PowerSwitch S4048-ON

Dell PowerSwitch S4048-ON User manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S4048-ON User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S4048–ON
System
9.8(0.0P5)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2015 - 07
Rev. A00
Contents
1 About this Guide................................................................................................. 36
Audience..............................................................................................................................................36
Conventions........................................................................................................................................ 36
Related Documents............................................................................................................................ 36
2 Configuration Fundamentals............................................................................37
Accessing the Command Line............................................................................................................37
CLI Modes............................................................................................................................................37
Navigating CLI Modes................................................................................................................... 39
The do Command...............................................................................................................................42
Undoing Commands...........................................................................................................................43
Obtaining Help....................................................................................................................................44
Entering and Editing Commands....................................................................................................... 44
Command History...............................................................................................................................45
Filtering show Command Outputs.....................................................................................................45
Multiple Users in Configuration Mode............................................................................................... 47
3 Getting Started................................................................................................... 48
Console Access...................................................................................................................................48
Serial Console................................................................................................................................48
Accessing the CLI Interface and Running Scripts Using SSH............................................................49
Entering CLI commands Using an SSH Connection................................................................... 50
Executing Local CLI Scripts Using an SSH Connection...............................................................50
Default Configuration..........................................................................................................................51
Configuring a Host Name................................................................................................................... 51
Accessing the System Remotely.........................................................................................................51
Accessing the System Remotely................................................................................................... 51
Configure the Management Port IP Address................................................................................51
Configure a Management Route.................................................................................................. 52
Configuring a Username and Password.......................................................................................52
Configuring the Enable Password...................................................................................................... 52
Configuration File Management.........................................................................................................53
Copy Files to and from the System.............................................................................................. 53
Mounting an NFS File System....................................................................................................... 54
Save the Running-Configuration..................................................................................................56
Configure the Overload Bit for a Startup Scenario......................................................................56
Viewing Files.................................................................................................................................. 56
Compressing Configuration Files................................................................................................. 58
3
Managing the File System...................................................................................................................60
Enabling Software Features on Devices Using a Command Option.................................................61
View Command History......................................................................................................................62
Upgrading Dell Networking OS.......................................................................................................... 62
Using Hashes to Validate Software Images........................................................................................62
Using HTTP for File Transfers............................................................................................................. 64
4 Management........................................................................................................65
Configuring Privilege Levels............................................................................................................... 65
Creating a Custom Privilege Level................................................................................................65
Removing a Command from EXEC Mode................................................................................... 65
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................66
Allowing Access to CONFIGURATION Mode Commands..........................................................66
Allowing Access to the Following Modes.................................................................................... 66
Applying a Privilege Level to a Username.................................................................................... 68
Applying a Privilege Level to a Terminal Line...............................................................................68
Configuring Logging...........................................................................................................................68
Audit and Security Logs................................................................................................................ 69
Configuring Logging Format .......................................................................................................71
Display the Logging Buffer and the Logging Configuration........................................................ 71
Setting Up a Secure Connection to a Syslog Server.................................................................... 72
Sending System Messages to a Syslog Server.............................................................................. 73
Track Login Activity............................................................................................................................. 73
Restrictions for Tracking Login Activity........................................................................................ 73
Configuring Login Activity Tracking............................................................................................. 73
Display Login Statistics..................................................................................................................74
Limit Concurrent Login Sessions........................................................................................................75
Restrictions for Limiting the Number of Concurrent Sessions....................................................75
Configuring Concurrent Session Limit......................................................................................... 75
Enabling the System to Clear Existing Sessions...........................................................................76
Log Messages in the Internal Buffer................................................................................................... 76
Configuration Task List for System Log Management.................................................................77
Disabling System Logging................................................................................................................... 77
Sending System Messages to a Syslog Server.................................................................................... 77
Configuring a UNIX System as a Syslog Server............................................................................ 77
Changing System Logging Settings....................................................................................................78
Display the Logging Buffer and the Logging Configuration..............................................................79
Configuring a UNIX Logging Facility Level.........................................................................................79
Synchronizing Log Messages..............................................................................................................81
Enabling Timestamp on Syslog Messages..........................................................................................81
File Transfer Services...........................................................................................................................82
Configuration Task List for File Transfer Services........................................................................82
4
Enabling the FTP Server................................................................................................................ 82
Configuring FTP Server Parameters............................................................................................. 82
Configuring FTP Client Parameters..............................................................................................83
Terminal Lines.....................................................................................................................................84
Denying and Permitting Access to a Terminal Line.....................................................................84
Configuring Login Authentication for Terminal Lines................................................................. 85
Setting Time Out of EXEC Privilege Mode......................................................................................... 86
Using Telnet to get to Another Network Device............................................................................... 87
Lock CONFIGURATION Mode............................................................................................................87
Viewing the Configuration Lock Status........................................................................................88
Restoring the Factory Default Settings.............................................................................................. 88
