Dell PowerSwitch S6000 ON, S6000-ON User manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6000 ON User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S6000–ON
System
9.8(0.0)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2015 - 05
Rev. A00
Contents
1 About this Guide................................................................................................. 34
Audience..............................................................................................................................................34
Conventions........................................................................................................................................ 34
Related Documents............................................................................................................................ 34
2 Configuration Fundamentals........................................................................... 36
Accessing the Command Line............................................................................................................36
CLI Modes............................................................................................................................................36
Navigating CLI Modes................................................................................................................... 38
The do Command............................................................................................................................... 41
Undoing Commands...........................................................................................................................42
Obtaining Help.................................................................................................................................... 43
Entering and Editing Commands....................................................................................................... 43
Command History...............................................................................................................................44
Filtering show Command Outputs.....................................................................................................44
Multiple Users in Configuration Mode............................................................................................... 46
3 Getting Started....................................................................................................47
Console Access................................................................................................................................... 47
Serial Console................................................................................................................................47
Default Configuration......................................................................................................................... 49
Configuring a Host Name...................................................................................................................49
Accessing the System Remotely........................................................................................................ 49
Accessing the System Remotely...................................................................................................49
Configure the Management Port IP Address............................................................................... 49
Configure a Management Route..................................................................................................50
Configuring a Username and Password.......................................................................................50
Configuring the Enable Password.......................................................................................................51
Configuration File Management......................................................................................................... 51
Copy Files to and from the System...............................................................................................51
Mounting an NFS File System....................................................................................................... 52
Save the Running-Configuration..................................................................................................54
Configure the Overload Bit for a Startup Scenario...................................................................... 55
Viewing Files.................................................................................................................................. 55
Managing the File System...................................................................................................................56
View Command History......................................................................................................................57
Upgrading Dell Networking OS.......................................................................................................... 57
Using HTTP for File Transfers..............................................................................................................57
3
Using Hashes to Validate Software Images........................................................................................58
4 Management....................................................................................................... 60
Configuring Privilege Levels............................................................................................................... 60
Creating a Custom Privilege Level............................................................................................... 60
Removing a Command from EXEC Mode................................................................................... 60
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 61
Allowing Access to CONFIGURATION Mode Commands...........................................................61
Allowing Access to the Following Modes.....................................................................................61
Applying a Privilege Level to a Username.................................................................................... 63
Applying a Privilege Level to a Terminal Line...............................................................................63
Configuring Logging...........................................................................................................................63
Audit and Security Logs................................................................................................................ 64
Configuring Logging Format ...................................................................................................... 66
Setting Up a Secure Connection to a Syslog Server....................................................................67
Log Messages in the Internal Buffer...................................................................................................68
Configuration Task List for System Log Management................................................................ 68
Disabling System Logging.................................................................................................................. 68
Sending System Messages to a Syslog Server................................................................................... 69
Configuring a UNIX System as a Syslog Server............................................................................69
Track Login Activity.............................................................................................................................69
Restrictions for Tracking Login Activity........................................................................................69
Configuring Login Activity Tracking............................................................................................. 70
Display Login Statistics..................................................................................................................70
Limit Concurrent Login Sessions........................................................................................................ 71
Restrictions for Limiting the Number of Concurrent Sessions.................................................... 71
Configuring Concurrent Session Limit..........................................................................................71
Enabling the System to Clear Existing Sessions........................................................................... 72
Changing System Logging Settings....................................................................................................73
Display the Logging Buffer and the Logging Configuration..............................................................74
Configuring a UNIX Logging Facility Level.........................................................................................74
Synchronizing Log Messages..............................................................................................................76
Enabling Timestamp on Syslog Messages..........................................................................................76
File Transfer Services........................................................................................................................... 77
Configuration Task List for File Transfer Services........................................................................ 77
Enabling the FTP Server.................................................................................................................77
Configuring FTP Server Parameters..............................................................................................78
Configuring FTP Client Parameters.............................................................................................. 78
Terminal Lines..................................................................................................................................... 79
Denying and Permitting Access to a Terminal Line..................................................................... 79
Configuring Login Authentication for Terminal Lines.................................................................80
Setting Time Out of EXEC Privilege Mode..........................................................................................81
4
Using Telnet to get to Another Network Device............................................................................... 82
Lock CONFIGURATION Mode............................................................................................................83
Viewing the Configuration Lock Status........................................................................................83
Restoring the Factory Default Settings.............................................................................................. 84
Important Points to Remember....................................................................................................84
Restoring Factory Default Environment Variables.......................................................................84
5 802.1X................................................................................................................... 87
The Port-Authentication Process.......................................................................................................88
EAP over RADIUS...........................................................................................................................90
Configuring 802.1X.............................................................................................................................90
Related Configuration Tasks.........................................................................................................90
