................................................................................... 368
Configuring ARP Retries............................................................................................................................................... 368
ICMP.................................................................................................................................................................................. 369
Configuration Tasks for ICMP..................................................................................................................................... 369
Enabling ICMP Unreachable Messages..................................................................................................................... 369
ICMP Redirects............................................................................................................................................................... 369
UDP Helper.......................................................................................................................................................................370
Enabling UDP Helper.......................................................................................................................................................371
Configuring a Broadcast Address................................................................................................................................ 371
Configurations Using UDP Helper...............................................................................................................................372
UDP Helper with Broadcast-All Addresses............................................................................................................... 372
UDP Helper with Subnet Broadcast Addresses.......................................................................................................373
UDP Helper with Configured Broadcast Addresses............................................................................................... 373
UDP Helper with No Configured Broadcast Addresses.........................................................................................374
Troubleshooting UDP Helper........................................................................................................................................374
Chapter 22: IPv6 Routing.......................................................................................................... 375
Protocol Overview.......................................................................................................................................................... 375
Extended Address Space.........................................................................................................................................375
Stateless Autoconfiguration................................................................................................................................... 375
IPv6 Headers.............................................................................................................................................................. 376
IPv6 Header Fields.................................................................................................................................................... 377
Extension Header Fields.......................................................................................................................................... 378
Addressing...................................................................................................................................................................379
Implementing IPv6 with Dell EMC Networking OS.................................................................................................380
ICMPv6..............................................................................................................................................................................382
12
Contents
Path MTU discovery.......................................................................................................................................................382
IPv6 Neighbor Discovery...............................................................................................................................................382
IPv6 Neighbor Discovery of MTU Packets......................................................................................................... 383
Configuration Task List for IPv6 RDNSS.................................................................................................................. 383
Configuring the IPv6 Recursive DNS Server......................................................................................................383
Debugging IPv6 RDNSS Information Sent to the Host .................................................................................. 384
Displaying IPv6 RDNSS Information.....................................................................................................................385
Secure Shell (SSH) Over an IPv6 Transport............................................................................................................385
Configuration Tasks for IPv6....................................................................................................................................... 386
Adjusting Your CAM-Profile....................................................................................................................................386
Assigning an IPv6 Address to an Interface......................................................................................................... 386
Assigning a Static IPv6 Route................................................................................................................................387
Configuring Telnet with IPv6..................................................................................................................................387
SNMP over IPv6........................................................................................................................................................388
Displaying IPv6 Information.................................................................................................................................... 388
Displaying an IPv6 Interface Information............................................................................................................ 388
Showing IPv6 Routes...............................................................................................................................................389
Showing the Running-Configuration for an Interface......................................................................................390
Clearing IPv6 Routes................................................................................................................................................390
Disabling ND Entry Timeout.................................................................................................................................... 391
Configuring IPv6 RA Guard........................................................................................................................................... 391
Configuring IPv6 RA Guard on an Interface....................................................................................................... 393
Monitoring IPv6 RA Guard......................................................................................................................................393
Chapter 23: iSCSI Optimization.................................................................................................394
iSCSI Optimization Overview....................................................................................................................................... 394
Monitoring iSCSI Traffic Flows..............................................................................................................................395
Application of Quality of Service to iSCSI Traffic Flows.................................................................................395
Information Monitored in iSCSI Traffic Flows....................................................................................................396
Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................396
Configuring Detection and Ports for Dell Compellent Arrays.........................................................................397
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer...........................................................397
Enable and Disable iSCSI Optimization................................................................................................................ 397
Default iSCSI Optimization Values..............................................................................................................................398
iSCSI Optimization Prerequisites................................................................................................................................ 398
Configuring iSCSI Optimization...................................................................................................................................399
Displaying iSCSI Optimization Information............................................................................................................... 400
Chapter 24: Intermediate System to Intermediate System.........................................................402
IS-IS Protocol Overview................................................................................................................................................402
IS-IS Addressing..............................................................................................................................................................402
Multi-Topology IS-IS...................................................................................................................................................... 403
Transition Mode.........................................................................................................................................................403