Important Points to Remember....................................................................................................89
Restoring Factory Default Environment Variables.......................................................................89
5 802.1ag................................................................................................................. 92
Ethernet CFM...................................................................................................................................... 92
Maintenance Domains........................................................................................................................93
Maintenance Points.............................................................................................................................93
Maintenance End Points.....................................................................................................................94
Implementation Information.............................................................................................................. 95
Configuring the CFM...........................................................................................................................95
Related Configuration Tasks.........................................................................................................95
Enabling Ethernet CFM....................................................................................................................... 95
Creating a Maintenance Domain........................................................................................................95
Creating a Maintenance Association..................................................................................................96
Create Maintenance Points................................................................................................................ 96
Creating a Maintenance End Point...............................................................................................96
Creating a Maintenance Intermediate Point................................................................................ 97
Displaying the MP Databases........................................................................................................98
Continuity Check Messages............................................................................................................... 99
Enabling CCM............................................................................................................................. 100
Enabling Cross-Checking...........................................................................................................100
Sending Loopback Messages and Responses................................................................................. 100
Sending Linktrace Messages and Responses................................................................................... 101
Caching Link Trace......................................................................................................................101
Enabling CFM SNMP Traps............................................................................................................... 102
Displaying Ethernet CFM Statistics...................................................................................................104
6 802.1X.................................................................................................................105
The Port-Authentication Process.....................................................................................................106
EAP over RADIUS.........................................................................................................................108
Configuring 802.1X........................................................................................................................... 108
5
Related Configuration Tasks.......................................................................................................108
Important Points to Remember....................................................................................................... 109
Enabling 802.1X.................................................................................................................................109
Configuring Request Identity Re-Transmissions.............................................................................. 111
Configuring a Quiet Period after a Failed Authentication.......................................................... 111
Forcibly Authorizing or Unauthorizing a Port...................................................................................112
Re-Authenticating a Port...................................................................................................................113
Configuring Timeouts....................................................................................................................... 114
Configuring Dynamic VLAN Assignment with Port Authentication.................................................115
Guest and Authentication-Fail VLANs.............................................................................................. 116
Configuring a Guest VLAN...........................................................................................................117
Configuring an Authentication-Fail VLAN...................................................................................117
7 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)......................................................................................................119
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..........................................119
Guidelines for Configuring ACL VLAN Groups................................................................................ 120
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.........................121
Configuring ACL VLAN Groups................................................................................................... 121
Configuring FP Blocks for VLAN Parameters............................................................................. 122
Viewing CAM Usage.......................................................................................................................... 122
Allocating FP Blocks for VLAN Processes........................................................................................ 124
8 Access Control Lists (ACLs).............................................................................125
IP Access Control Lists (ACLs).......................................................................................................... 125
CAM Usage.................................................................................................................................. 126
Implementing ACLs on Dell Networking OS..............................................................................127
Important Points to Remember........................................................................................................128
Configuration Task List for Route Maps..................................................................................... 128
Configuring Match Routes.......................................................................................................... 131
Configuring Set Conditions.........................................................................................................132
Configure a Route Map for Route Redistribution...................................................................... 133
Configure a Route Map for Route Tagging................................................................................134
Continue Clause..........................................................................................................................134
IP Fragment Handling........................................................................................................................135
IP Fragments ACL Examples....................................................................................................... 135
Layer 4 ACL Rules Examples....................................................................................................... 135
Configure a Standard IP ACL............................................................................................................ 136
Configuring a Standard IP ACL Filter.......................................................................................... 138
Configure an Extended IP ACL......................................................................................................... 139
Configuring Filters with a Sequence Number............................................................................139
Configuring Filters Without a Sequence Number......................................................................140
6
Configure Layer 2 and Layer 3 ACLs.................................................................................................141
Assign an IP ACL to an Interface.......................................................................................................142
Applying an IP ACL............................................................................................................................142
Counting ACL Hits.......................................................................................................................143
Configure Ingress ACLs.....................................................................................................................143
Configure Egress ACLs..................................................................................................................... 144
Applying Egress Layer 3 ACLs (Control-Plane).......................................................................... 145
IP Prefix Lists......................................................................................................................................145
Implementation Information...................................................................................................... 146
Configuration Task List for Prefix Lists....................................................................................... 146
ACL Resequencing............................................................................................................................150
Resequencing an ACL or Prefix List............................................................................................ 151
Route Maps........................................................................................................................................152
Implementation Information.......................................................................................................152
Logging of ACL Processes................................................................................................................ 152
Guidelines for Configuring ACL Logging....................................................................................153
Configuring ACL Logging............................................................................................................154
Flow-Based Monitoring Support for ACLs....................................................................................... 155
Behavior of Flow-Based Monitoring...........................................................................................155
Enabling Flow-Based Monitoring................................................................................................157
Configuring UDF ACL........................................................................................................................158
9 Bidirectional Forwarding Detection (BFD)...................................................161