Important Points to Remember..........................................................................................................91
Enabling 802.1X...................................................................................................................................92
Configuring Request Identity Re-Transmissions............................................................................... 93
Configuring a Quiet Period after a Failed Authentication........................................................... 94
Forcibly Authorizing or Unauthorizing a Port.................................................................................... 95
Re-Authenticating a Port....................................................................................................................96
Configuring Timeouts......................................................................................................................... 97
Configuring Dynamic VLAN Assignment with Port Authentication..................................................98
Guest and Authentication-Fail VLANs................................................................................................99
Configuring a Guest VLAN..........................................................................................................100
Configuring an Authentication-Fail VLAN..................................................................................100
6 Access Control Lists (ACLs)............................................................................ 102
IP Access Control Lists (ACLs).......................................................................................................... 102
CAM Usage.................................................................................................................................. 103
Implementing ACLs on Dell Networking OS............................................................................. 104
Important Points to Remember........................................................................................................105
Configuration Task List for Route Maps.....................................................................................105
Configuring Match Routes..........................................................................................................108
Configuring Set Conditions........................................................................................................ 109
Configure a Route Map for Route Redistribution....................................................................... 111
Configure a Route Map for Route Tagging.................................................................................111
Continue Clause.......................................................................................................................... 112
IP Fragment Handling........................................................................................................................112
IP Fragments ACL Examples........................................................................................................113
Layer 4 ACL Rules Examples........................................................................................................113
Configure a Standard IP ACL.............................................................................................................114
Configuring a Standard IP ACL Filter...........................................................................................115
Configure an Extended IP ACL..........................................................................................................116
Configuring Filters with a Sequence Number............................................................................ 116
5
Configuring Filters Without a Sequence Number...................................................................... 118
Configure Layer 2 and Layer 3 ACLs.................................................................................................119
Assign an IP ACL to an Interface.......................................................................................................119
Applying an IP ACL............................................................................................................................120
Counting ACL Hits....................................................................................................................... 121
Configure Ingress ACLs..................................................................................................................... 121
Configure Egress ACLs......................................................................................................................122
Applying Egress Layer 3 ACLs (Control-Plane).......................................................................... 122
IP Prefix Lists......................................................................................................................................123
Implementation Information.......................................................................................................123
Configuration Task List for Prefix Lists....................................................................................... 123
ACL Resequencing............................................................................................................................ 127
Resequencing an ACL or Prefix List............................................................................................128
Route Maps........................................................................................................................................129
Implementation Information...................................................................................................... 130
Flow-Based Monitoring Support for ACLs.......................................................................................130
Behavior of Flow-Based Monitoring...........................................................................................130
Enabling Flow-Based Monitoring............................................................................................... 132
7 Bidirectional Forwarding Detection (BFD)...................................................134
How BFD Works................................................................................................................................ 134
BFD Packet Format......................................................................................................................135
BFD Sessions................................................................................................................................137
BFD Three-Way Handshake........................................................................................................ 137
Session State Changes................................................................................................................ 138
Important Points to Remember........................................................................................................139
Configure BFD...................................................................................................................................139
Configure BFD for Physical Ports............................................................................................... 140
Configure BFD for Static Routes.................................................................................................143
Configure BFD for OSPF............................................................................................................. 145
Configure BFD for OSPFv3......................................................................................................... 148
Configure BFD for IS-IS...............................................................................................................149
Configure BFD for BGP................................................................................................................151
Configure BFD for VRRP............................................................................................................. 158
Configuring Protocol Liveness....................................................................................................161
Troubleshooting BFD.................................................................................................................. 162
8 Border Gateway Protocol IPv4 (BGPv4)...................................................... 164
Autonomous Systems (AS)................................................................................................................164
Sessions and Peers............................................................................................................................166
Establish a Session.......................................................................................................................167
Route Reflectors................................................................................................................................168
6
BGP Attributes................................................................................................................................... 169
Best Path Selection Criteria........................................................................................................ 169
Weight...........................................................................................................................................171
Local Preference..........................................................................................................................172
Multi-Exit Discriminators (MEDs)................................................................................................ 172
Origin............................................................................................................................................173
AS Path......................................................................................................................................... 174
Next Hop......................................................................................................................................174
Multiprotocol BGP.............................................................................................................................175
Implement BGP with Dell Networking OS....................................................................................... 175
Additional Path (Add-Path) Support............................................................................................175
Advertise IGP Cost as MED for Redistributed Routes................................................................ 176
Ignore Router-ID for Some Best-Path Calculations.................................................................. 177
Four-Byte AS Numbers................................................................................................................177
AS4 Number Representation.......................................................................................................177
AS Number Migration.................................................................................................................. 179
BGP4 Management Information Base (MIB)...............................................................................181
Important Points to Remember.................................................................................................. 181
Configuration Information................................................................................................................182