Interface Support......................................................................................................................................................403
Adjacencies.................................................................................................................................................................403
Graceful Restart..............................................................................................................................................................404
Timers.......................................................................................................................................................................... 404
Implementation Information......................................................................................................................................... 404
Configuration Information.............................................................................................................................................405
Contents
13
Configuration Tasks for IS-IS.................................................................................................................................405
Configuring the Distance of a Route.....................................................................................................................412
Changing the IS-Type............................................................................................................................................... 412
Redistributing IPv4 Routes......................................................................................................................................415
Redistributing IPv6 Routes......................................................................................................................................415
Configuring Authentication Passwords................................................................................................................ 416
Setting the Overload Bit.......................................................................................................................................... 416
Debugging IS-IS..........................................................................................................................................................417
IS-IS Metric Styles...........................................................................................................................................................418
Configure Metric Values................................................................................................................................................ 418
Maximum Values in the Routing Table..................................................................................................................418
Change the IS-IS Metric Style in One Level Only.............................................................................................. 418
Leaks from One Level to Another......................................................................................................................... 420
Sample Configurations...................................................................................................................................................420
Chapter 25: Link Aggregation Control Protocol (LACP)............................................................. 423
Introduction to Dynamic LAGs and LACP................................................................................................................. 423
Important Points to Remember............................................................................................................................. 423
LACP Modes...............................................................................................................................................................424
Configuring LACP Commands................................................................................................................................424
LACP Configuration Tasks............................................................................................................................................424
Creating a LAG.......................................................................................................................................................... 425
Configuring the LAG Interfaces as Dynamic...................................................................................................... 425
Setting the LACP Long Timeout........................................................................................................................... 426
Monitoring and Debugging LACP.......................................................................................................................... 426
Shared LAG State Tracking..........................................................................................................................................426
Configuring Shared LAG State Tracking............................................................................................................. 427
Important Points about Shared LAG State Tracking........................................................................................428
LACP Basic Configuration Example............................................................................................................................429
Configure a LAG on ALPHA....................................................................................................................................429
Chapter 26: Layer 2................................................................................................................... 437
Manage the MAC Address Table.................................................................................................................................437
Clearing the MAC Address Table...........................................................................................................................437
Setting the Aging Time for Dynamic Entries...................................................................................................... 437
Configuring a Static MAC Address.......................................................................................................................438
Displaying the MAC Address Table.......................................................................................................................438
MAC Learning Limit........................................................................................................................................................438
Setting the MAC Learning Limit............................................................................................................................ 439
mac learning-limit Dynamic..................................................................................................................................... 439
mac learning-limit mac-address-sticky................................................................................................................ 439
mac learning-limit station-move............................................................................................................................ 439
mac learning-limit no-station-move......................................................................................................................440
Learning Limit Violation Actions............................................................................................................................ 440
Setting Station Move Violation Actions...............................................................................................................440
Recovering from Learning Limit and Station Move Violations........................................................................441
Disabling MAC Address Learning on the System...............................................................................................441
Enabling port security.............................................................................................................................................. 442
NIC Teaming.....................................................................................................................................................................442
14
Contents
Configure Redundant Pairs...........................................................................................................................................443
Far-End Failure Detection.............................................................................................................................................446
FEFD State Changes................................................................................................................................................446
Configuring FEFD...................................................................................................................................................... 447
Enabling FEFD on an Interface.............................................................................................................................. 448
Debugging FEFD........................................................................................................................................................449
Chapter 27: Link Layer Discovery Protocol (LLDP).................................................................... 450
802.1AB (LLDP) Overview............................................................................................................................................450
Protocol Data Units.................................................................................................................................................. 450
Optional TLVs.................................................................................................................................................................. 452
Management TLVs....................................................................................................................................................452
TIA-1057 (LLDP-MED) Overview............................................................................................................................... 453