How BFD Works.................................................................................................................................161
BFD Packet Format......................................................................................................................162
BFD Sessions............................................................................................................................... 164
BFD Three-Way Handshake........................................................................................................164
Session State Changes................................................................................................................ 165
Important Points to Remember........................................................................................................166
Configure BFD...................................................................................................................................166
Configure BFD for Physical Ports................................................................................................167
Configure BFD for Static Routes.................................................................................................170
Configure BFD for OSPF..............................................................................................................172
Configure BFD for OSPFv3..........................................................................................................175
Configure BFD for IS-IS...............................................................................................................176
Configure BFD for BGP............................................................................................................... 179
Configure BFD for VRRP............................................................................................................. 186
Configuring Protocol Liveness................................................................................................... 189
Troubleshooting BFD..................................................................................................................189
10 Border Gateway Protocol IPv4 (BGPv4).....................................................191
Autonomous Systems (AS)................................................................................................................ 191
7
Sessions and Peers............................................................................................................................193
Establish a Session.......................................................................................................................194
Route Reflectors................................................................................................................................194
BGP Attributes................................................................................................................................... 195
Best Path Selection Criteria........................................................................................................ 196
Weight..........................................................................................................................................198
Local Preference......................................................................................................................... 198
Multi-Exit Discriminators (MEDs)................................................................................................199
Origin...........................................................................................................................................200
AS Path.........................................................................................................................................201
Next Hop......................................................................................................................................201
Multiprotocol BGP............................................................................................................................ 202
Implement BGP with Dell Networking OS.......................................................................................202
Additional Path (Add-Path) Support...........................................................................................202
Advertise IGP Cost as MED for Redistributed Routes................................................................202
Ignore Router-ID for Some Best-Path Calculations................................................................. 203
Four-Byte AS Numbers...............................................................................................................203
AS4 Number Representation......................................................................................................204
AS Number Migration................................................................................................................. 205
BGP4 Management Information Base (MIB)..............................................................................207
Important Points to Remember..................................................................................................207
Configuration Information............................................................................................................... 208
BGP Configuration........................................................................................................................... 208
Enabling BGP.............................................................................................................................. 209
Configuring AS4 Number Representations................................................................................ 213
Configuring Peer Groups............................................................................................................ 215
Configuring BGP Fast Fall-Over..................................................................................................217
Configuring Passive Peering....................................................................................................... 219
Maintaining Existing AS Numbers During an AS Migration....................................................... 220
Allowing an AS Number to Appear in its Own AS Path..............................................................221
Enabling Graceful Restart........................................................................................................... 222
Enabling Neighbor Graceful Restart...........................................................................................223
Filtering on an AS-Path Attribute................................................................................................223
Regular Expressions as Filters.....................................................................................................225
Redistributing Routes..................................................................................................................226
Enabling Additional Paths........................................................................................................... 227
Configuring IP Community Lists.................................................................................................227
Configuring an IP Extended Community List............................................................................ 229
Filtering Routes with Community Lists...................................................................................... 230
Manipulating the COMMUNITY Attribute.................................................................................. 230
Changing MED Attributes........................................................................................................... 232
Changing the LOCAL_PREFERENCE Attribute.......................................................................... 232
8
Changing the NEXT_HOP Attribute........................................................................................... 233
Changing the WEIGHT Attribute................................................................................................ 234
Enabling Multipath...................................................................................................................... 234
Filtering BGP Routes................................................................................................................... 234
Filtering BGP Routes Using Route Maps.................................................................................... 236
Filtering BGP Routes Using AS-PATH Information.................................................................... 237
Configuring BGP Route Reflectors.............................................................................................237
Aggregating Routes.................................................................................................................... 238
Configuring BGP Confederations.............................................................................................. 239
Enabling Route Flap Dampening................................................................................................239
Changing BGP Timers.................................................................................................................242
Enabling BGP Neighbor Soft-Reconfiguration..........................................................................242
Route Map Continue.................................................................................................................. 244
Enabling MBGP Configurations........................................................................................................244
BGP Regular Expression Optimization.............................................................................................245
Debugging BGP................................................................................................................................ 245
Storing Last and Bad PDUs.........................................................................................................246
Capturing PDUs...........................................................................................................................247
PDU Counters............................................................................................................................. 248
Sample Configurations.....................................................................................................................248
11 Content Addressable Memory (CAM)..........................................................255
CAM Allocation................................................................................................................................. 255
Test CAM Usage................................................................................................................................ 257
View CAM-ACL Settings....................................................................................................................257
View CAM Usage...............................................................................................................................259
CAM Optimization............................................................................................................................ 260
Troubleshoot CAM Profiling.............................................................................................................260
CAM Profile Mismatches............................................................................................................ 260
QoS CAM Region Limitation...................................................................................................... 260