BGP Configuration............................................................................................................................ 182
Enabling BGP...............................................................................................................................183
Configuring AS4 Number Representations................................................................................ 187
Configuring Peer Groups............................................................................................................189
Configuring BGP Fast Fall-Over..................................................................................................191
Configuring Passive Peering....................................................................................................... 193
Maintaining Existing AS Numbers During an AS Migration........................................................194
Allowing an AS Number to Appear in its Own AS Path..............................................................195
Enabling Graceful Restart........................................................................................................... 196
Enabling Neighbor Graceful Restart........................................................................................... 197
Filtering on an AS-Path Attribute................................................................................................198
Regular Expressions as Filters..................................................................................................... 199
Redistributing Routes..................................................................................................................201
Enabling Additional Paths........................................................................................................... 201
Configuring IP Community Lists................................................................................................ 202
Configuring an IP Extended Community List............................................................................ 203
Filtering Routes with Community Lists......................................................................................204
Manipulating the COMMUNITY Attribute.................................................................................. 205
Changing MED Attributes........................................................................................................... 207
Changing the LOCAL_PREFERENCE Attribute.......................................................................... 207
Changing the NEXT_HOP Attribute...........................................................................................208
Changing the WEIGHT Attribute................................................................................................208
Enabling Multipath......................................................................................................................209
7
Filtering BGP Routes...................................................................................................................209
Filtering BGP Routes Using Route Maps.....................................................................................211
Filtering BGP Routes Using AS-PATH Information.....................................................................211
Configuring BGP Route Reflectors.............................................................................................212
Aggregating Routes.....................................................................................................................213
Configuring BGP Confederations...............................................................................................213
Enabling Route Flap Dampening................................................................................................ 214
Changing BGP Timers................................................................................................................. 217
Enabling BGP Neighbor Soft-Reconfiguration...........................................................................217
Route Map Continue...................................................................................................................218
Enabling MBGP Configurations........................................................................................................ 219
BGP Regular Expression Optimization.............................................................................................220
Debugging BGP................................................................................................................................ 220
Storing Last and Bad PDUs..........................................................................................................221
Capturing PDUs...........................................................................................................................222
PDU Counters............................................................................................................................. 223
Sample Configurations..................................................................................................................... 224
9 Content Addressable Memory (CAM)...........................................................230
CAM Allocation................................................................................................................................. 230
Test CAM Usage................................................................................................................................232
View CAM Profiles.............................................................................................................................232
View CAM-ACL Settings................................................................................................................... 233
View CAM Usage...............................................................................................................................235
CAM Optimization............................................................................................................................ 236
Troubleshoot CAM Profiling.............................................................................................................236
CAM Profile Mismatches.............................................................................................................236
QoS CAM Region Limitation.......................................................................................................236
Syslog Error When the Table is Full............................................................................................ 237
Syslog Warning Upon 90 Percent Utilization of CAM............................................................... 237
Syslog Warning for Discrepancies Between Configured Extended Prefixes............................ 237
Unified Forwarding Table (UFT) Modes............................................................................................237
Configuring UFT Modes..............................................................................................................238
10 Control Plane Policing (CoPP).....................................................................239
Configure Control Plane Policing....................................................................................................240
Configuring CoPP for Protocols.................................................................................................241
Configuring CoPP for CPU Queues...........................................................................................243
Show Commands....................................................................................................................... 244
11 Data Center Bridging (DCB)..........................................................................246
Ethernet Enhancements in Data Center Bridging........................................................................... 246
8
Priority-Based Flow Control....................................................................................................... 247
Enhanced Transmission Selection............................................................................................. 249
Data Center Bridging Exchange Protocol (DCBx)..................................................................... 250
Data Center Bridging in a Traffic Flow.......................................................................................250
Enabling Data Center Bridging......................................................................................................... 251
DCB Maps and its Attributes........................................................................................................251
Data Center Bridging: Default Configuration.................................................................................. 252
Configuring Priority-Based Flow Control........................................................................................ 253
Configuring Lossless Queues.....................................................................................................254
Configuring PFC in a DCB Map........................................................................................................ 255
PFC Configuration Notes............................................................................................................255
PFC Prerequisites and Restrictions.............................................................................................257
Applying a DCB Map on a Port......................................................................................................... 257
Configuring PFC without a DCB Map.............................................................................................. 257
Configuring Lossless QueuesExample:......................................................................................258
Priority-Based Flow Control Using Dynamic Buffer Method......................................................... 260
Pause and Resume of Traffic......................................................................................................260
Buffer Sizes for Lossless or PFC Packets................................................................................... 260
Behavior of Tagged Packets............................................................................................................. 261
Configuration Example for DSCP and PFC Priorities...................................................................... 262
SNMP Support for PFC and Buffer Statistics Tracking.....................................................................262
Performing PFC Using DSCP Bits Instead of 802.1p Bits................................................................ 263
PFC and ETS Configuration Examples.............................................................................................264
Using PFC to Manage Converged Ethernet Traffic......................................................................... 264
Operations on Untagged Packets....................................................................................................264
Generation of PFC for a Priority for Untagged Packets.................................................................. 265
Configure Enhanced Transmission Selection..................................................................................265
ETS Prerequisites and Restrictions............................................................................................. 265
Creating an ETS Priority Group.................................................................................................. 266