TIA Organizationally Specific TLVs.......................................................................................................................454
Configure LLDP............................................................................................................................................................... 457
CONFIGURATION versus INTERFACE Configurations......................................................................................... 458
Enabling LLDP..................................................................................................................................................................458
Disabling and Undoing LLDP.................................................................................................................................. 458
Enabling LLDP on Management Ports.......................................................................................................................459
Disabling and Undoing LLDP on Management Ports........................................................................................459
Advertising TLVs.............................................................................................................................................................459
Storing and Viewing Unrecognized LLDP TLVs...................................................................................................... 460
Viewing the LLDP Configuration..................................................................................................................................461
Viewing Information Advertised by Adjacent LLDP Neighbors............................................................................462
Examples of Viewing Information Advertised by Neighbors...........................................................................462
Configuring LLDPDU Intervals.....................................................................................................................................464
Configuring LLDP Notification Interval......................................................................................................................465
Configuring Transmit and Receive Mode..................................................................................................................465
Configuring the Time to Live Value............................................................................................................................ 466
Debugging LLDP..............................................................................................................................................................467
Relevant Management Objects................................................................................................................................... 468
Chapter 28: Microsoft Network Load Balancing......................................................................... 472
Configuring a Switch for NLB .....................................................................................................................................473
Enabling a Switch for Multicast NLB....................................................................................................................474
Chapter 29: Multicast Source Discovery Protocol (MSDP)........................................................ 475
Anycast RP....................................................................................................................................................................... 476
Implementation Information..........................................................................................................................................477
Configure Multicast Source Discovery Protocol......................................................................................................477
Related Configuration Tasks...................................................................................................................................477
Enable MSDP.................................................................................................................................................................... 481
Manage the Source-Active Cache..............................................................................................................................482
Viewing the Source-Active Cache........................................................................................................................ 482
Limiting the Source-Active Cache........................................................................................................................ 482
Clearing the Source-Active Cache........................................................................................................................483
Enabling the Rejected Source-Active Cache..................................................................................................... 483
Accept Source-Active Messages that Fail the RFP Check.................................................................................. 483
Specifying Source-Active Messages..........................................................................................................................486
Contents
15
Limiting the Source-Active Messages from a Peer................................................................................................ 487
Preventing MSDP from Caching a Local Source.....................................................................................................487
Preventing MSDP from Caching a Remote Source................................................................................................488
Preventing MSDP from Advertising a Local Source.............................................................................................. 488
Logging Changes in Peership States......................................................................................................................... 489
Terminating a Peership..................................................................................................................................................489
Clearing Peer Statistics................................................................................................................................................. 489
Debugging MSDP............................................................................................................................................................490
MSDP with Anycast RP.................................................................................................................................................490
Configuring Anycast RP.................................................................................................................................................491
Reducing Source-Active Message Flooding....................................................................................................... 492
Specifying the RP Address Used in SA Messages............................................................................................ 492
MSDP Sample Configurations......................................................................................................................................494
Chapter 30: Multicast Listener Discovery Protocol.................................................................... 497
MLD timers.......................................................................................................................................................................500
Reducing Host Response Burstiness................................................................................................................... 500
Configuring MLD Version...............................................................................................................................................501
Clearing MLD groups...................................................................................................................................................... 501
Debugging MLD............................................................................................................................................................... 501
Explicit Tracking...............................................................................................................................................................501
Reducing Leave Latency................................................................................................................................................501
Displaying MLD groups table........................................................................................................................................502
Displaying MLD Interfaces............................................................................................................................................502
Chapter 31: Multiple Spanning Tree Protocol (MSTP)............................................................... 503
Spanning Tree Variations..............................................................................................................................................504
Implementation Information....................................................................................................................................504
Configure Multiple Spanning Tree Protocol............................................................................................................. 504
Related Configuration Tasks.................................................................................................................................. 504
Enable Multiple Spanning Tree Globally.................................................................................................................... 505
Adding and Removing Interfaces................................................................................................................................505
Creating Multiple Spanning Tree Instances..............................................................................................................505
Influencing MSTP Root Selection...............................................................................................................................506