12 Control Plane Policing (CoPP).....................................................................262
Configure Control Plane Policing.................................................................................................... 263
Configuring CoPP for Protocols................................................................................................ 264
Configuring CoPP for CPU Queues...........................................................................................266
CoPP for OSPFv3 Packets...........................................................................................................267
Configuring CoPP for OSPFv3....................................................................................................270
Show Commands........................................................................................................................ 271
13 Data Center Bridging (DCB)..........................................................................273
Ethernet Enhancements in Data Center Bridging............................................................................273
Priority-Based Flow Control....................................................................................................... 274
9
Enhanced Transmission Selection..............................................................................................275
Data Center Bridging Exchange Protocol (DCBx)..................................................................... 276
Data Center Bridging in a Traffic Flow....................................................................................... 277
Priority-Based Flow Control............................................................................................................. 277
Enhanced Transmission Selection................................................................................................... 278
Data Center Bridging Exchange Protocol (DCBx)........................................................................... 279
Data Center Bridging in a Traffic Flow.............................................................................................280
Enabling Data Center Bridging.........................................................................................................280
DCB Maps and its Attributes....................................................................................................... 281
Data Center Bridging: Default Configuration..................................................................................282
Configuring Priority-Based Flow Control........................................................................................282
Configuring Lossless Queues.....................................................................................................283
Configuring PFC in a DCB Map........................................................................................................285
PFC Configuration Notes............................................................................................................285
PFC Prerequisites and Restrictions.............................................................................................286
Applying a DCB Map on a Port.........................................................................................................286
Configuring PFC without a DCB Map.............................................................................................. 287
Configuring Lossless QueuesExample:......................................................................................288
Priority-Based Flow Control Using Dynamic Buffer Method..........................................................289
Pause and Resume of Traffic......................................................................................................289
Buffer Sizes for Lossless or PFC Packets................................................................................... 290
Behavior of Tagged Packets.............................................................................................................290
Configuration Example for DSCP and PFC Priorities.......................................................................291
Using PFC to Manage Converged Ethernet Traffic......................................................................... 292
Configure Enhanced Transmission Selection..................................................................................292
ETS Prerequisites and Restrictions............................................................................................. 292
Creating an ETS Priority Group.................................................................................................. 293
ETS Operation with DCBx.......................................................................................................... 294
Configuring Bandwidth Allocation for DCBx CIN..................................................................... 294
Configuring ETS in a DCB Map...................................................................................................295
Hierarchical Scheduling in ETS Output Policies.............................................................................. 297
Using ETS to Manage Converged Ethernet Traffic..........................................................................298
Applying DCB Policies in a Switch Stack......................................................................................... 298
Configure a DCBx Operation........................................................................................................... 298
DCBx Operation..........................................................................................................................298
DCBx Port Roles..........................................................................................................................299
DCB Configuration Exchange....................................................................................................300
Configuration Source Election................................................................................................... 301
Propagation of DCB Information................................................................................................301
Auto-Detection and Manual Configuration of the DCBx Version............................................302
DCBx Example............................................................................................................................ 302
DCBx Prerequisites and Restrictions..........................................................................................303
10
Configuring DCBx.......................................................................................................................303
Verifying the DCB Configuration......................................................................................................307
QoS dot1p Traffic Classification and Queue Assignment............................................................... 319
Configuring the Dynamic Buffer Method........................................................................................320
Sample DCB Configuration...............................................................................................................321
PFC and ETS Configuration Command Examples.....................................................................323
14 Dynamic Host Configuration Protocol (DHCP)........................................324
DHCP Packet Format and Options.................................................................................................. 324
Assign an IP Address using DHCP....................................................................................................326
Implementation Information............................................................................................................ 327
Configure the System to be a DHCP Server....................................................................................328
Configuring the Server for Automatic Address Allocation........................................................328
Specifying a Default Gateway.....................................................................................................330
Configure a Method of Hostname Resolution.......................................................................... 330
Using DNS for Address Resolution.............................................................................................330
Using NetBIOS WINS for Address Resolution............................................................................330
Creating Manual Binding Entries................................................................................................330
Debugging the DHCP Server...................................................................................................... 331
Using DHCP Clear Commands...................................................................................................331
Configure the System to be a Relay Agent...................................................................................... 331
Configure the System to be a DHCP Client.....................................................................................333
Configuring the DHCP Client System........................................................................................334
DHCP Client on a Management Interface................................................................................. 335
DHCP Client Operation with Other Features............................................................................ 336
Configure the System for User Port Stacking (Option 230)............................................................337
Configure Secure DHCP...................................................................................................................337
Option 82.....................................................................................................................................337
DHCP Snooping..........................................................................................................................338
Drop DHCP Packets on Snooped VLANs Only.......................................................................... 341
Dynamic ARP Inspection............................................................................................................ 342
Configuring Dynamic ARP Inspection........................................................................................343
Source Address Validation................................................................................................................344
Enabling IP Source Address Validation...................................................................................... 344
DHCP MAC Source Address Validation......................................................................................345
Enabling IP+MAC Source Address Validation............................................................................ 345
Viewing the Number of SAV Dropped Packets..........................................................................346
Clearing the Number of SAV Dropped Packets.........................................................................346
15 Equal Cost Multi-Path (ECMP)..................................................................... 347
ECMP for Flow-Based Affinity.......................................................................................................... 347
Configuring the Hash Algorithm................................................................................................ 347
11