ETS Operation with DCBx...........................................................................................................267
Configuring Bandwidth Allocation for DCBx CIN..................................................................... 268
Configuring ETS in a DCB Map.................................................................................................. 269
Hierarchical Scheduling in ETS Output Policies.............................................................................. 270
Using ETS to Manage Converged Ethernet Traffic.......................................................................... 271
Applying DCB Policies in a Switch Stack.......................................................................................... 271
Configure a DCBx Operation............................................................................................................271
DCBx Operation.......................................................................................................................... 272
DCBx Port Roles..........................................................................................................................272
DCB Configuration Exchange.................................................................................................... 274
Configuration Source Election................................................................................................... 274
Propagation of DCB Information................................................................................................275
Auto-Detection and Manual Configuration of the DCBx Version............................................ 275
9
DCBx Example.............................................................................................................................276
DCBx Prerequisites and Restrictions.......................................................................................... 276
Configuring DCBx....................................................................................................................... 277
Verifying the DCB Configuration......................................................................................................281
QoS dot1p Traffic Classification and Queue Assignment...............................................................292
Configuring the Dynamic Buffer Method........................................................................................ 293
Sample DCB Configuration..............................................................................................................294
PFC and ETS Configuration Command Examples.....................................................................295
12 Dynamic Host Configuration Protocol (DHCP)........................................296
DHCP Packet Format and Options.................................................................................................. 296
Assign an IP Address using DHCP....................................................................................................298
Implementation Information............................................................................................................299
Configure the System to be a DHCP Server....................................................................................300
Configuring the Server for Automatic Address Allocation........................................................300
Specifying a Default Gateway.....................................................................................................302
Configure a Method of Hostname Resolution.......................................................................... 302
Using DNS for Address Resolution.............................................................................................302
Using NetBIOS WINS for Address Resolution............................................................................302
Creating Manual Binding Entries................................................................................................303
Debugging the DHCP Server......................................................................................................303
Using DHCP Clear Commands.................................................................................................. 303
Configure the System to be a DHCP Client.................................................................................... 304
Configuring the DHCP Client System........................................................................................304
DHCP Client on a Management Interface.................................................................................306
DHCP Client Operation with Other Features.............................................................................307
Configure the System for User Port Stacking (Option 230)........................................................... 308
Configure Secure DHCP.................................................................................................................. 308
Option 82....................................................................................................................................308
DHCP Snooping..........................................................................................................................309
Drop DHCP Packets on Snooped VLANs Only.......................................................................... 313
Dynamic ARP Inspection.............................................................................................................313
Configuring Dynamic ARP Inspection........................................................................................314
Source Address Validation................................................................................................................ 315
Enabling IP Source Address Validation.......................................................................................316
DHCP MAC Source Address Validation...................................................................................... 316
Enabling IP+MAC Source Address Validation.............................................................................317
Viewing the Number of SAV Dropped Packets.......................................................................... 317
Clearing the Number of SAV Dropped Packets......................................................................... 318
13 Equal Cost Multi-Path (ECMP)......................................................................319
ECMP for Flow-Based Affinity...........................................................................................................319
10
Configuring the Hash Algorithm.................................................................................................319
Enabling Deterministic ECMP Next Hop.................................................................................... 319
Configuring the Hash Algorithm Seed.......................................................................................320
Link Bundle Monitoring.................................................................................................................... 320
Managing ECMP Group Paths.....................................................................................................321
Creating an ECMP Group Bundle...............................................................................................322
Modifying the ECMP Group Threshold...................................................................................... 322
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table.................323
Support for ECMP in host table..................................................................................................323
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ..................................................324
14 FCoE Transit.................................................................................................... 325
Fibre Channel over Ethernet.............................................................................................................325
Ensure Robustness in a Converged Ethernet Network................................................................... 325
FIP Snooping on Ethernet Bridges................................................................................................... 327
FIP Snooping in a Switch Stack........................................................................................................ 329
Using FIP Snooping...........................................................................................................................329
FIP Snooping Prerequisites.........................................................................................................329
Important Points to Remember................................................................................................. 330
Enabling the FCoE Transit Feature..............................................................................................331
Enable FIP Snooping on VLANs.................................................................................................. 331
Configure the FC-MAP Value......................................................................................................331
Configure a Port for a Bridge-to-Bridge Link............................................................................ 332
Configure a Port for a Bridge-to-FCF Link................................................................................ 332
Impact on Other Software Features...........................................................................................332
FIP Snooping Restrictions...........................................................................................................333
Configuring FIP Snooping...........................................................................................................333
Displaying FIP Snooping Information.............................................................................................. 334
FCoE Transit Configuration Example...............................................................................................340
15 Flex Hash and Optimized Boot-Up............................................................. 342
Flex Hash Capability Overview......................................................................................................... 342
Configuring the Flex Hash Mechanism............................................................................................342
Configuring Fast Boot and LACP Fast Switchover.......................................................................... 343
Optimizing the Boot Time................................................................................................................343
Booting Process When Optimized Boot Time Mechanism is Enabled.....................................344
Guidelines for Configuring Optimized Booting Mechanism.................................................... 344
Interoperation of Applications with Fast Boot and System States..................................................345
LACP and IPv4 Routing...............................................................................................................345
LACP and IPv6 Routing...............................................................................................................346
BGP Graceful Restart.................................................................................................................. 346
Cold Boot Caused by Power Cycling the System..................................................................... 346
11
Unexpected Reload of the System.............................................................................................347