Interoperate with Non-Dell Bridges............................................................................................................................507
Changing the Region Name or Revision.................................................................................................................... 507
Modifying Global Parameters.......................................................................................................................................507
Modifying the Interface Parameters.......................................................................................................................... 508
Setting STP path cost as constant............................................................................................................................ 509
Configuring an EdgePort............................................................................................................................................... 510
Flush MAC Addresses after a Topology Change..................................................................................................... 510
MSTP Sample Configurations....................................................................................................................................... 511
Debugging and Verifying MSTP Configurations.......................................................................................................514
Chapter 32: Multicast Features..................................................................................................516
Enabling IP Multicast...................................................................................................................................................... 516
Implementation Information.......................................................................................................................................... 516
Multicast Policies............................................................................................................................................................. 517
IPv4 Multicast Policies..............................................................................................................................................517
16
Contents
Understanding Multicast Traceroute (mtrace)..................................................................................................523
Printing Multicast Traceroute (mtrace) Paths.................................................................................................. 524
Supported Error Codes............................................................................................................................................525
mtrace Scenarios...................................................................................................................................................... 526
Chapter 33: Multicast Listener Discovery Protocol.................................................................... 532
MLD timers.......................................................................................................................................................................535
Reducing Host Response Burstiness....................................................................................................................535
Clearing MLD groups..................................................................................................................................................... 536
Debugging MLD...............................................................................................................................................................536
Explicit Tracking..............................................................................................................................................................536
Reducing Leave Latency............................................................................................................................................... 536
Displaying MLD groups table........................................................................................................................................536
Displaying MLD Interfaces............................................................................................................................................ 537
MLD Snooping................................................................................................................................................................. 537
Enable MLD Snooping.............................................................................................................................................. 537
Disable MLD Snooping............................................................................................................................................. 537
Configure the switch as a querier.........................................................................................................................538
Specify port as connected to multicast router..................................................................................................538
Enable Snooping Explicit Tracking........................................................................................................................ 538
Display the MLD Snooping Table.......................................................................................................................... 538
Chapter 34: Object Tracking......................................................................................................539
Object Tracking Overview............................................................................................................................................ 539
Track Layer 2 Interfaces......................................................................................................................................... 540
Track Layer 3 Interfaces......................................................................................................................................... 540
Track IPv4 and IPv6 Routes....................................................................................................................................541
Set Tracking Delays..................................................................................................................................................542
VRRP Object Tracking............................................................................................................................................. 542
Object Tracking Configuration.....................................................................................................................................542
Tracking a Layer 2 Interface.................................................................................................................................. 542
Tracking a Layer 3 Interface.................................................................................................................................. 543
Track an IPv4/IPv6 Route...................................................................................................................................... 544
Displaying Tracked Objects.......................................................................................................................................... 547
Chapter 35: Open Shortest Path First (OSPFv2 and OSPFv3)................................................... 550
Protocol Overview..........................................................................................................................................................550
Autonomous System (AS) Areas...........................................................................................................................550
Area Types...................................................................................................................................................................551
Networks and Neighbors.........................................................................................................................................552
Router Types..............................................................................................................................................................552
Designated and Backup Designated Routers..................................................................................................... 553
Link-State Advertisements (LSAs).......................................................................................................................553
Router Priority and Cost......................................................................................................................................... 554
OSPF with Dell EMC Networking OS........................................................................................................................ 555
Graceful Restart........................................................................................................................................................555
Fast Convergence (OSPFv2, IPv4 Only)............................................................................................................ 556
Multi-Process OSPFv2 with VRF..........................................................................................................................557
OSPF ACK Packing...................................................................................................................................................557
Contents
17
Setting OSPF Adjacency with Cisco Routers.................................................................................................... 557
Configuration Information.............................................................................................................................................558
Configuration Task List for OSPFv2 (OSPF for IPv4).....................................................................................558
OSPFv3 NSSA................................................................................................................................................................. 570