Enabling Deterministic ECMP Next Hop....................................................................................347
Configuring the Hash Algorithm Seed.......................................................................................348
Link Bundle Monitoring.................................................................................................................... 348
Managing ECMP Group Paths.................................................................................................... 349
Creating an ECMP Group Bundle...............................................................................................349
Modifying the ECMP Group Threshold......................................................................................350
16 FCoE Transit.....................................................................................................351
Fibre Channel over Ethernet.............................................................................................................351
Ensure Robustness in a Converged Ethernet Network................................................................... 351
FIP Snooping on Ethernet Bridges................................................................................................... 353
FIP Snooping in a Switch Stack........................................................................................................ 355
Using FIP Snooping...........................................................................................................................355
FIP Snooping Prerequisites......................................................................................................... 355
Important Points to Remember................................................................................................. 356
Enabling the FCoE Transit Feature............................................................................................. 357
Enable FIP Snooping on VLANs.................................................................................................. 357
Configure the FC-MAP Value..................................................................................................... 357
Configure a Port for a Bridge-to-Bridge Link............................................................................ 357
Configure a Port for a Bridge-to-FCF Link................................................................................ 358
Impact on Other Software Features...........................................................................................358
FIP Snooping Restrictions...........................................................................................................358
Configuring FIP Snooping.......................................................................................................... 359
Displaying FIP Snooping Information.............................................................................................. 359
FCoE Transit Configuration Example...............................................................................................365
17 FIPS Cryptography..........................................................................................367
Configuration Tasks.......................................................................................................................... 367
Preparing the System........................................................................................................................367
Enabling FIPS Mode..........................................................................................................................368
Generating Host-Keys...................................................................................................................... 368
Monitoring FIPS Mode Status...........................................................................................................369
Disabling FIPS Mode......................................................................................................................... 369
18 Force10 Resilient Ring Protocol (FRRP)..................................................... 371
Protocol Overview.............................................................................................................................371
Ring Status...................................................................................................................................372
Multiple FRRP Rings.....................................................................................................................373
Important FRRP Points................................................................................................................ 373
Important FRRP Concepts.......................................................................................................... 373
Implementing FRRP.......................................................................................................................... 375
FRRP Configuration...........................................................................................................................375
12
Creating the FRRP Group............................................................................................................375
Configuring the Control VLAN................................................................................................... 376
Configuring and Adding the Member VLANs.............................................................................377
Setting the FRRP Timers..............................................................................................................378
Clearing the FRRP Counters....................................................................................................... 378
Viewing the FRRP Configuration................................................................................................ 379
Viewing the FRRP Information....................................................................................................379
Troubleshooting FRRP......................................................................................................................379
Configuration Checks.................................................................................................................379
Sample Configuration and Topology.............................................................................................. 380
19 GARP VLAN Registration Protocol (GVRP)................................................ 382
Important Points to Remember....................................................................................................... 382
Configure GVRP................................................................................................................................383
Related Configuration Tasks.......................................................................................................383
Enabling GVRP Globally................................................................................................................... 384
Enabling GVRP on a Layer 2 Interface............................................................................................. 384
Configure GVRP Registration...........................................................................................................384
Configure a GARP Timer.................................................................................................................. 385
RPM Redundancy..............................................................................................................................386
20 High Availability (HA).....................................................................................387
Component Redundancy................................................................................................................. 387
Automatic and Manual Stack Unit Failover................................................................................ 387
Synchronization between Management and Standby Units.....................................................388
Forcing an Stack Unit Failover....................................................................................................388
Specifying an Auto-Failover Limit.............................................................................................. 389
Disabling Auto-Reboot...............................................................................................................389
Manually Synchronizing Management and Standby Units........................................................389
Pre-Configuring a Stack Unit Slot....................................................................................................389
Removing a Provisioned Logical Stack Unit.................................................................................... 390
Hitless Behavior................................................................................................................................ 390
Graceful Restart................................................................................................................................390
Software Resiliency........................................................................................................................... 391
Software Component Health Monitoring.................................................................................. 391
System Health Monitoring.......................................................................................................... 391
Failure and Event Logging...........................................................................................................391
Hot-Lock Behavior........................................................................................................................... 392
21 Internet Group Management Protocol (IGMP).........................................393
IGMP Implementation Information..................................................................................................393
IGMP Protocol Overview..................................................................................................................393
13
IGMP Version 2............................................................................................................................393
IGMP Version 3............................................................................................................................395
Configure IGMP................................................................................................................................ 398
Related Configuration Tasks...................................................................................................... 398
Viewing IGMP Enabled Interfaces....................................................................................................399
Selecting an IGMP Version............................................................................................................... 399
Viewing IGMP Groups...................................................................................................................... 400
Adjusting Timers...............................................................................................................................400
Adjusting Query and Response Timers......................................................................................400
Preventing a Host from Joining a Group.........................................................................................401
Enabling IGMP Immediate-Leave.................................................................................................... 404
IGMP Snooping.................................................................................................................................404