Software Upgrade....................................................................................................................... 347
LACP Fast Switchover................................................................................................................. 347
Changes to BGP Multipath......................................................................................................... 347
Delayed Installation of ECMP Routes Into BGP.........................................................................347
RDMA Over Converged Ethernet (RoCE) Overview........................................................................348
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.............................................................349
16 Force10 Resilient Ring Protocol (FRRP).....................................................350
Protocol Overview............................................................................................................................350
Ring Status................................................................................................................................... 351
Multiple FRRP Rings.................................................................................................................... 352
Important FRRP Points................................................................................................................352
Important FRRP Concepts.......................................................................................................... 353
Implementing FRRP.......................................................................................................................... 354
FRRP Configuration.......................................................................................................................... 354
Creating the FRRP Group............................................................................................................355
Configuring the Control VLAN................................................................................................... 355
Configuring and Adding the Member VLANs.............................................................................356
Setting the FRRP Timers............................................................................................................. 358
Clearing the FRRP Counters.......................................................................................................358
Viewing the FRRP Configuration................................................................................................358
Viewing the FRRP Information................................................................................................... 358
Troubleshooting FRRP......................................................................................................................359
Configuration Checks.................................................................................................................359
Sample Configuration and Topology...............................................................................................359
17 GARP VLAN Registration Protocol (GVRP).................................................361
Important Points to Remember........................................................................................................361
Configure GVRP................................................................................................................................362
Related Configuration Tasks.......................................................................................................363
Enabling GVRP Globally....................................................................................................................363
Enabling GVRP on a Layer 2 Interface............................................................................................. 363
Configure GVRP Registration...........................................................................................................364
Configure a GARP Timer.................................................................................................................. 364
18 Internet Group Management Protocol (IGMP).........................................366
IGMP Implementation Information..................................................................................................366
IGMP Protocol Overview..................................................................................................................366
IGMP Version 2............................................................................................................................366
IGMP Version 3............................................................................................................................368
Configure IGMP.................................................................................................................................371
12
Related Configuration Tasks....................................................................................................... 371
Viewing IGMP Enabled Interfaces.................................................................................................... 372
Selecting an IGMP Version................................................................................................................372
Viewing IGMP Groups.......................................................................................................................373
Adjusting Timers................................................................................................................................373
Adjusting Query and Response Timers...................................................................................... 373
Enabling IGMP Immediate-Leave.....................................................................................................374
IGMP Snooping................................................................................................................................. 374
IGMP Snooping Implementation Information........................................................................... 375
Configuring IGMP Snooping.......................................................................................................375
Removing a Group-Port Association..........................................................................................375
Disabling Multicast Flooding.......................................................................................................376
Specifying a Port as Connected to a Multicast Router..............................................................376
Configuring the Switch as Querier.............................................................................................376
Fast Convergence after MSTP Topology Changes..........................................................................377
Egress Interface Selection (EIS) for HTTP and IGMP Applications.................................................. 377
Protocol Separation.................................................................................................................... 378
Enabling and Disabling Management Egress Interface Selection.............................................379
Handling of Management Route Configuration........................................................................380
Handling of Switch-Initiated Traffic........................................................................................... 381
Handling of Switch-Destined Traffic..........................................................................................382
Handling of Transit Traffic (Traffic Separation)..........................................................................382
Mapping of Management Applications and Traffic Type.......................................................... 383
Behavior of Various Applications for Switch-Initiated Traffic .................................................. 384
Behavior of Various Applications for Switch-Destined Traffic .................................................385
Interworking of EIS With Various Applications.......................................................................... 386
Designating a Multicast Router Interface........................................................................................ 386
19 Interfaces......................................................................................................... 387
Basic Interface Configuration...........................................................................................................387
Advanced Interface Configuration...................................................................................................387
Interface Types................................................................................................................................. 388
View Basic Interface Information.....................................................................................................388
Enabling a Physical Interface........................................................................................................... 390
Physical Interfaces.............................................................................................................................391
Configuration Task List for Physical Interfaces.......................................................................... 391
40G to 1G Breakout Cable Adaptor............................................................................................391
Overview of Layer Modes........................................................................................................... 392
Configuring Layer 2 (Data Link) Mode....................................................................................... 392
Configuring Layer 2 (Interface) Mode........................................................................................ 393
Configuring Layer 3 (Network) Mode.........................................................................................393
Configuring Layer 3 (Interface) Mode........................................................................................394
13
Egress Interface Selection (EIS)........................................................................................................394
Important Points to Remember................................................................................................. 395
Configuring EIS........................................................................................................................... 395
Management Interfaces....................................................................................................................395
Configuring Management Interfaces......................................................................................... 395
Configuring Management Interfaces on the S-Series...............................................................396
VLAN Interfaces.................................................................................................................................397
Loopback Interfaces.........................................................................................................................398
Null Interfaces...................................................................................................................................398
Port Channel Interfaces....................................................................................................................398
Port Channel Definition and Standards..................................................................................... 399