Configuration Task List for OSPFv3 (OSPF for IPv6)........................................................................................... 571
Enabling IPv6 Unicast Routing................................................................................................................................571
Applying cost for OSPFv3....................................................................................................................................... 571
Assigning IPv6 Addresses on an Interface..........................................................................................................572
Assigning Area ID on an Interface......................................................................................................................... 572
Assigning OSPFv3 Process ID and Router ID Globally..................................................................................... 572
Assigning OSPFv3 Process ID and Router ID to a VRF................................................................................... 573
Configuring Stub Areas............................................................................................................................................573
Configuring Passive-Interface................................................................................................................................573
Redistributing Routes...............................................................................................................................................574
Configuring a Default Route................................................................................................................................... 574
Enabling OSPFv3 Graceful Restart.......................................................................................................................574
OSPFv3 Authentication Using IPsec.................................................................................................................... 576
Troubleshooting OSPFv3........................................................................................................................................ 582
MIB Support for OSPFv3..............................................................................................................................................583
Viewing the OSPFv3 MIB........................................................................................................................................583
Chapter 36: Policy-based Routing (PBR)...................................................................................585
Overview...........................................................................................................................................................................585
Implementing PBR.......................................................................................................................................................... 586
Configuration Task List for Policy-based Routing.................................................................................................. 586
Create a Redirect List.............................................................................................................................................. 587
Create a Rule for a Redirect-list............................................................................................................................587
Apply a Redirect-list to an Interface using a Redirect-group........................................................................ 589
Sample Configuration.................................................................................................................................................... 590
Chapter 37: PIM Sparse-Mode (PIM-SM).................................................................................. 594
Implementation Information......................................................................................................................................... 594
Protocol Overview..........................................................................................................................................................594
Requesting Multicast Traffic..................................................................................................................................594
Refuse Multicast Traffic......................................................................................................................................... 595
Send Multicast Traffic............................................................................................................................................. 595
Configuring PIM-SM...................................................................................................................................................... 595
Related Configuration Tasks.................................................................................................................................. 596
Enable PIM-SM............................................................................................................................................................... 596
Configuring S,G Expiry Timers.....................................................................................................................................598
Configuring a Static Rendezvous Point.................................................................................................................... 598
Overriding Bootstrap Router Updates.................................................................................................................599
Configuring a Designated Router................................................................................................................................599
Creating Multicast Boundaries and Domains............................................................................................................ 601
Electing an RP using the BSR Mechanism................................................................................................................ 601
Chapter 38: PIM Source-Specific Mode (PIM-SSM).................................................................. 603
Implementation Information......................................................................................................................................... 603
Configure PIM-SSM.......................................................................................................................................................603
18
Contents
Enabling PIM-SSM..........................................................................................................................................................604
Use PIM-SSM with IGMP Version 2 Hosts.............................................................................................................. 604
Electing an RP using the BSR Mechanism............................................................................................................... 605
Enabling RP to Server Specific Multicast Groups.............................................................................................607
Chapter 39: Power over Ethernet (PoE).................................................................................... 608
Configuring PoE or PoE+..............................................................................................................................................608
Enable PoE/PoE+..................................................................................................................................................... 608
Upgrading the PoE Controller................................................................................................................................609
Manage Ports using Power Priority and Power Budget.............................................................................. 610
Determine the Power Priority.................................................................................................................................610
Manage Inline Power..................................................................................................................................................611
Set the Threshold Limit for the PoE Power Budget.......................................................................................... 611
Manage Power Priorities...........................................................................................................................................611
Power Allocation to Ports........................................................................................................................................612
Power Allocation to Additional Ports.................................................................................................................... 612
Manage Legacy Devices................................................................................................................................................ 612
Suspend Power Delivery on a Port..............................................................................................................................613
Restore Power Delivery on a Port............................................................................................................................... 613
Display the Power Details.............................................................................................................................................. 613
Chapter 40: Port Monitoring...................................................................................................... 615
Important Points to Remember....................................................................................................................................615
Port Monitoring................................................................................................................................................................616
Configuring Port Monitoring......................................................................................................................................... 618
Configuring Monitor Multicast Queue........................................................................................................................ 619