IGMP Snooping Implementation Information...........................................................................404
Configuring IGMP Snooping...................................................................................................... 404
Removing a Group-Port Association.........................................................................................405
Disabling Multicast Flooding...................................................................................................... 405
Specifying a Port as Connected to a Multicast Router............................................................. 406
Configuring the Switch as Querier............................................................................................ 406
Fast Convergence after MSTP Topology Changes......................................................................... 407
Egress Interface Selection (EIS) for HTTP and IGMP Applications..................................................407
Protocol Separation....................................................................................................................408
Enabling and Disabling Management Egress Interface Selection............................................ 409
Handling of Management Route Configuration........................................................................ 410
Handling of Switch-Initiated Traffic........................................................................................... 410
Handling of Switch-Destined Traffic.......................................................................................... 411
Handling of Transit Traffic (Traffic Separation).......................................................................... 412
Mapping of Management Applications and Traffic Type...........................................................412
Behavior of Various Applications for Switch-Initiated Traffic ...................................................413
Behavior of Various Applications for Switch-Destined Traffic ................................................. 414
Interworking of EIS With Various Applications...........................................................................415
Designating a Multicast Router Interface.........................................................................................416
22 Interfaces......................................................................................................... 417
Basic Interface Configuration........................................................................................................... 417
Advanced Interface Configuration................................................................................................... 417
Interface Types..................................................................................................................................418
View Basic Interface Information..................................................................................................... 418
Enabling a Physical Interface........................................................................................................... 420
Physical Interfaces............................................................................................................................420
Configuration Task List for Physical Interfaces..........................................................................421
Overview of Layer Modes........................................................................................................... 421
Configuring Layer 2 (Data Link) Mode........................................................................................421
14
Configuring Layer 2 (Interface) Mode........................................................................................ 422
Configuring Layer 3 (Network) Mode.........................................................................................422
Configuring Layer 3 (Interface) Mode........................................................................................ 423
Egress Interface Selection (EIS)........................................................................................................424
Important Points to Remember................................................................................................. 424
Configuring EIS........................................................................................................................... 424
Management Interfaces....................................................................................................................425
Configuring Management Interfaces......................................................................................... 425
Configuring Management Interfaces on the S-Series...............................................................426
VLAN Interfaces.................................................................................................................................427
Loopback Interfaces.........................................................................................................................428
Null Interfaces...................................................................................................................................429
Port Channel Interfaces....................................................................................................................429
Port Channel Definition and Standards..................................................................................... 429
Port Channel Benefits.................................................................................................................429
Port Channel Implementation....................................................................................................430
10/40 Gbps Interfaces in Port Channels....................................................................................430
Configuration Tasks for Port Channel Interfaces......................................................................430
Creating a Port Channel..............................................................................................................431
Adding a Physical Interface to a Port Channel...........................................................................431
Reassigning an Interface to a New Port Channel......................................................................433
Configuring the Minimum Oper Up Links in a Port Channel....................................................434
.....................................................................................................................................................434
Assigning an IP Address to a Port Channel................................................................................435
Deleting or Disabling a Port Channel.........................................................................................435
Load Balancing Through Port Channels....................................................................................435
Load-Balancing Method.............................................................................................................436
Changing the Hash Algorithm....................................................................................................436
Bulk Configuration............................................................................................................................438
Interface Range...........................................................................................................................438
Bulk Configuration Examples..................................................................................................... 438
Defining Interface Range Macros.................................................................................................... 440
Define the Interface Range........................................................................................................ 440
Choosing an Interface-Range Macro........................................................................................ 440
Monitoring and Maintaining Interfaces............................................................................................ 441
Maintenance Using TDR............................................................................................................. 442
Non Dell-Qualified Transceivers......................................................................................................442
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 443
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................444
Important Points to Remember................................................................................................. 444
Example Scenarios......................................................................................................................445
Link Dampening................................................................................................................................446
15
Important Points to Remember................................................................................................. 447
Enabling Link Dampening...........................................................................................................447
Link Bundle Monitoring.................................................................................................................... 448
Using Ethernet Pause Frames for Flow Control..............................................................................449
Enabling Pause Frames...............................................................................................................450
Configure the MTU Size on an Interface.........................................................................................450
Port-Pipes..........................................................................................................................................451
Auto-Negotiation on Ethernet Interfaces........................................................................................ 451
Setting the Speed and Duplex Mode of Ethernet Interfaces.....................................................452
Set Auto-Negotiation Options................................................................................................... 453
View Advanced Interface Information............................................................................................. 454
Configuring the Interface Sampling Size................................................................................... 455
Dynamic Counters............................................................................................................................456
Clearing Interface Counters....................................................................................................... 456
Enhanced Validation of Interface Ranges........................................................................................457
23 Internet Protocol Security (IPSec).............................................................. 458
Configuring IPSec ............................................................................................................................459
24 IPv4 Routing................................................................................................... 460
IP Addresses......................................................................................................................................460
Implementation Information......................................................................................................460