Port Channel Benefits.................................................................................................................399
Port Channel Implementation....................................................................................................399
10/100/1000 Mbps Interfaces in Port Channels....................................................................... 400
Configuration Tasks for Port Channel Interfaces......................................................................400
Creating a Port Channel............................................................................................................. 401
Adding a Physical Interface to a Port Channel.......................................................................... 401
Reassigning an Interface to a New Port Channel......................................................................403
Configuring the Minimum Oper Up Links in a Port Channel....................................................404
.....................................................................................................................................................404
Assigning an IP Address to a Port Channel................................................................................405
Deleting or Disabling a Port Channel........................................................................................ 405
Load Balancing Through Port Channels....................................................................................405
Load-Balancing Method.............................................................................................................406
Changing the Hash Algorithm....................................................................................................406
Bulk Configuration........................................................................................................................... 408
Interface Range...........................................................................................................................408
Bulk Configuration Examples.....................................................................................................408
Defining Interface Range Macros.....................................................................................................410
Define the Interface Range.........................................................................................................410
Choosing an Interface-Range Macro.........................................................................................410
Monitoring and Maintaining Interfaces.............................................................................................411
Maintenance Using TDR..............................................................................................................412
Fanning out 40G Ports Dynamically.................................................................................................413
Splitting QSFP Ports to SFP+ Ports...................................................................................................413
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................ 413
Important Points to Remember..................................................................................................414
Example Scenarios...................................................................................................................... 414
Link Dampening................................................................................................................................ 416
Important Points to Remember..................................................................................................416
Enabling Link Dampening...........................................................................................................416
Link Bundle Monitoring.....................................................................................................................418
14
Using Ethernet Pause Frames for Flow Control.............................................................................. 418
Enabling Pause Frames............................................................................................................... 419
Configure the MTU Size on an Interface.........................................................................................420
Port-Pipes..........................................................................................................................................421
Auto-Negotiation on Ethernet Interfaces........................................................................................ 421
Setting the Speed and Duplex Mode of Ethernet Interfaces..................................................... 421
Set Auto-Negotiation Options................................................................................................... 423
View Advanced Interface Information............................................................................................. 424
Configuring the Interface Sampling Size................................................................................... 425
Dynamic Counters............................................................................................................................426
Clearing Interface Counters.......................................................................................................426
Enhanced Validation of Interface Ranges........................................................................................427
Compressing Configuration Files.....................................................................................................427
20 IPv4 Routing....................................................................................................431
IP Addresses.......................................................................................................................................431
Implementation Information...................................................................................................... 431
Configuration Tasks for IP Addresses.............................................................................................. 432
Assigning IP Addresses to an Interface............................................................................................ 432
Configuring Static Routes.................................................................................................................433
Configure Static Routes for the Management Interface.................................................................435
Using the Configured Source IP Address in ICMP Messages..........................................................435
Configuring the ICMP Source Interface.....................................................................................435
Configuring the Duration to Establish a TCP Connection..............................................................436
Enabling Directed Broadcast............................................................................................................436
Resolution of Host Names................................................................................................................437
Enabling Dynamic Resolution of Host Names.................................................................................437
Specifying the Local System Domain and a List of Domains..........................................................438
Configuring DNS with Traceroute................................................................................................... 438
ARP.................................................................................................................................................... 439
Configuration Tasks for ARP............................................................................................................ 439
Configuring Static ARP Entries.........................................................................................................440
Enabling Proxy ARP.......................................................................................................................... 440
Clearing ARP Cache..........................................................................................................................441
ARP Learning via Gratuitous ARP......................................................................................................441
Enabling ARP Learning via Gratuitous ARP......................................................................................442
ARP Learning via ARP Request......................................................................................................... 442
Configuring ARP Retries................................................................................................................... 443
ICMP..................................................................................................................................................444
Configuration Tasks for ICMP..........................................................................................................444
Enabling ICMP Unreachable Messages........................................................................................... 444
UDP Helper....................................................................................................................................... 444
15
Configure UDP Helper................................................................................................................444
Important Points to Remember................................................................................................. 445
Enabling UDP Helper........................................................................................................................445
Configuring a Broadcast Address.....................................................................................................445
Configurations Using UDP Helper................................................................................................... 446
UDP Helper with Broadcast-All Addresses......................................................................................446
UDP Helper with Subnet Broadcast Addresses............................................................................... 447
UDP Helper with Configured Broadcast Addresses........................................................................448
UDP Helper with No Configured Broadcast Addresses..................................................................448
Troubleshooting UDP Helper...........................................................................................................449
21 IPv6 Routing....................................................................................................450
Protocol Overview............................................................................................................................450
Extended Address Space............................................................................................................ 450
Stateless Autoconfiguration....................................................................................................... 450
IPv6 Headers................................................................................................................................451
Longest Prefix Match (LPM) Table and IPv6 /65 – /128 support.............................................. 452
IPv6 Header Fields.......................................................................................................................453
Extension Header Fields..............................................................................................................455