Enabling Flow-Based Monitoring................................................................................................................................ 620
Remote Port Mirroring................................................................................................................................................... 621
Remote Port Mirroring Example.............................................................................................................................621
Configuring Remote Port Mirroring......................................................................................................................622
Displaying Remote-Port Mirroring Configurations............................................................................................623
Configuration procedure for Remote Port Mirroring....................................................................................... 624
Encapsulated Remote Port Monitoring..................................................................................................................... 628
ERPM Behavior on a typical Dell EMC Networking OS ....................................................................................... 630
Port Monitoring on VLT................................................................................................................................................. 631
Chapter 41: Private VLANs (PVLAN).......................................................................................... 634
Private VLAN Concepts................................................................................................................................................ 634
Using the Private VLAN Commands.......................................................................................................................... 635
Configuration Task List................................................................................................................................................. 636
Creating PVLAN ports............................................................................................................................................. 636
Creating a Primary VLAN........................................................................................................................................ 636
Creating a Community VLAN................................................................................................................................. 637
Creating an Isolated VLAN......................................................................................................................................638
Private VLAN Configuration Example........................................................................................................................ 639
Inspecting the Private VLAN Configuration............................................................................................................. 640
Chapter 42: Per-VLAN Spanning Tree Plus (PVST+)..................................................................642
Protocol Overview..........................................................................................................................................................642
Contents
19
Implementation Information..........................................................................................................................................643
Configure Per-VLAN Spanning Tree Plus................................................................................................................. 644
Enabling PVST+...............................................................................................................................................................644
Disabling PVST+..............................................................................................................................................................644
Influencing PVST+ Root Selection............................................................................................................................. 645
Modifying Global PVST+ Parameters........................................................................................................................ 646
Modifying Interface PVST+ Parameters................................................................................................................... 646
Configuring an EdgePort...............................................................................................................................................647
PVST+ in Multi-Vendor Networks.............................................................................................................................. 648
Enabling PVST+ Extend System ID............................................................................................................................ 648
PVST+ Sample Configurations.................................................................................................................................... 649
Chapter 43: Quality of Service (QoS).........................................................................................651
Implementation Information......................................................................................................................................... 653
Port-Based QoS Configurations..................................................................................................................................653
Setting dot1p Priorities for Incoming Traffic......................................................................................................653
Honoring dot1p Priorities on Ingress Traffic.......................................................................................................654
Configuring Port-Based Rate Policing................................................................................................................. 654
Configuring Port-Based Rate Shaping.................................................................................................................655
Policy-Based QoS Configurations...............................................................................................................................656
Classify Traffic...........................................................................................................................................................656
Create a QoS Policy................................................................................................................................................. 659
Create Policy Maps................................................................................................................................................... 661
DSCP Color Maps........................................................................................................................................................... 664
Creating a DSCP Color Map...................................................................................................................................664
Displaying DSCP Color Maps................................................................................................................................. 665
Displaying a DSCP Color Policy Configuration ................................................................................................. 665
Enabling QoS Rate Adjustment................................................................................................................................... 666
Enabling Strict-Priority Queueing............................................................................................................................... 666
Weighted Random Early Detection.............................................................................................................................667
Creating WRED Profiles...........................................................................................................................................667
Applying a WRED Profile to Traffic...................................................................................................................... 668
Displaying Default and Configured WRED Profiles........................................................................................... 668
Displaying WRED Drop Statistics..........................................................................................................................668
Displaying egressqueue Statistics...................................................................................................................... 669
Pre-Calculating Available QoS CAM Space..............................................................................................................669
Configuring Weights and ECN for WRED ................................................................................................................670
Configuring WRED and ECN Attributes..................................................................................................................... 671
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................................... 672
Sample configuration to mark non-ecn packets as yellow with Multiple traffic class..........................673
Classifying Incoming Packets Using ECN and Color-Marking........................................................................673
Sample configuration to mark non-ecn packets as yellow with single traffic class.............................. 674
Applying Layer 2 Match Criteria on a Layer 3 Interface........................................................................................676
Applying DSCP and VLAN Match Criteria on a Service Queue........................................................................... 676
Classifying Incoming Packets Using ECN and Color-Marking..............................................................................677
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................................... 678
Sample configuration to mark non-ecn packets as yellow with Multiple traffic class................................679
Sample configuration to mark non-ecn packets as yellow with single traffic class....................................679
20
Contents
/