Configuration Tasks for IP Addresses...............................................................................................461
Assigning IP Addresses to an Interface............................................................................................ 461
Configuring Static Routes................................................................................................................ 462
Configure Static Routes for the Management Interface.................................................................464
IPv4 Path MTU Discovery Overview................................................................................................ 464
Using the Configured Source IP Address in ICMP Messages..........................................................465
Configuring the ICMP Source Interface.....................................................................................465
Configuring the Duration to Establish a TCP Connection..............................................................466
Enabling Directed Broadcast............................................................................................................466
Resolution of Host Names............................................................................................................... 467
Enabling Dynamic Resolution of Host Names................................................................................ 467
Specifying the Local System Domain and a List of Domains......................................................... 468
Configuring DNS with Traceroute................................................................................................... 468
ARP....................................................................................................................................................469
Configuration Tasks for ARP............................................................................................................ 469
Configuring Static ARP Entries......................................................................................................... 470
Enabling Proxy ARP...........................................................................................................................470
Clearing ARP Cache..........................................................................................................................470
ARP Learning via Gratuitous ARP......................................................................................................471
Enabling ARP Learning via Gratuitous ARP.......................................................................................471
16
ARP Learning via ARP Request......................................................................................................... 472
Configuring ARP Retries................................................................................................................... 473
ICMP.................................................................................................................................................. 473
Configuration Tasks for ICMP.......................................................................................................... 473
Enabling ICMP Unreachable Messages............................................................................................474
UDP Helper....................................................................................................................................... 474
Configure UDP Helper................................................................................................................474
Important Points to Remember................................................................................................. 474
Enabling UDP Helper........................................................................................................................ 474
Configuring a Broadcast Address.....................................................................................................475
Configurations Using UDP Helper................................................................................................... 476
UDP Helper with Broadcast-All Addresses...................................................................................... 476
UDP Helper with Subnet Broadcast Addresses................................................................................477
UDP Helper with Configured Broadcast Addresses........................................................................ 478
UDP Helper with No Configured Broadcast Addresses.................................................................. 478
Troubleshooting UDP Helper...........................................................................................................478
25 IPv6 Routing................................................................................................... 480
Protocol Overview............................................................................................................................480
Extended Address Space............................................................................................................ 480
Stateless Autoconfiguration.......................................................................................................480
IPv6 Headers................................................................................................................................481
IPv6 Header Fields...................................................................................................................... 482
Extension Header Fields............................................................................................................. 483
Addressing...................................................................................................................................484
Implementing IPv6 with Dell Networking OS..................................................................................485
ICMPv6..............................................................................................................................................488
Path MTU Discovery.........................................................................................................................488
IPv6 Neighbor Discovery..................................................................................................................489
IPv6 Neighbor Discovery of MTU Packets.................................................................................490
Configuration Task List for IPv6 RDNSS.......................................................................................... 490
Configuring the IPv6 Recursive DNS Server..............................................................................490
Debugging IPv6 RDNSS Information Sent to the Host .............................................................491
Displaying IPv6 RDNSS Information...........................................................................................492
Secure Shell (SSH) Over an IPv6 Transport......................................................................................492
Configuration Tasks for IPv6............................................................................................................493
Adjusting Your CAM-Profile....................................................................................................... 493
Assigning an IPv6 Address to an Interface.................................................................................494
Assigning a Static IPv6 Route..................................................................................................... 494
Configuring Telnet with IPv6......................................................................................................495
SNMP over IPv6...........................................................................................................................495
Showing IPv6 Information..........................................................................................................495
17
Showing an IPv6 Interface..........................................................................................................496
Showing IPv6 Routes.................................................................................................................. 497
Showing the Running-Configuration for an Interface..............................................................498
Clearing IPv6 Routes.................................................................................................................. 498
Configuring IPv6 RA Guard.............................................................................................................. 499
26 iSCSI Optimization.........................................................................................502
iSCSI Optimization Overview........................................................................................................... 502
Monitoring iSCSI Traffic Flows................................................................................................... 504
Application of Quality of Service to iSCSI Traffic Flows............................................................504
Information Monitored in iSCSI Traffic Flows............................................................................504
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................ 505
Configuring Detection and Ports for Dell Compellent Arrays..................................................506
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................506
Enable and Disable iSCSI Optimization..................................................................................... 506
Default iSCSI Optimization Values................................................................................................... 507
iSCSI Optimization Prerequisites..................................................................................................... 508
Configuring iSCSI Optimization.......................................................................................................508
Displaying iSCSI Optimization Information......................................................................................510
27 Intermediate System to Intermediate System...........................................512
IS-IS Protocol Overview....................................................................................................................512
IS-IS Addressing.................................................................................................................................512
Multi-Topology IS-IS.........................................................................................................................513
Transition Mode...........................................................................................................................513
Interface Support.........................................................................................................................514
Adjacencies..................................................................................................................................514
Graceful Restart.................................................................................................................................514
Timers.......................................................................................................................................... 514
Implementation Information............................................................................................................ 515
Configuration Information................................................................................................................516