Addressing...................................................................................................................................456
Implementing IPv6 with Dell Networking OS..................................................................................457
ICMPv6..............................................................................................................................................459
Path MTU Discovery.........................................................................................................................460
IPv6 Neighbor Discovery..................................................................................................................460
IPv6 Neighbor Discovery of MTU Packets................................................................................. 461
Configuring the IPv6 Recursive DNS Server.............................................................................. 461
Debugging IPv6 RDNSS Information Sent to the Host ............................................................ 462
Displaying IPv6 RDNSS Information...........................................................................................463
Secure Shell (SSH) Over an IPv6 Transport..................................................................................... 464
Configuration Tasks for IPv6............................................................................................................464
Adjusting Your CAM-Profile....................................................................................................... 464
Assigning an IPv6 Address to an Interface.................................................................................465
Assigning a Static IPv6 Route..................................................................................................... 465
Configuring Telnet with IPv6..................................................................................................... 466
SNMP over IPv6.......................................................................................................................... 466
Showing IPv6 Information.......................................................................................................... 467
Showing an IPv6 Interface..........................................................................................................467
Showing IPv6 Routes..................................................................................................................468
Showing the Running-Configuration for an Interface..............................................................469
Clearing IPv6 Routes...................................................................................................................470
Configuring IPv6 RA Guard.............................................................................................................. 470
Configuring IPv6 RA Guard on an Interface...............................................................................472
16
Monitoring IPv6 RA Guard.......................................................................................................... 473
22 iSCSI Optimization.........................................................................................474
iSCSI Optimization Overview........................................................................................................... 474
Monitoring iSCSI Traffic Flows................................................................................................... 476
Application of Quality of Service to iSCSI Traffic Flows............................................................ 477
Information Monitored in iSCSI Traffic Flows............................................................................ 477
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................ 478
Configuring Detection and Ports for Dell Compellent Arrays.................................................. 478
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................479
Enable and Disable iSCSI Optimization......................................................................................479
Default iSCSI Optimization Values...................................................................................................480
iSCSI Optimization Prerequisites......................................................................................................481
Configuring iSCSI Optimization....................................................................................................... 481
Displaying iSCSI Optimization Information..................................................................................... 483
23 Intermediate System to Intermediate System..........................................485
IS-IS Protocol Overview................................................................................................................... 485
IS-IS Addressing................................................................................................................................485
Multi-Topology IS-IS........................................................................................................................ 486
Transition Mode.......................................................................................................................... 487
Interface Support........................................................................................................................ 487
Adjacencies................................................................................................................................. 487
Graceful Restart................................................................................................................................ 487
Timers..........................................................................................................................................488
Implementation Information............................................................................................................488
Configuration Information............................................................................................................... 489
Configuration Tasks for IS-IS..................................................................................................... 489
Configuring the Distance of a Route......................................................................................... 498
Changing the IS-Type.................................................................................................................498
Redistributing IPv4 Routes..........................................................................................................501
Redistributing IPv6 Routes..........................................................................................................502
Configuring Authentication Passwords..................................................................................... 503
Setting the Overload Bit............................................................................................................. 504
Debugging IS-IS..........................................................................................................................504
IS-IS Metric Styles............................................................................................................................. 506
Configure Metric Values...................................................................................................................506
Maximum Values in the Routing Table...................................................................................... 506
Change the IS-IS Metric Style in One Level Only......................................................................506
Leaks from One Level to Another.............................................................................................. 508
Sample Configurations.....................................................................................................................509
17
24 Link Aggregation Control Protocol (LACP)............................................... 512
Introduction to Dynamic LAGs and LACP........................................................................................512
Important Points to Remember..................................................................................................512
LACP Modes.................................................................................................................................513
Configuring LACP Commands....................................................................................................513
LACP Configuration Tasks................................................................................................................ 514
Creating a LAG.............................................................................................................................514
Configuring the LAG Interfaces as Dynamic.............................................................................. 515
Setting the LACP Long Timeout................................................................................................. 515
Monitoring and Debugging LACP...............................................................................................516
Shared LAG State Tracking............................................................................................................... 516
Configuring Shared LAG State Tracking..................................................................................... 517
Important Points about Shared LAG State Tracking.................................................................. 518
LACP Basic Configuration Example..................................................................................................519
Configure a LAG on ALPHA........................................................................................................ 519
25 Layer 2.............................................................................................................. 527
Manage the MAC Address Table.......................................................................................................527
Clearing the MAC Address Table................................................................................................ 527
Setting the Aging Time for Dynamic Entries.............................................................................. 527
Configuring a Static MAC Address............................................................................................. 528
Displaying the MAC Address Table.............................................................................................528
MAC Learning Limit.......................................................................................................................... 528
Setting the MAC Learning Limit..................................................................................................529
mac learning-limit Dynamic.......................................................................................................529
mac learning-limit mac-address-sticky.....................................................................................530
mac learning-limit station-move............................................................................................... 530
mac learning-limit no-station-move.........................................................................................530
Learning Limit Violation Actions................................................................................................. 531
Setting Station Move Violation Actions.......................................................................................531
Recovering from Learning Limit and Station Move Violations..................................................532
NIC Teaming..................................................................................................................................... 532
Configure Redundant Pairs.............................................................................................................. 534
Important Points about Configuring Redundant Pairs.............................................................. 535
Far-End Failure Detection.................................................................................................................537
FEFD State Changes....................................................................................................................538
Configuring FEFD........................................................................................................................539
Enabling FEFD on an Interface...................................................................................................540
Debugging FEFD..........................................................................................................................541
26 Link Layer Discovery Protocol (LLDP)........................................................543
18
802.1AB (LLDP) Overview.................................................................................................................543
Protocol Data Units.....................................................................................................................543
Optional TLVs....................................................................................................................................544
Management TLVs...................................................................................................................... 545
TIA-1057 (LLDP-MED) Overview...................................................................................................... 547
TIA Organizationally Specific TLVs............................................................................................. 547
Configure LLDP.................................................................................................................................552
Related Configuration Tasks.......................................................................................................552
Important Points to Remember..................................................................................................552
LLDP Compatibility......................................................................................................................552
CONFIGURATION versus INTERFACE Configurations....................................................................552
Enabling LLDP................................................................................................................................... 553
Disabling and Undoing LLDP......................................................................................................553
Enabling LLDP on Management Ports............................................................................................. 553
Disabling and Undoing LLDP on Management Ports................................................................554
Advertising TLVs................................................................................................................................554
Viewing the LLDP Configuration......................................................................................................555
Viewing Information Advertised by Adjacent LLDP Agents.............................................................556
Configuring LLDPDU Intervals..........................................................................................................557
Configuring Transmit and Receive Mode........................................................................................ 558
Configuring a Time to Live............................................................................................................... 559
Debugging LLDP...............................................................................................................................559
Relevant Management Objects........................................................................................................560
27 Microsoft Network Load Balancing............................................................ 567
NLB Unicast Mode Scenario.............................................................................................................567
NLB Multicast Mode Scenario.......................................................................................................... 568
Limitations of the NLB Feature.........................................................................................................568
Microsoft Clustering......................................................................................................................... 568
Enable and Disable VLAN Flooding .................................................................................................569
Configuring a Switch for NLB ..........................................................................................................569
..................................................................................................................................................... 569
28 Multicast Source Discovery Protocol (MSDP)........................................... 571
Protocol Overview.............................................................................................................................571
Anycast RP.........................................................................................................................................573
Implementation Information............................................................................................................ 573
Configure Multicast Source Discovery Protocol............................................................................. 573
Related Configuration Tasks.......................................................................................................574
Enable MSDP.....................................................................................................................................578
Manage the Source-Active Cache................................................................................................... 579
Viewing the Source-Active Cache..............................................................................................579
19
Limiting the Source-Active Cache.............................................................................................580
Clearing the Source-Active Cache............................................................................................ 580
Enabling the Rejected Source-Active Cache............................................................................ 580
Accept Source-Active Messages that Fail the RFP Check.............................................................. 580
Specifying Source-Active Messages................................................................................................ 584
Limiting the Source-Active Messages from a Peer......................................................................... 585
Preventing MSDP from Caching a Local Source.............................................................................585
Preventing MSDP from Caching a Remote Source.........................................................................586
Preventing MSDP from Advertising a Local Source.........................................................................587
Logging Changes in Peership States................................................................................................588
Terminating a Peership.....................................................................................................................588
Clearing Peer Statistics..................................................................................................................... 589
Debugging MSDP..............................................................................................................................589
MSDP with Anycast RP..................................................................................................................... 590
Configuring Anycast RP.................................................................................................................... 591
Reducing Source-Active Message Flooding..............................................................................592
Specifying the RP Address Used in SA Messages.......................................................................592
MSDP Sample Configurations.......................................................................................................... 595
29 Multiple Spanning Tree Protocol (MSTP).................................................. 598
Protocol Overview............................................................................................................................598
Spanning Tree Variations..................................................................................................................599
Implementation Information......................................................................................................599
Configure Multiple Spanning Tree Protocol....................................................................................599
Related Configuration Tasks...................................................................................................... 599
Enable Multiple Spanning Tree Globally..........................................................................................600
Adding and Removing Interfaces.....................................................................................................600
Creating Multiple Spanning Tree Instances..................................................................................... 601
Influencing MSTP Root Selection.................................................................................................... 602
Interoperate with Non-Dell Networking OS Bridges......................................................................603
Changing the Region Name or Revision......................................................................................... 603
Modifying Global Parameters...........................................................................................................604
Modifying the Interface Parameters................................................................................................ 605
Configuring an EdgePort................................................................................................................. 606
Flush MAC Addresses after a Topology Change............................................................................. 607
MSTP Sample Configurations...........................................................................................................607
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration............................................................608
Debugging and Verifying MSTP Configurations...............................................................................611
30 Multicast Features..........................................................................................614
Enabling IP Multicast.........................................................................................................................614
20
/