Configuration Tasks for IS-IS...................................................................................................... 516
Configuring the Distance of a Route..........................................................................................525
Changing the IS-Type.................................................................................................................525
Redistributing IPv4 Routes..........................................................................................................528
Redistributing IPv6 Routes..........................................................................................................528
Configuring Authentication Passwords..................................................................................... 529
Setting the Overload Bit..............................................................................................................530
Debugging IS-IS..........................................................................................................................530
IS-IS Metric Styles............................................................................................................................. 532
Configure Metric Values................................................................................................................... 532
Maximum Values in the Routing Table.......................................................................................532
18
Change the IS-IS Metric Style in One Level Only...................................................................... 532
Leaks from One Level to Another.............................................................................................. 534
Sample Configurations..................................................................................................................... 535
28 Link Aggregation Control Protocol (LACP)...............................................538
Introduction to Dynamic LAGs and LACP....................................................................................... 538
Important Points to Remember................................................................................................. 538
LACP Modes................................................................................................................................ 539
Configuring LACP Commands................................................................................................... 539
LACP Configuration Tasks................................................................................................................540
Creating a LAG............................................................................................................................540
Configuring the LAG Interfaces as Dynamic..............................................................................541
Setting the LACP Long Timeout................................................................................................. 541
Monitoring and Debugging LACP.............................................................................................. 542
Shared LAG State Tracking............................................................................................................... 542
Configuring Shared LAG State Tracking.....................................................................................543
Important Points about Shared LAG State Tracking..................................................................544
LACP Basic Configuration Example................................................................................................. 545
Configure a LAG on ALPHA........................................................................................................ 545
29 Layer 2.............................................................................................................. 553
Manage the MAC Address Table...................................................................................................... 553
Clearing the MAC Address Table................................................................................................553
Setting the Aging Time for Dynamic Entries..............................................................................553
Configuring a Static MAC Address............................................................................................. 554
Displaying the MAC Address Table.............................................................................................554
MAC Learning Limit...........................................................................................................................554
Setting the MAC Learning Limit..................................................................................................555
mac learning-limit Dynamic....................................................................................................... 555
mac learning-limit mac-address-sticky.....................................................................................556
mac learning-limit station-move............................................................................................... 556
mac learning-limit no-station-move.........................................................................................556
Learning Limit Violation Actions.................................................................................................557
Setting Station Move Violation Actions...................................................................................... 557
Recovering from Learning Limit and Station Move Violations..................................................558
NIC Teaming..................................................................................................................................... 558
Configure Redundant Pairs.............................................................................................................. 559
Important Points about Configuring Redundant Pairs.............................................................. 561
Far-End Failure Detection................................................................................................................ 562
FEFD State Changes....................................................................................................................563
Configuring FEFD........................................................................................................................564
Enabling FEFD on an Interface................................................................................................... 565
19
Debugging FEFD......................................................................................................................... 566
30 Link Layer Discovery Protocol (LLDP)........................................................568
802.1AB (LLDP) Overview.................................................................................................................568
Protocol Data Units.................................................................................................................... 568
Optional TLVs....................................................................................................................................569
Management TLVs...................................................................................................................... 569
TIA-1057 (LLDP-MED) Overview.......................................................................................................571
TIA Organizationally Specific TLVs............................................................................................. 572
Configure LLDP.................................................................................................................................576
Related Configuration Tasks.......................................................................................................576
Important Points to Remember..................................................................................................576
LLDP Compatibility......................................................................................................................577
CONFIGURATION versus INTERFACE Configurations.................................................................... 577
Enabling LLDP................................................................................................................................... 578
Disabling and Undoing LLDP......................................................................................................578
Enabling LLDP on Management Ports............................................................................................. 578
Disabling and Undoing LLDP on Management Ports................................................................ 578
Advertising TLVs................................................................................................................................579
Viewing the LLDP Configuration......................................................................................................580
Viewing Information Advertised by Adjacent LLDP Agents.............................................................581
Configuring LLDPDU Intervals......................................................................................................... 582
Configuring Transmit and Receive Mode........................................................................................ 582
Configuring a Time to Live...............................................................................................................583
Debugging LLDP...............................................................................................................................584
Relevant Management Objects........................................................................................................585
31 Microsoft Network Load Balancing............................................................ 591
NLB Unicast Mode Scenario............................................................................................................. 591
NLB Multicast Mode Scenario.......................................................................................................... 592
Limitations of the NLB Feature.........................................................................................................592
Microsoft Clustering......................................................................................................................... 592
Enable and Disable VLAN Flooding .................................................................................................593
Configuring a Switch for NLB ..........................................................................................................593
..................................................................................................................................................... 593
32 Multicast Source Discovery Protocol (MSDP)...........................................595
Protocol Overview............................................................................................................................595
Anycast RP.........................................................................................................................................597
Implementation Information............................................................................................................ 597
Configure Multicast Source Discovery Protocol............................................................................. 597
Related Configuration Tasks.......................................................................................................597
20
/